Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1
value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3
values | title stringlengths 1 1k | labels stringlengths 4 1.38k | body stringlengths 1 262k | index stringclasses 16
values | text_combine stringlengths 96 262k | label stringclasses 2
values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
299,801 | 22,623,728,223 | IssuesEvent | 2022-06-30 08:50:19 | f1nal3/Juniorgram | https://api.github.com/repos/f1nal3/Juniorgram | closed | Update onboarding process and documentation. | documentation | ## Description:
* Create onboarding issue template that is based on the issues that @KliKonNik and other newcomers received.
* List of crucial parts of the code that need to be examined: Network primitives, messages, server main body etc.
* Put a link on "server hosting locally" md doc there.
* Put a link on "Getting started" md doc there as well.
* Put a link on CMake intro course into Teams wiki and "Getting started" Page.
* Add a description of registration, login and sending first message.
* Create workflow process algorithm describing how to get a task and how to process it from the beginning to the very end.
* Update git workflow doc
Extra effort:
* Prepare some slides describing JG as a product.
## Acceptance Criteria:
Onboarding course is updated
| 1.0 | Update onboarding process and documentation. - ## Description:
* Create onboarding issue template that is based on the issues that @KliKonNik and other newcomers received.
* List of crucial parts of the code that need to be examined: Network primitives, messages, server main body etc.
* Put a link on "server hosting locally" md doc there.
* Put a link on "Getting started" md doc there as well.
* Put a link on CMake intro course into Teams wiki and "Getting started" Page.
* Add a description of registration, login and sending first message.
* Create workflow process algorithm describing how to get a task and how to process it from the beginning to the very end.
* Update git workflow doc
Extra effort:
* Prepare some slides describing JG as a product.
## Acceptance Criteria:
Onboarding course is updated
| non_priority | update onboarding process and documentation description create onboarding issue template that is based on the issues that klikonnik and other newcomers received list of crucial parts of the code that need to be examined network primitives messages server main body etc put a link on server hosting locally md doc there put a link on getting started md doc there as well put a link on cmake intro course into teams wiki and getting started page add a description of registration login and sending first message create workflow process algorithm describing how to get a task and how to process it from the beginning to the very end update git workflow doc extra effort prepare some slides describing jg as a product acceptance criteria onboarding course is updated | 0 |
430,247 | 12,450,147,922 | IssuesEvent | 2020-05-27 08:19:49 | caicloud/ormb | https://api.github.com/repos/caicloud/ormb | closed | [enhancement] Design v1 Model Config Specification | priority/P0 | We should define the specification for mediaType `application/vnd.caicloud.model.config.v1+json`.
We can refer to https://github.com/opencontainers/image-spec/blob/master/config.md
/priority p0 | 1.0 | [enhancement] Design v1 Model Config Specification - We should define the specification for mediaType `application/vnd.caicloud.model.config.v1+json`.
We can refer to https://github.com/opencontainers/image-spec/blob/master/config.md
/priority p0 | priority | design model config specification we should define the specification for mediatype application vnd caicloud model config json we can refer to priority | 1 |
701,583 | 24,100,257,343 | IssuesEvent | 2022-09-19 23:24:31 | bcgov/entity | https://api.github.com/repos/bcgov/entity | closed | UX Design - PPR Search disclaimer for each search PDF output | Priority2 UX Assets | ### Visual Design Comps:
https://projects.invisionapp.com/share/HZ12S0EY8MBC#/screens?browse
**Add disclaimer to the following:**
- End of PPR Search TOC
- End of PPR Search NIL TOC
- End of PPR Search "Non-Selected" TOC
- Beginning of MHR with PPR Combo Search
- Also, Update font size/add gray hairline to MHR with NIL PPR Combo Search
Disclaimer font size 9px/13px linespacing
-------
The current legacy PPR application includes a disclaimer at the bottom of each printed search output:
Some, but not all, tax liens and other Crown claims are registered at the
Personal Property Registry (PPR) and if registered, will be displayed on
this search result. HOWEVER, it is possible that a particular chattel is
subject to a Crown claim that is not registered at the PPR. Please consult
the Miscellaneous Registrations Act, 1992 for more details. If you are
concerned that a particular chattel may be subject to a Crown claim not
registered at the PPR, please consult the agency administering the type
of Crown claim.
Modify the PDF search output to include this disclaimer at the bottom or under the table of contents. (after TOC may be preferred)
Example:
 | 1.0 | UX Design - PPR Search disclaimer for each search PDF output - ### Visual Design Comps:
https://projects.invisionapp.com/share/HZ12S0EY8MBC#/screens?browse
**Add disclaimer to the following:**
- End of PPR Search TOC
- End of PPR Search NIL TOC
- End of PPR Search "Non-Selected" TOC
- Beginning of MHR with PPR Combo Search
- Also, Update font size/add gray hairline to MHR with NIL PPR Combo Search
Disclaimer font size 9px/13px linespacing
-------
The current legacy PPR application includes a disclaimer at the bottom of each printed search output:
Some, but not all, tax liens and other Crown claims are registered at the
Personal Property Registry (PPR) and if registered, will be displayed on
this search result. HOWEVER, it is possible that a particular chattel is
subject to a Crown claim that is not registered at the PPR. Please consult
the Miscellaneous Registrations Act, 1992 for more details. If you are
concerned that a particular chattel may be subject to a Crown claim not
registered at the PPR, please consult the agency administering the type
of Crown claim.
Modify the PDF search output to include this disclaimer at the bottom or under the table of contents. (after TOC may be preferred)
Example:
 | priority | ux design ppr search disclaimer for each search pdf output visual design comps add disclaimer to the following end of ppr search toc end of ppr search nil toc end of ppr search non selected toc beginning of mhr with ppr combo search also update font size add gray hairline to mhr with nil ppr combo search disclaimer font size linespacing the current legacy ppr application includes a disclaimer at the bottom of each printed search output some but not all tax liens and other crown claims are registered at the personal property registry ppr and if registered will be displayed on this search result however it is possible that a particular chattel is subject to a crown claim that is not registered at the ppr please consult the miscellaneous registrations act for more details if you are concerned that a particular chattel may be subject to a crown claim not registered at the ppr please consult the agency administering the type of crown claim modify the pdf search output to include this disclaimer at the bottom or under the table of contents after toc may be preferred example | 1 |
42,793 | 22,843,262,075 | IssuesEvent | 2022-07-13 01:32:08 | JuliaLang/julia | https://api.github.com/repos/JuliaLang/julia | closed | Deeply composed functions much slower than equivalent static functions | performance | ```julia
julia> VERSION
v"1.9.0-DEV.869"
julia> eval(:(f(x) = $(reduce((s,x) -> :($x($s)), fill(sin,500); init = :x))))
f (generic function with 1 method)
# f(x) = sin(sin(...(sin(x))))
julia> g = reduce(โ, fill(sin,500));
# g(x) = (sinโsinโ...โsin)(x)
julia> @time f(1.0) == g(1.0)
0.686770 seconds (1.66 M allocations: 109.801 MiB, 5.39% gc time, 98.75% compilation time)
true
julia> @time f(1.0)
0.000001 seconds
0.07698641344541407
julia> @time g(1.0)
0.011081 seconds (1000 allocations: 15.625 KiB)
0.07698641344541407
```
The compile time is vastly improved since 1.7, but the evaluation performance is worse
```julia
julia> VERSION
v"1.7.3"
julia> eval(:(f(x) = $(reduce((s,x) -> :($x($s)), fill(sin,500); init = :x))))
f (generic function with 1 method)
julia> g = reduce(โ, fill(sin,500));
julia> @time f(1.0) == g(1.0)
114.266682 seconds (228.16 M allocations: 13.787 GiB, 2.16% gc time, 100.00% compilation time)
true
julia> @time f(1.0)
0.000010 seconds
0.07698641344541407
julia> @time g(1.0)
0.000244 seconds (499 allocations: 7.797 KiB)
0.07698641344541407
``` | True | Deeply composed functions much slower than equivalent static functions - ```julia
julia> VERSION
v"1.9.0-DEV.869"
julia> eval(:(f(x) = $(reduce((s,x) -> :($x($s)), fill(sin,500); init = :x))))
f (generic function with 1 method)
# f(x) = sin(sin(...(sin(x))))
julia> g = reduce(โ, fill(sin,500));
# g(x) = (sinโsinโ...โsin)(x)
julia> @time f(1.0) == g(1.0)
0.686770 seconds (1.66 M allocations: 109.801 MiB, 5.39% gc time, 98.75% compilation time)
true
julia> @time f(1.0)
0.000001 seconds
0.07698641344541407
julia> @time g(1.0)
0.011081 seconds (1000 allocations: 15.625 KiB)
0.07698641344541407
```
The compile time is vastly improved since 1.7, but the evaluation performance is worse
```julia
julia> VERSION
v"1.7.3"
julia> eval(:(f(x) = $(reduce((s,x) -> :($x($s)), fill(sin,500); init = :x))))
f (generic function with 1 method)
julia> g = reduce(โ, fill(sin,500));
julia> @time f(1.0) == g(1.0)
114.266682 seconds (228.16 M allocations: 13.787 GiB, 2.16% gc time, 100.00% compilation time)
true
julia> @time f(1.0)
0.000010 seconds
0.07698641344541407
julia> @time g(1.0)
0.000244 seconds (499 allocations: 7.797 KiB)
0.07698641344541407
``` | non_priority | deeply composed functions much slower than equivalent static functions julia julia version v dev julia eval f x reduce s x x s fill sin init x f generic function with method f x sin sin sin x julia g reduce โ fill sin g x sinโsinโ โsin x julia time f g seconds m allocations mib gc time compilation time true julia time f seconds julia time g seconds allocations kib the compile time is vastly improved since but the evaluation performance is worse julia julia version v julia eval f x reduce s x x s fill sin init x f generic function with method julia g reduce โ fill sin julia time f g seconds m allocations gib gc time compilation time true julia time f seconds julia time g seconds allocations kib | 0 |
3,428 | 2,764,223,398 | IssuesEvent | 2015-04-29 14:28:35 | thinkaurelius/titan | https://api.github.com/repos/thinkaurelius/titan | closed | Documentation bugs. | bug documentation | http://s3.thinkaurelius.com/docs/titan/0.9.0-M1/arch-overview.html
http://s3.thinkaurelius.com/docs/titan/0.9.0-M1/getting-started.html (Gremlin2)
http://s3.thinkaurelius.com/docs/titan/0.9.0-M1/gremlin.html (Gremlin2)
...there is alot more Gremlin than just the titanbasics.txt. It would be good for Titan guys to go through each line one by one and make sure its all right -- with appropriate links to TP3 docs. | 1.0 | Documentation bugs. - http://s3.thinkaurelius.com/docs/titan/0.9.0-M1/arch-overview.html
http://s3.thinkaurelius.com/docs/titan/0.9.0-M1/getting-started.html (Gremlin2)
http://s3.thinkaurelius.com/docs/titan/0.9.0-M1/gremlin.html (Gremlin2)
...there is alot more Gremlin than just the titanbasics.txt. It would be good for Titan guys to go through each line one by one and make sure its all right -- with appropriate links to TP3 docs. | non_priority | documentation bugs there is alot more gremlin than just the titanbasics txt it would be good for titan guys to go through each line one by one and make sure its all right with appropriate links to docs | 0 |
105,701 | 13,207,964,224 | IssuesEvent | 2020-08-15 01:34:22 | rubyforgood/casa | https://api.github.com/repos/rubyforgood/casa | closed | Front end design | :paintbrush: Design | All work pertaining to how stuff looks on the front end! Will touch work on epics #3 & #4
<u>Priorities</u>
- make things look nicer (without complicating functionality)
- ensure CASA brand & style are applied to all front end elements
- modular css style guide that can be applied across site. [Example of some modular css for Ruby can be found here.](https://blog.engineyard.com/front-end-maintainability-with-sass-and-style-guides)
<u>Not priority, but would be nice if you wanna make it happen!</u>
- light graphic design as needed that makes navigation easy and intuitive and on brand.
Open issues related to this epic: #8 #46 | 1.0 | Front end design - All work pertaining to how stuff looks on the front end! Will touch work on epics #3 & #4
<u>Priorities</u>
- make things look nicer (without complicating functionality)
- ensure CASA brand & style are applied to all front end elements
- modular css style guide that can be applied across site. [Example of some modular css for Ruby can be found here.](https://blog.engineyard.com/front-end-maintainability-with-sass-and-style-guides)
<u>Not priority, but would be nice if you wanna make it happen!</u>
- light graphic design as needed that makes navigation easy and intuitive and on brand.
Open issues related to this epic: #8 #46 | non_priority | front end design all work pertaining to how stuff looks on the front end will touch work on epics priorities make things look nicer without complicating functionality ensure casa brand style are applied to all front end elements modular css style guide that can be applied across site not priority but would be nice if you wanna make it happen light graphic design as needed that makes navigation easy and intuitive and on brand open issues related to this epic | 0 |
80,134 | 15,358,436,975 | IssuesEvent | 2021-03-01 14:48:34 | llvm4j/llvm4j | https://api.github.com/repos/llvm4j/llvm4j | closed | [llvm] Implement QOL functions | assign:anyone scope:apis status:old codebase type:feature | LLVM-C provides some quality-of-life functions for easier usage. Some of these have been skipped when implementing their function family. These functions are the following:
- LLVMConstIntOfString
- LLVMConstIntOfStringAndSize
- LLVMConstRealOfString
- LLVMConstRealOfStringAndSize
- LLVMBuildStructGEP
- LLVMBuildCast
- LLVMBuildIntCast
- LLVMBuildFPCast
- LLVMBuildPointerCast
- LLVMBuildIsNull
- LLVMBuildIsNotNull
- LLVMBuildPtrDiff
Additional functions which may be wrapped up into a Container
- LLVMGetDefaultTargetTriple
- LLVMNormalizeTargetTriple
- LLVMGetHostCPUName
- LLVMGetHostCPUFeatures | 1.0 | [llvm] Implement QOL functions - LLVM-C provides some quality-of-life functions for easier usage. Some of these have been skipped when implementing their function family. These functions are the following:
- LLVMConstIntOfString
- LLVMConstIntOfStringAndSize
- LLVMConstRealOfString
- LLVMConstRealOfStringAndSize
- LLVMBuildStructGEP
- LLVMBuildCast
- LLVMBuildIntCast
- LLVMBuildFPCast
- LLVMBuildPointerCast
- LLVMBuildIsNull
- LLVMBuildIsNotNull
- LLVMBuildPtrDiff
Additional functions which may be wrapped up into a Container
- LLVMGetDefaultTargetTriple
- LLVMNormalizeTargetTriple
- LLVMGetHostCPUName
- LLVMGetHostCPUFeatures | non_priority | implement qol functions llvm c provides some quality of life functions for easier usage some of these have been skipped when implementing their function family these functions are the following llvmconstintofstring llvmconstintofstringandsize llvmconstrealofstring llvmconstrealofstringandsize llvmbuildstructgep llvmbuildcast llvmbuildintcast llvmbuildfpcast llvmbuildpointercast llvmbuildisnull llvmbuildisnotnull llvmbuildptrdiff additional functions which may be wrapped up into a container llvmgetdefaulttargettriple llvmnormalizetargettriple llvmgethostcpuname llvmgethostcpufeatures | 0 |
2,588 | 2,607,930,111 | IssuesEvent | 2015-02-26 00:26:20 | chrsmithdemos/minify | https://api.github.com/repos/chrsmithdemos/minify | closed | Incorrect CSS image paths | auto-migrated Priority-High Type-Defect | ```
Minify version: 2.1.1
PHP version:5.2.4-2ubuntu5.4
What steps will reproduce the problem?
1. Create a css file with a relative image path in it for a background,
such as:
*****
url("../images/fieldset-bg.gif")
*****
2. Minify the css files with a relative image path in it :
array(
'//styles/somefile.css'
);
2. Compare the re-written image path in the compressed file:
Expected output:
original: "../images/fieldset-bg.gif"
modified: "../images/fieldset-bg.gif"
Actual output:
original: "../images/fieldset-bg.gif"
modified: "/../images/fieldset-bg.gif"
Did any unit tests FAIL?
Running test_all.php produces the following failures:
*****
!FAIL: Minify_Cache_File : store (1 of 10 tests run so far have failed)
!FAIL: Minify_Cache_File : isValid (2 of 12 tests run so far have failed)
!FAIL: Minify_Cache_File : display (3 of 13 tests run so far have failed)
!FAIL: Minify_Cache_File : fetch (4 of 14 tests run so far have failed)
!FAIL: Minify_Cache_File : store w/ lock (5 of 15 tests run so far have failed)
!FAIL: Minify_Cache_File : isValid (6 of 17 tests run so far have failed)
!FAIL: Minify_Cache_File : display w/ lock (7 of 18 tests run so far have
failed)
!FAIL: Minify_Cache_File : fetch w/ lock (8 of 19 tests run so far have failed)
!FAIL: environment : PHP/server does not auto-HTTP-encode content (9 of 60
tests run so far have failed)
*****
Please provide any additional information below.
This issue was discussed in brief here:
http://groups.google.com/group/minify/browse_thread/thread/895cb58e4bbfe17
```
-----
Original issue reported on code.google.com by `bmhar...@gmail.com` on 26 Jan 2009 at 9:16 | 1.0 | Incorrect CSS image paths - ```
Minify version: 2.1.1
PHP version:5.2.4-2ubuntu5.4
What steps will reproduce the problem?
1. Create a css file with a relative image path in it for a background,
such as:
*****
url("../images/fieldset-bg.gif")
*****
2. Minify the css files with a relative image path in it :
array(
'//styles/somefile.css'
);
2. Compare the re-written image path in the compressed file:
Expected output:
original: "../images/fieldset-bg.gif"
modified: "../images/fieldset-bg.gif"
Actual output:
original: "../images/fieldset-bg.gif"
modified: "/../images/fieldset-bg.gif"
Did any unit tests FAIL?
Running test_all.php produces the following failures:
*****
!FAIL: Minify_Cache_File : store (1 of 10 tests run so far have failed)
!FAIL: Minify_Cache_File : isValid (2 of 12 tests run so far have failed)
!FAIL: Minify_Cache_File : display (3 of 13 tests run so far have failed)
!FAIL: Minify_Cache_File : fetch (4 of 14 tests run so far have failed)
!FAIL: Minify_Cache_File : store w/ lock (5 of 15 tests run so far have failed)
!FAIL: Minify_Cache_File : isValid (6 of 17 tests run so far have failed)
!FAIL: Minify_Cache_File : display w/ lock (7 of 18 tests run so far have
failed)
!FAIL: Minify_Cache_File : fetch w/ lock (8 of 19 tests run so far have failed)
!FAIL: environment : PHP/server does not auto-HTTP-encode content (9 of 60
tests run so far have failed)
*****
Please provide any additional information below.
This issue was discussed in brief here:
http://groups.google.com/group/minify/browse_thread/thread/895cb58e4bbfe17
```
-----
Original issue reported on code.google.com by `bmhar...@gmail.com` on 26 Jan 2009 at 9:16 | non_priority | incorrect css image paths minify version php version what steps will reproduce the problem create a css file with a relative image path in it for a background such as url images fieldset bg gif minify the css files with a relative image path in it array styles somefile css compare the re written image path in the compressed file expected output original images fieldset bg gif modified images fieldset bg gif actual output original images fieldset bg gif modified images fieldset bg gif did any unit tests fail running test all php produces the following failures fail minify cache file store of tests run so far have failed fail minify cache file isvalid of tests run so far have failed fail minify cache file display of tests run so far have failed fail minify cache file fetch of tests run so far have failed fail minify cache file store w lock of tests run so far have failed fail minify cache file isvalid of tests run so far have failed fail minify cache file display w lock of tests run so far have failed fail minify cache file fetch w lock of tests run so far have failed fail environment php server does not auto http encode content of tests run so far have failed please provide any additional information below this issue was discussed in brief here original issue reported on code google com by bmhar gmail com on jan at | 0 |
403,396 | 11,840,298,366 | IssuesEvent | 2020-03-23 18:36:47 | seccomp/libseccomp | https://api.github.com/repos/seccomp/libseccomp | opened | BUG: Travis CI warnings | bug priority/low | Despite working, the Travis CI service reports one error and two warnings with our config:
* Error
> root: duplicate key: `language`
* Warnings
> root: deprecated key sudo (The key `sudo` has no effect anymore.)
> root: deprecated key sudo (The key `sudo` has no effect anymore.) | 1.0 | BUG: Travis CI warnings - Despite working, the Travis CI service reports one error and two warnings with our config:
* Error
> root: duplicate key: `language`
* Warnings
> root: deprecated key sudo (The key `sudo` has no effect anymore.)
> root: deprecated key sudo (The key `sudo` has no effect anymore.) | priority | bug travis ci warnings despite working the travis ci service reports one error and two warnings with our config error root duplicate key language warnings root deprecated key sudo the key sudo has no effect anymore root deprecated key sudo the key sudo has no effect anymore | 1 |
84,017 | 3,647,457,832 | IssuesEvent | 2016-02-16 00:52:44 | TechReborn/TechReborn | https://api.github.com/repos/TechReborn/TechReborn | closed | Wrong NEI Handler Recipes hitboxes | bug High priority | See this:


<strong>Also, only one arrow has the hitbox for open all recipes.<strong>

TechReborn-0.5.6.963-universal | 1.0 | Wrong NEI Handler Recipes hitboxes - See this:


<strong>Also, only one arrow has the hitbox for open all recipes.<strong>

TechReborn-0.5.6.963-universal | priority | wrong nei handler recipes hitboxes see this also only one arrow has the hitbox for open all recipes techreborn universal | 1 |
118,427 | 11,968,963,008 | IssuesEvent | 2020-04-06 09:31:56 | barbajs/barba | https://api.github.com/repos/barbajs/barba | closed | Request: Sample code and/or pens for the barba.js.org transitions | documentation enhancement | The new website is beautiful. I'd love to see minimal code for the section-change full-page swipes, the between-features slideshow effect (https://codepen.io/thierrymichel/project/editor/XkkWWv is close, but this would include the CSS changes to the header and footer), and the docs partial-page swipe.
The result might be less about Barba specifically and more about writing animations generally โthe docs do thoroughly cover the Barba-specific codeโ but it could help people who don't know anime.js or whatever's being used get up and running. | 1.0 | Request: Sample code and/or pens for the barba.js.org transitions - The new website is beautiful. I'd love to see minimal code for the section-change full-page swipes, the between-features slideshow effect (https://codepen.io/thierrymichel/project/editor/XkkWWv is close, but this would include the CSS changes to the header and footer), and the docs partial-page swipe.
The result might be less about Barba specifically and more about writing animations generally โthe docs do thoroughly cover the Barba-specific codeโ but it could help people who don't know anime.js or whatever's being used get up and running. | non_priority | request sample code and or pens for the barba js org transitions the new website is beautiful i d love to see minimal code for the section change full page swipes the between features slideshow effect is close but this would include the css changes to the header and footer and the docs partial page swipe the result might be less about barba specifically and more about writing animations generally โthe docs do thoroughly cover the barba specific codeโ but it could help people who don t know anime js or whatever s being used get up and running | 0 |
576,289 | 17,083,510,139 | IssuesEvent | 2021-07-08 08:52:10 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | mangadex.org - design is broken | browser-firefox engine-gecko os-linux priority-normal | <!-- @browser: Firefox 91.0 -->
<!-- @ua_header: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0 -->
<!-- @reported_with: desktop-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/79059 -->
**URL**: https://mangadex.org/
**Browser / Version**: Firefox 91.0
**Operating System**: Linux
**Tested Another Browser**: Yes Chrome
**Problem type**: Design is broken
**Description**: Images not loaded
**Steps to Reproduce**:
When reading a manga in one page list style, the website will show a red error button to manually reload a manga page that failed to load, like because of low or unstable internet speed.
But Firefox never shows the website's error button, instead just entirely skip, or sometimes only shows a small failed white image symbol .
This is not happening on Chrome.
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2021/7/2265d4f8-9c3e-4886-929c-93fcf830f4b1.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20210702213328</li><li>channel: nightly</li><li>hasTouchScreen: false</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2021/7/59e17b3a-cb00-4ce4-9f97-a239e8f429ac)
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | 1.0 | mangadex.org - design is broken - <!-- @browser: Firefox 91.0 -->
<!-- @ua_header: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0 -->
<!-- @reported_with: desktop-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/79059 -->
**URL**: https://mangadex.org/
**Browser / Version**: Firefox 91.0
**Operating System**: Linux
**Tested Another Browser**: Yes Chrome
**Problem type**: Design is broken
**Description**: Images not loaded
**Steps to Reproduce**:
When reading a manga in one page list style, the website will show a red error button to manually reload a manga page that failed to load, like because of low or unstable internet speed.
But Firefox never shows the website's error button, instead just entirely skip, or sometimes only shows a small failed white image symbol .
This is not happening on Chrome.
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2021/7/2265d4f8-9c3e-4886-929c-93fcf830f4b1.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20210702213328</li><li>channel: nightly</li><li>hasTouchScreen: false</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2021/7/59e17b3a-cb00-4ce4-9f97-a239e8f429ac)
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | priority | mangadex org design is broken url browser version firefox operating system linux tested another browser yes chrome problem type design is broken description images not loaded steps to reproduce when reading a manga in one page list style the website will show a red error button to manually reload a manga page that failed to load like because of low or unstable internet speed but firefox never shows the website s error button instead just entirely skip or sometimes only shows a small failed white image symbol this is not happening on chrome view the screenshot img alt screenshot src browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel nightly hastouchscreen false mixed active content blocked false mixed passive content blocked false tracking content blocked false from with โค๏ธ | 1 |
1,350 | 3,654,941,529 | IssuesEvent | 2016-02-17 14:41:12 | HPFOD/FoD-Jenkins | https://api.github.com/repos/HPFOD/FoD-Jenkins | closed | Ensure project meets hosted Jenkins plugin standards | Go-Live Requirement | See: https://wiki.jenkins-ci.org/display/JENKINS/Hosting+Plugins
**Rename artifact in POM to match Jenkins project conventions**
Using "Fortify-on-Demand-Assessment-Uploader" as the name, will email the Jenkins list to ensure this meets expectations along with other questions related to hosted plugin approval.
**Specify licensing in code**
Currently MIT, should be okay.
**Determine, and specify project owner/contact information**
David? Me? Michael? | 1.0 | Ensure project meets hosted Jenkins plugin standards - See: https://wiki.jenkins-ci.org/display/JENKINS/Hosting+Plugins
**Rename artifact in POM to match Jenkins project conventions**
Using "Fortify-on-Demand-Assessment-Uploader" as the name, will email the Jenkins list to ensure this meets expectations along with other questions related to hosted plugin approval.
**Specify licensing in code**
Currently MIT, should be okay.
**Determine, and specify project owner/contact information**
David? Me? Michael? | non_priority | ensure project meets hosted jenkins plugin standards see rename artifact in pom to match jenkins project conventions using fortify on demand assessment uploader as the name will email the jenkins list to ensure this meets expectations along with other questions related to hosted plugin approval specify licensing in code currently mit should be okay determine and specify project owner contact information david me michael | 0 |
766,614 | 26,891,915,265 | IssuesEvent | 2023-02-06 09:33:51 | fsfe/reuse-tool | https://api.github.com/repos/fsfe/reuse-tool | closed | REUSE under Windows | bug priority/low | While trying to use REUSE tool to check my project, I saw it complains `ModuleNotFoundError: No module named 'pwd'` when running `reuse lint` under my Windows 11 installation (logs below). Or should I open another issue for the Windows supporting question?
`$env:PYTHONUTF8="1"` was set or it will complain `UnicodeDecodeError: 'gbk' codec can't decode byte 0x93 in position 105444: illegal multibyte sequence` when running under a non UTF-8 Windows installation (Simplified Chinese for example). The following are the errors while trying to run `reuse lint`:
```
Traceback (most recent call last):
File "C:\Users\Gary\AppData\Local\Programs\Python\Python38-32\lib\runpy.py", line 194, in _run_module_as_main
return _run_code(code, main_globals, None,
File "C:\Users\Gary\AppData\Local\Programs\Python\Python38-32\lib\runpy.py", line 87, in _run_code
exec(code, run_globals)
File "C:\Users\Gary\AppData\Roaming\Python\Python38\Scripts\reuse.exe\__main__.py", line 4, in <module>
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\reuse\_main.py", line 15, in <module>
from . import (
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\reuse\download.py", line 18, in <module>
from ._util import (
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\reuse\_util.py", line 28, in <module>
from debian.copyright import Copyright
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\debian\copyright.py", line 59, in <module>
from debian import deb822
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\debian\deb822.py", line 321, in <module>
import debian.changelog
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\debian\changelog.py", line 93, in <module>
import pwd
ModuleNotFoundError: No module named 'pwd'
```
| 1.0 | REUSE under Windows - While trying to use REUSE tool to check my project, I saw it complains `ModuleNotFoundError: No module named 'pwd'` when running `reuse lint` under my Windows 11 installation (logs below). Or should I open another issue for the Windows supporting question?
`$env:PYTHONUTF8="1"` was set or it will complain `UnicodeDecodeError: 'gbk' codec can't decode byte 0x93 in position 105444: illegal multibyte sequence` when running under a non UTF-8 Windows installation (Simplified Chinese for example). The following are the errors while trying to run `reuse lint`:
```
Traceback (most recent call last):
File "C:\Users\Gary\AppData\Local\Programs\Python\Python38-32\lib\runpy.py", line 194, in _run_module_as_main
return _run_code(code, main_globals, None,
File "C:\Users\Gary\AppData\Local\Programs\Python\Python38-32\lib\runpy.py", line 87, in _run_code
exec(code, run_globals)
File "C:\Users\Gary\AppData\Roaming\Python\Python38\Scripts\reuse.exe\__main__.py", line 4, in <module>
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\reuse\_main.py", line 15, in <module>
from . import (
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\reuse\download.py", line 18, in <module>
from ._util import (
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\reuse\_util.py", line 28, in <module>
from debian.copyright import Copyright
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\debian\copyright.py", line 59, in <module>
from debian import deb822
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\debian\deb822.py", line 321, in <module>
import debian.changelog
File "C:\Users\Gary\AppData\Roaming\Python\Python38\site-packages\debian\changelog.py", line 93, in <module>
import pwd
ModuleNotFoundError: No module named 'pwd'
```
| priority | reuse under windows while trying to use reuse tool to check my project i saw it complains modulenotfounderror no module named pwd when running reuse lint under my windows installation logs below or should i open another issue for the windows supporting question env was set or it will complain unicodedecodeerror gbk codec can t decode byte in position illegal multibyte sequence when running under a non utf windows installation simplified chinese for example the following are the errors while trying to run reuse lint traceback most recent call last file c users gary appdata local programs python lib runpy py line in run module as main return run code code main globals none file c users gary appdata local programs python lib runpy py line in run code exec code run globals file c users gary appdata roaming python scripts reuse exe main py line in file c users gary appdata roaming python site packages reuse main py line in from import file c users gary appdata roaming python site packages reuse download py line in from util import file c users gary appdata roaming python site packages reuse util py line in from debian copyright import copyright file c users gary appdata roaming python site packages debian copyright py line in from debian import file c users gary appdata roaming python site packages debian py line in import debian changelog file c users gary appdata roaming python site packages debian changelog py line in import pwd modulenotfounderror no module named pwd | 1 |
167,304 | 6,336,406,389 | IssuesEvent | 2017-07-26 21:01:22 | kenzanlabs/react-seed | https://api.github.com/repos/kenzanlabs/react-seed | closed | TypeScript / Babel configuration questions | help wanted priority question | Using the current implementation, just had some questions on usage
https://github.com/kenzanlabs/react-seed/blob/master/tsconfig.json
1. Do we need `ouputDir` if we are using webpack?
1. Why do we have `allowJs` enabled?
1. Why do we need to configure `include` and `exclude`. Isn't that being handled by webpack?
1. What is our intended transpilation strategy? I see we are using babel and typescript loaders? Why do we need both? My expectation is that _.eslintrc_ + _.babelrc_ integrate with our unit test files (.jsx) and _tslint.json_ + tsconfig.json + tslint.json are for use with webpack loader. I think there is some cleanup opportunities here. Just want to make sure it's clear what's for what, and that our usage and intention are just as clear.
1. We can remove the extra `coverageReporters` property in _jest.config.json_
cc: @cxoltero / @thisgeek / @ChrisPlease | 1.0 | TypeScript / Babel configuration questions - Using the current implementation, just had some questions on usage
https://github.com/kenzanlabs/react-seed/blob/master/tsconfig.json
1. Do we need `ouputDir` if we are using webpack?
1. Why do we have `allowJs` enabled?
1. Why do we need to configure `include` and `exclude`. Isn't that being handled by webpack?
1. What is our intended transpilation strategy? I see we are using babel and typescript loaders? Why do we need both? My expectation is that _.eslintrc_ + _.babelrc_ integrate with our unit test files (.jsx) and _tslint.json_ + tsconfig.json + tslint.json are for use with webpack loader. I think there is some cleanup opportunities here. Just want to make sure it's clear what's for what, and that our usage and intention are just as clear.
1. We can remove the extra `coverageReporters` property in _jest.config.json_
cc: @cxoltero / @thisgeek / @ChrisPlease | priority | typescript babel configuration questions using the current implementation just had some questions on usage do we need ouputdir if we are using webpack why do we have allowjs enabled why do we need to configure include and exclude isn t that being handled by webpack what is our intended transpilation strategy i see we are using babel and typescript loaders why do we need both my expectation is that eslintrc babelrc integrate with our unit test files jsx and tslint json tsconfig json tslint json are for use with webpack loader i think there is some cleanup opportunities here just want to make sure it s clear what s for what and that our usage and intention are just as clear we can remove the extra coveragereporters property in jest config json cc cxoltero thisgeek chrisplease | 1 |
250,754 | 21,333,888,790 | IssuesEvent | 2022-04-18 12:15:04 | elastic/kibana | https://api.github.com/repos/elastic/kibana | closed | Performance benchmarking via functional test times on ci | Team:Operations performance loe:hours Feature:CI Feature:Functional Testing impact:needs-assessment | I looked for an existing issue but couldn't find one.
Has anyone on the Ops team looked into tracking functional test completion times, over time, on ci, as a crude way to see if any particular changes may have caused a performance regression?
I had/have a system that does this but it's outside ci so it's difficult to maintain and hasn't been running in months. I would love to see something like this incorporated into ci, and while it's far from perfect, it is better than nothing. Happy to give a walk through of my system if someone would be able to pick this up.
| 1.0 | Performance benchmarking via functional test times on ci - I looked for an existing issue but couldn't find one.
Has anyone on the Ops team looked into tracking functional test completion times, over time, on ci, as a crude way to see if any particular changes may have caused a performance regression?
I had/have a system that does this but it's outside ci so it's difficult to maintain and hasn't been running in months. I would love to see something like this incorporated into ci, and while it's far from perfect, it is better than nothing. Happy to give a walk through of my system if someone would be able to pick this up.
| non_priority | performance benchmarking via functional test times on ci i looked for an existing issue but couldn t find one has anyone on the ops team looked into tracking functional test completion times over time on ci as a crude way to see if any particular changes may have caused a performance regression i had have a system that does this but it s outside ci so it s difficult to maintain and hasn t been running in months i would love to see something like this incorporated into ci and while it s far from perfect it is better than nothing happy to give a walk through of my system if someone would be able to pick this up | 0 |
381,866 | 11,297,033,562 | IssuesEvent | 2020-01-17 04:16:49 | omou-org/mainframe | https://api.github.com/repos/omou-org/mainframe | opened | Separating out Payment Status and Confirmation Status | 3 hours enhancement priority | ## Background
Summit wants to be able to generate sessions in addition to paid sessions. For example, a student has 10 paid sessions, Summit wants an additional 30 sessions to be generated. The additional sessions is so that the receptionist would not schedule a new tutoring/class in that course's time slot, because Summit assumes a student will continue their tutoring course beyond what they've paid for (since it's unreasonable to ask parents to pay for 40 sessions upfront).
## Current Backend Solution
We currently generate 30 sessions in addition to the paid sessions. To mark that these sessions haven't been paid for, we mark the "is_confirmed" attribute as "false."
The issue with this approach is that the "is_confirmed" attribute was designed to track if instructors have confirmed they can attend the session. So this approach would make "is_confirmed" take on 2 meanings: if session is paid for and if session is confirmed by the 2 parties (student & instructor).
## New Backend Solution
1. A new "is_paid" field is added to the payment model
2. When sessions are created, if paid sessions have instructor confirmation will mark "is_paid" and "is_confirmed as true.
- If paid sessions do not have instructor confirmation, "is_paid" will be true, but "is_confirmed" will be false.
- For future unpaid sessions (the 30 additional sessions) that have instructor confirmation, "is_paid" will be false, but "is_confirmed" will be true | 1.0 | Separating out Payment Status and Confirmation Status - ## Background
Summit wants to be able to generate sessions in addition to paid sessions. For example, a student has 10 paid sessions, Summit wants an additional 30 sessions to be generated. The additional sessions is so that the receptionist would not schedule a new tutoring/class in that course's time slot, because Summit assumes a student will continue their tutoring course beyond what they've paid for (since it's unreasonable to ask parents to pay for 40 sessions upfront).
## Current Backend Solution
We currently generate 30 sessions in addition to the paid sessions. To mark that these sessions haven't been paid for, we mark the "is_confirmed" attribute as "false."
The issue with this approach is that the "is_confirmed" attribute was designed to track if instructors have confirmed they can attend the session. So this approach would make "is_confirmed" take on 2 meanings: if session is paid for and if session is confirmed by the 2 parties (student & instructor).
## New Backend Solution
1. A new "is_paid" field is added to the payment model
2. When sessions are created, if paid sessions have instructor confirmation will mark "is_paid" and "is_confirmed as true.
- If paid sessions do not have instructor confirmation, "is_paid" will be true, but "is_confirmed" will be false.
- For future unpaid sessions (the 30 additional sessions) that have instructor confirmation, "is_paid" will be false, but "is_confirmed" will be true | priority | separating out payment status and confirmation status background summit wants to be able to generate sessions in addition to paid sessions for example a student has paid sessions summit wants an additional sessions to be generated the additional sessions is so that the receptionist would not schedule a new tutoring class in that course s time slot because summit assumes a student will continue their tutoring course beyond what they ve paid for since it s unreasonable to ask parents to pay for sessions upfront current backend solution we currently generate sessions in addition to the paid sessions to mark that these sessions haven t been paid for we mark the is confirmed attribute as false the issue with this approach is that the is confirmed attribute was designed to track if instructors have confirmed they can attend the session so this approach would make is confirmed take on meanings if session is paid for and if session is confirmed by the parties student instructor new backend solution a new is paid field is added to the payment model when sessions are created if paid sessions have instructor confirmation will mark is paid and is confirmed as true if paid sessions do not have instructor confirmation is paid will be true but is confirmed will be false for future unpaid sessions the additional sessions that have instructor confirmation is paid will be false but is confirmed will be true | 1 |
190,429 | 22,065,725,730 | IssuesEvent | 2022-05-31 02:46:27 | Seagate/cortx-rgw | https://api.github.com/repos/Seagate/cortx-rgw | closed | CVE-2022-24771 (High) detected in node-forge-0.10.0.tgz | security vulnerability | ## CVE-2022-24771 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.10.0.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.10.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.10.0.tgz</a></p>
<p>Path to dependency file: /src/pybind/mgr/dashboard/frontend/package.json</p>
<p>Path to vulnerable library: /src/pybind/mgr/dashboard/frontend/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-12.2.13.tgz (Root Library)
- webpack-dev-server-3.11.2.tgz
- selfsigned-1.10.11.tgz
- :x: **node-forge-0.10.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Seagate/cortx-rgw/commit/aa78617d024ccd26801e43c6980f939cf8bded5f">aa78617d024ccd26801e43c6980f939cf8bded5f</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
<p>Publish Date: 2022-03-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24771>CVE-2022-24771</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24771</a></p>
<p>Release Date: 2022-03-18</p>
<p>Fix Resolution (node-forge): 1.3.0</p>
<p>Direct dependency fix Resolution (@angular-devkit/build-angular): 13.3.3</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"@angular-devkit/build-angular","packageVersion":"12.2.13","packageFilePaths":["/src/pybind/mgr/dashboard/frontend/package.json"],"isTransitiveDependency":false,"dependencyTree":"@angular-devkit/build-angular:12.2.13","isMinimumFixVersionAvailable":true,"minimumFixVersion":"13.3.3","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2022-24771","vulnerabilityDetails":"Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24771","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2022-24771 (High) detected in node-forge-0.10.0.tgz - ## CVE-2022-24771 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.10.0.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.10.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.10.0.tgz</a></p>
<p>Path to dependency file: /src/pybind/mgr/dashboard/frontend/package.json</p>
<p>Path to vulnerable library: /src/pybind/mgr/dashboard/frontend/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-12.2.13.tgz (Root Library)
- webpack-dev-server-3.11.2.tgz
- selfsigned-1.10.11.tgz
- :x: **node-forge-0.10.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Seagate/cortx-rgw/commit/aa78617d024ccd26801e43c6980f939cf8bded5f">aa78617d024ccd26801e43c6980f939cf8bded5f</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
<p>Publish Date: 2022-03-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24771>CVE-2022-24771</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24771">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24771</a></p>
<p>Release Date: 2022-03-18</p>
<p>Fix Resolution (node-forge): 1.3.0</p>
<p>Direct dependency fix Resolution (@angular-devkit/build-angular): 13.3.3</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"@angular-devkit/build-angular","packageVersion":"12.2.13","packageFilePaths":["/src/pybind/mgr/dashboard/frontend/package.json"],"isTransitiveDependency":false,"dependencyTree":"@angular-devkit/build-angular:12.2.13","isMinimumFixVersionAvailable":true,"minimumFixVersion":"13.3.3","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2022-24771","vulnerabilityDetails":"Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24771","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in node forge tgz cve high severity vulnerability vulnerable library node forge tgz javascript implementations of network transports cryptography ciphers pki message digests and various utilities library home page a href path to dependency file src pybind mgr dashboard frontend package json path to vulnerable library src pybind mgr dashboard frontend node modules node forge package json dependency hierarchy build angular tgz root library webpack dev server tgz selfsigned tgz x node forge tgz vulnerable library found in head commit a href found in base branch main vulnerability details forge also called node forge is a native implementation of transport layer security in javascript prior to version rsa pkcs signature verification code is lenient in checking the digest algorithm structure this can allow a crafted structure that steals padding bytes and uses unchecked portion of the pkcs encoded message to forge a signature when a low public exponent is being used the issue has been addressed in node forge version there are currently no known workarounds publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution node forge direct dependency fix resolution angular devkit build angular rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree angular devkit build angular isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails forge also called node forge is a native implementation of transport layer security in javascript prior to version rsa pkcs signature verification code is lenient in checking the digest algorithm structure this can allow a crafted structure that steals padding bytes and uses unchecked portion of the pkcs encoded message to forge a signature when a low public exponent is being used the issue has been addressed in node forge version there are currently no known workarounds vulnerabilityurl | 0 |
129,165 | 5,089,546,113 | IssuesEvent | 2017-01-01 17:54:50 | HabitRPG/habitica | https://api.github.com/repos/HabitRPG/habitica | closed | Party Up and Party On achievements are missing text | priority: medium status: issue: help welcome now | _From thebat137 (dea8a9e8-c084-438a-9a14-7fe96a73fd0a) in the Report a Bug guild:_
I was just looking at my achievements list and I noticed that the hovertext for the "Party Up" and "Party On" achievements seems to be missing. Hovering over the icons just says "Party Up/partyUpText not found" and "Party On/partyOnText not found" (where the slash in those quotes is meant to represent a linebreak). I have received the Party Up achievement, but not the Party On achievement, so the problem seems to be independent of awarded/not awarded status.
_From Cequinne (a9b44f7f-08b3-4ecb-97c2-d2855eed4e20):_
Hovering over the "Party Up" and "Party On" achievement badges shows "String 'partyUpText' not found" or "String 'partyOnText' not found" respectively in the description.
| 1.0 | Party Up and Party On achievements are missing text - _From thebat137 (dea8a9e8-c084-438a-9a14-7fe96a73fd0a) in the Report a Bug guild:_
I was just looking at my achievements list and I noticed that the hovertext for the "Party Up" and "Party On" achievements seems to be missing. Hovering over the icons just says "Party Up/partyUpText not found" and "Party On/partyOnText not found" (where the slash in those quotes is meant to represent a linebreak). I have received the Party Up achievement, but not the Party On achievement, so the problem seems to be independent of awarded/not awarded status.
_From Cequinne (a9b44f7f-08b3-4ecb-97c2-d2855eed4e20):_
Hovering over the "Party Up" and "Party On" achievement badges shows "String 'partyUpText' not found" or "String 'partyOnText' not found" respectively in the description.
| priority | party up and party on achievements are missing text from in the report a bug guild i was just looking at my achievements list and i noticed that the hovertext for the party up and party on achievements seems to be missing hovering over the icons just says party up partyuptext not found and party on partyontext not found where the slash in those quotes is meant to represent a linebreak i have received the party up achievement but not the party on achievement so the problem seems to be independent of awarded not awarded status from cequinne hovering over the party up and party on achievement badges shows string partyuptext not found or string partyontext not found respectively in the description | 1 |
612,723 | 19,029,896,906 | IssuesEvent | 2021-11-24 09:34:11 | DimensionDev/Maskbook | https://api.github.com/repos/DimensionDev/Maskbook | opened | [Bug] Decrypt image payload not work | Priority: P0 (Emergency) Type: Bug | ## Bug Info
### How to reproduce?
https://twitter.com/AinuxA/status/1463438363952771077
### What happened?
### What should happen?
## Environment
### Mask Version:
- [ ] (Browser) Installed from the extension store (version: )
- [ ] (App) Installed from the app store (version: )
- [ ] master branch
- [x] Build of version/commit hash: develop
(Please write down build command/flags if there is anything special)
### System
<!-- Correct the version if it is not the case -->
- [ ] Windows 10
- [x] Mac OS X Catalina
- [ ] Linux: <!-- What distro? -->
### Platform/Browser
<!-- Correct the version if it is not the case -->
- [x] Latest Chrome (stable channel)
- [ ] Latest Firefox (stable channel)
- [ ] Android 11
- [ ] iOS 14
| 1.0 | [Bug] Decrypt image payload not work - ## Bug Info
### How to reproduce?
https://twitter.com/AinuxA/status/1463438363952771077
### What happened?
### What should happen?
## Environment
### Mask Version:
- [ ] (Browser) Installed from the extension store (version: )
- [ ] (App) Installed from the app store (version: )
- [ ] master branch
- [x] Build of version/commit hash: develop
(Please write down build command/flags if there is anything special)
### System
<!-- Correct the version if it is not the case -->
- [ ] Windows 10
- [x] Mac OS X Catalina
- [ ] Linux: <!-- What distro? -->
### Platform/Browser
<!-- Correct the version if it is not the case -->
- [x] Latest Chrome (stable channel)
- [ ] Latest Firefox (stable channel)
- [ ] Android 11
- [ ] iOS 14
| priority | decrypt image payload not work bug info how to reproduce what happened what should happen environment mask version browser installed from the extension store version app installed from the app store version master branch build of version commit hash develop please write down build command flags if there is anything special system windows mac os x catalina linux platform browser latest chrome stable channel latest firefox stable channel android ios | 1 |
608,715 | 18,846,816,904 | IssuesEvent | 2021-11-11 15:48:28 | dita-ot/dita-ot | https://api.github.com/repos/dita-ot/dita-ot | closed | Empty param in project.xml causes Error: null | bug priority/medium project | ## Expected Behavior
Running
`dita.bat --project=project.xml --verbose --debug`
When a param in the project.xml is empty and this is not allowed (is it?), the error message should describe what the problem is
## Actual Behavior
Running the above command returns:
```
Searching for integrator.xml ...
Error: null
```
## Steps to Reproduce
In the project.xml, in `<deliverable> -> <publication>`, provide an empty param:
` <param name="the_name_of_the_param" value=""/>`
## Environment
* DITA-OT version: 3.6.1
* Operating system and version: Windows
* How did you run DITA-OT? dita.bat
* Transformation type: custom
| 1.0 | Empty param in project.xml causes Error: null - ## Expected Behavior
Running
`dita.bat --project=project.xml --verbose --debug`
When a param in the project.xml is empty and this is not allowed (is it?), the error message should describe what the problem is
## Actual Behavior
Running the above command returns:
```
Searching for integrator.xml ...
Error: null
```
## Steps to Reproduce
In the project.xml, in `<deliverable> -> <publication>`, provide an empty param:
` <param name="the_name_of_the_param" value=""/>`
## Environment
* DITA-OT version: 3.6.1
* Operating system and version: Windows
* How did you run DITA-OT? dita.bat
* Transformation type: custom
| priority | empty param in project xml causes error null expected behavior running dita bat project project xml verbose debug when a param in the project xml is empty and this is not allowed is it the error message should describe what the problem is actual behavior running the above command returns searching for integrator xml error null steps to reproduce in the project xml in provide an empty param environment dita ot version operating system and version windows how did you run dita ot dita bat transformation type custom | 1 |
813,660 | 30,465,927,170 | IssuesEvent | 2023-07-17 10:21:18 | code4romania/crestem-ong | https://api.github.com/repos/code4romania/crestem-ong | opened | [Registration] change 'Judeศ' and 'Localitate' fields type | medium-priority | In the [registration form ](https://app.crestem.ong/register), the fields 'Judeศ' and Localitate' are text input. Change field types from text input to single select. | 1.0 | [Registration] change 'Judeศ' and 'Localitate' fields type - In the [registration form ](https://app.crestem.ong/register), the fields 'Judeศ' and Localitate' are text input. Change field types from text input to single select. | priority | change judeศ and localitate fields type in the the fields judeศ and localitate are text input change field types from text input to single select | 1 |
7,584 | 4,016,103,004 | IssuesEvent | 2016-05-15 11:24:35 | manjaro/manjaro-tools | https://api.github.com/repos/manjaro/manjaro-tools | opened | I switch kinda doesn't work | buildpkg | If I check **mkchrootpkg** I find this line: `[[ ! -f PKGBUILD && -z "${install_pkgs[*]}" ]] && die 'This must be run in a directory containing a PKGBUILD.'`. So we have to recheck that option on how we want to use it. I suggest it like this:
`buildpkg -p kpmcore-dev -i`
This will say to **buildpkg** that I want to build it, install it to the chroot and then move it to the cache dir. We can use some like `pacman -U kpmcore-dev-<VERSION>*z -r <PATH/TO/CHROOT>`. | 1.0 | I switch kinda doesn't work - If I check **mkchrootpkg** I find this line: `[[ ! -f PKGBUILD && -z "${install_pkgs[*]}" ]] && die 'This must be run in a directory containing a PKGBUILD.'`. So we have to recheck that option on how we want to use it. I suggest it like this:
`buildpkg -p kpmcore-dev -i`
This will say to **buildpkg** that I want to build it, install it to the chroot and then move it to the cache dir. We can use some like `pacman -U kpmcore-dev-<VERSION>*z -r <PATH/TO/CHROOT>`. | non_priority | i switch kinda doesn t work if i check mkchrootpkg i find this line die this must be run in a directory containing a pkgbuild so we have to recheck that option on how we want to use it i suggest it like this buildpkg p kpmcore dev i this will say to buildpkg that i want to build it install it to the chroot and then move it to the cache dir we can use some like pacman u kpmcore dev z r | 0 |
279,026 | 30,702,437,458 | IssuesEvent | 2023-07-27 01:30:09 | artsking/packages_apps_settings_10.0.0_r33 | https://api.github.com/repos/artsking/packages_apps_settings_10.0.0_r33 | reopened | CVE-2022-20350 (Medium) detected in Settingsandroid-10.0.0_r44 | Mend: dependency security vulnerability | ## CVE-2022-20350 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Settingsandroid-10.0.0_r44</b></p></summary>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/packages/apps/Settings>https://android.googlesource.com/platform/packages/apps/Settings</a></p>
<p>Found in HEAD commit: <a href="https://github.com/artsking/packages_apps_settings_10.0.0_r33/commit/081b5699d08adc751bd29d01eff86bb13c550019">081b5699d08adc751bd29d01eff86bb13c550019</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/src/com/android/settings/notification/NotificationAccessConfirmationActivity.java</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In onCreate of NotificationAccessConfirmationActivity.java, there is a possible way to trick the victim to grant notification access to the wrong app due to improper input validation. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-228178437
<p>Publish Date: 2022-08-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-20350>CVE-2022-20350</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-20350 (Medium) detected in Settingsandroid-10.0.0_r44 - ## CVE-2022-20350 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Settingsandroid-10.0.0_r44</b></p></summary>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/packages/apps/Settings>https://android.googlesource.com/platform/packages/apps/Settings</a></p>
<p>Found in HEAD commit: <a href="https://github.com/artsking/packages_apps_settings_10.0.0_r33/commit/081b5699d08adc751bd29d01eff86bb13c550019">081b5699d08adc751bd29d01eff86bb13c550019</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/src/com/android/settings/notification/NotificationAccessConfirmationActivity.java</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In onCreate of NotificationAccessConfirmationActivity.java, there is a possible way to trick the victim to grant notification access to the wrong app due to improper input validation. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-228178437
<p>Publish Date: 2022-08-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-20350>CVE-2022-20350</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in settingsandroid cve medium severity vulnerability vulnerable library settingsandroid library home page a href found in head commit a href found in base branch master vulnerable source files src com android settings notification notificationaccessconfirmationactivity java vulnerability details in oncreate of notificationaccessconfirmationactivity java there is a possible way to trick the victim to grant notification access to the wrong app due to improper input validation this could lead to local information disclosure with user execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href step up your open source security game with mend | 0 |
25,185 | 24,857,536,434 | IssuesEvent | 2022-10-27 04:40:04 | home-climate-control/dz | https://api.github.com/repos/home-climate-control/dz | opened | Swing Console: Celsius/Fahrenheit switch breaks the layout | bug Swing usability Fahrenheit reactive | ### Expected Behavior
Switch from Celsius to Fahrenheit shouldn't change anything other than temperature display.
### Actual Behavior
Zone cell height is significantly reduced, and restored only when switched back to Celsius. | True | Swing Console: Celsius/Fahrenheit switch breaks the layout - ### Expected Behavior
Switch from Celsius to Fahrenheit shouldn't change anything other than temperature display.
### Actual Behavior
Zone cell height is significantly reduced, and restored only when switched back to Celsius. | non_priority | swing console celsius fahrenheit switch breaks the layout expected behavior switch from celsius to fahrenheit shouldn t change anything other than temperature display actual behavior zone cell height is significantly reduced and restored only when switched back to celsius | 0 |
448,364 | 31,790,190,366 | IssuesEvent | 2023-09-13 02:13:26 | usnistgov/NRSS | https://api.github.com/repos/usnistgov/NRSS | opened | Docs to NIST Pages | documentation enhancement | - Transition docs to NIST Pages + enhancements
- Regenerate Autodocs for API reference | 1.0 | Docs to NIST Pages - - Transition docs to NIST Pages + enhancements
- Regenerate Autodocs for API reference | non_priority | docs to nist pages transition docs to nist pages enhancements regenerate autodocs for api reference | 0 |
610,260 | 18,901,826,774 | IssuesEvent | 2021-11-16 02:27:28 | brave/brave-browser | https://api.github.com/repos/brave/brave-browser | closed | Hide A-C section in Rewards settings on `brave://settings` when region is JP | release/blocking feature/rewards priority/P2 QA/Yes release-notes/include feature/settings OS/Desktop | ## Description
Since A-C is not available in JP region at this time, hide the A-C section in Brave Rewards settings on `brave://settings` when region is JP (using same rules/conditions as how we do it on brave://rewards settings page). | 1.0 | Hide A-C section in Rewards settings on `brave://settings` when region is JP - ## Description
Since A-C is not available in JP region at this time, hide the A-C section in Brave Rewards settings on `brave://settings` when region is JP (using same rules/conditions as how we do it on brave://rewards settings page). | priority | hide a c section in rewards settings on brave settings when region is jp description since a c is not available in jp region at this time hide the a c section in brave rewards settings on brave settings when region is jp using same rules conditions as how we do it on brave rewards settings page | 1 |
300,716 | 9,211,975,223 | IssuesEvent | 2019-03-09 19:57:26 | zephyrproject-rtos/zephyr | https://api.github.com/repos/zephyrproject-rtos/zephyr | closed | tests/lib/mem_alloc/testcase.yaml#libraries.libc.minimal: Bus fault at test_malloc | area: Memory Protection bug platform: NXP priority: high | **To Reproduce**
Steps to reproduce the behavior:
1. mkdir build; cd build
2. cmake -DBOARD=frdm_k64f -DARCH=arm ..
3. make
4. make run
**Screenshots or console output**
```
******** delaying boot 1000ms (per build configuration) *****
***** Booting Zephyr OS v1.14.0-rc1-248-gd5b2834f58 (delayed boot 1000ms) *****
Running test suite test_c_lib_dynamic_memalloc
===================================================================
starting test - test_malloc
***** BUS FAULT *****
Precise data bus error
BFAR Address: 0x20001158
NXP MPU error, port 3
Mode: User, Data Address: 0x20001158
Type: Read, Master: 0, Regions: 0x8800
***** Hardware exception *****
Current thread ID = 0x20000b3c
Faulting instruction address = 0x7ee
Fatal fault in thread 0x20000b3c! Aborting.
```
**Environment (please complete the following information):**
- OS: fedora29
- Toolchain: zephyr
- Commit SHA or Version used: d5b2834f58e11b59c640f00f3f2ca2fb85d3a48c
| 1.0 | tests/lib/mem_alloc/testcase.yaml#libraries.libc.minimal: Bus fault at test_malloc - **To Reproduce**
Steps to reproduce the behavior:
1. mkdir build; cd build
2. cmake -DBOARD=frdm_k64f -DARCH=arm ..
3. make
4. make run
**Screenshots or console output**
```
******** delaying boot 1000ms (per build configuration) *****
***** Booting Zephyr OS v1.14.0-rc1-248-gd5b2834f58 (delayed boot 1000ms) *****
Running test suite test_c_lib_dynamic_memalloc
===================================================================
starting test - test_malloc
***** BUS FAULT *****
Precise data bus error
BFAR Address: 0x20001158
NXP MPU error, port 3
Mode: User, Data Address: 0x20001158
Type: Read, Master: 0, Regions: 0x8800
***** Hardware exception *****
Current thread ID = 0x20000b3c
Faulting instruction address = 0x7ee
Fatal fault in thread 0x20000b3c! Aborting.
```
**Environment (please complete the following information):**
- OS: fedora29
- Toolchain: zephyr
- Commit SHA or Version used: d5b2834f58e11b59c640f00f3f2ca2fb85d3a48c
| priority | tests lib mem alloc testcase yaml libraries libc minimal bus fault at test malloc to reproduce steps to reproduce the behavior mkdir build cd build cmake dboard frdm darch arm make make run screenshots or console output delaying boot per build configuration booting zephyr os delayed boot running test suite test c lib dynamic memalloc starting test test malloc bus fault precise data bus error bfar address nxp mpu error port mode user data address type read master regions hardware exception current thread id faulting instruction address fatal fault in thread aborting environment please complete the following information os toolchain zephyr commit sha or version used | 1 |
676,006 | 23,113,162,328 | IssuesEvent | 2022-07-27 14:33:38 | kubernetes/ingress-nginx | https://api.github.com/repos/kubernetes/ingress-nginx | closed | ingress communication issues | kind/support needs-triage needs-priority | Need you support on below issues, when we kubectl logs -f -n ingress-basic xxxxxxxxxx, i got below error
Service "default/xxxxx" does not have any active Endpoint. | 1.0 | ingress communication issues - Need you support on below issues, when we kubectl logs -f -n ingress-basic xxxxxxxxxx, i got below error
Service "default/xxxxx" does not have any active Endpoint. | priority | ingress communication issues need you support on below issues when we kubectl logs f n ingress basic xxxxxxxxxx i got below error service default xxxxx does not have any active endpoint | 1 |
22,590 | 3,791,129,643 | IssuesEvent | 2016-03-22 00:43:19 | codeforamerica/joblint | https://api.github.com/repos/codeforamerica/joblint | opened | Come up with prompts for job posting tool | Design | Create a set of prompts that can guide an employer to create a good/fair job positing.
Current design is side-by side boxes, basically an expansion of the existing tool, so keep this in mind.
This issue originally created by @pacarole as codeforamerica/nola-2016-fellows#55. | 1.0 | Come up with prompts for job posting tool - Create a set of prompts that can guide an employer to create a good/fair job positing.
Current design is side-by side boxes, basically an expansion of the existing tool, so keep this in mind.
This issue originally created by @pacarole as codeforamerica/nola-2016-fellows#55. | non_priority | come up with prompts for job posting tool create a set of prompts that can guide an employer to create a good fair job positing current design is side by side boxes basically an expansion of the existing tool so keep this in mind this issue originally created by pacarole as codeforamerica nola fellows | 0 |
216,657 | 16,664,847,669 | IssuesEvent | 2021-06-07 00:36:07 | Neos-Metaverse/NeosPublic | https://api.github.com/repos/Neos-Metaverse/NeosPublic | opened | NeosBot - CloudVariable argument documentation | Documentation | ## Where have you searched for this information before making this issue?
ProbablePrime's videos, the wiki, #questions-help and bunch of other users.
The bot commands are not well documented and need more of it to make it easier to understand for the "normal" user rather than just staff.
I'm also well aware that these commands are only until we get a proper interface. Though until then I'd like to still document it into the wiki for easier user experience for others who run into the same issues.
## Which part of the system do you need information on?
The extend that the NeosBot (Contact) needs the cloudvariable argument.
Ergo if I try to make
_/createGroupVar G-Exitian Test.Path1_
the bot accepts it. But if I tried
_/createGroupVar G-Exitian Test.Path1 string:8192_
the bot yells at me with "Invalid" argument.
Having more info on what the bot **exactly** accepts and rejects would be nice.
## What information do you need to know?
What does the bot accept and what does it reject?
Does it accept only certain "variants" of creating variables?
## Do you plan to format and contribute the provided information to Wiki?
Ofcourse. It'll be added to the CloudVariable page.
https://wiki.neos.com/Cloud_Variables | 1.0 | NeosBot - CloudVariable argument documentation - ## Where have you searched for this information before making this issue?
ProbablePrime's videos, the wiki, #questions-help and bunch of other users.
The bot commands are not well documented and need more of it to make it easier to understand for the "normal" user rather than just staff.
I'm also well aware that these commands are only until we get a proper interface. Though until then I'd like to still document it into the wiki for easier user experience for others who run into the same issues.
## Which part of the system do you need information on?
The extend that the NeosBot (Contact) needs the cloudvariable argument.
Ergo if I try to make
_/createGroupVar G-Exitian Test.Path1_
the bot accepts it. But if I tried
_/createGroupVar G-Exitian Test.Path1 string:8192_
the bot yells at me with "Invalid" argument.
Having more info on what the bot **exactly** accepts and rejects would be nice.
## What information do you need to know?
What does the bot accept and what does it reject?
Does it accept only certain "variants" of creating variables?
## Do you plan to format and contribute the provided information to Wiki?
Ofcourse. It'll be added to the CloudVariable page.
https://wiki.neos.com/Cloud_Variables | non_priority | neosbot cloudvariable argument documentation where have you searched for this information before making this issue probableprime s videos the wiki questions help and bunch of other users the bot commands are not well documented and need more of it to make it easier to understand for the normal user rather than just staff i m also well aware that these commands are only until we get a proper interface though until then i d like to still document it into the wiki for easier user experience for others who run into the same issues which part of the system do you need information on the extend that the neosbot contact needs the cloudvariable argument ergo if i try to make creategroupvar g exitian test the bot accepts it but if i tried creategroupvar g exitian test string the bot yells at me with invalid argument having more info on what the bot exactly accepts and rejects would be nice what information do you need to know what does the bot accept and what does it reject does it accept only certain variants of creating variables do you plan to format and contribute the provided information to wiki ofcourse it ll be added to the cloudvariable page | 0 |
335,750 | 10,165,943,103 | IssuesEvent | 2019-08-07 14:51:03 | BookStackApp/BookStack | https://api.github.com/repos/BookStackApp/BookStack | closed | Users can modify their profiles and pretend they're someone else | :lock: Security :rocket: Priority | **Describe the bug**
Any user can impersonate anyone else on the wiki.
A user (attacker) register using his own mail address, email confirmation is activated so he click on the link in a mail he received. He can then change his First Name, Last Name, profile picture to make it seems he's someone else... That far it's fine because we can still see his mail address.
But then... the user can change his mail and no mail confirmation is sent.
Because of that, an attacker can also use a mail that doesn't exist. My mail contains an "l" but the attacker can replace it by an "I" ("i" uppercase).
Moreover, the domain restriction doesn't apply when changing mail. I think this is expected behavior but this is still a problem in my opinion.
Which means the user can say he's the CEO...
**Steps To Reproduce**
Steps to reproduce the behavior:
1. Register using an real mail address
2. Confirm Registration by clinking the link in the received mail
3. Change the mail of the user (the mail doesn't have to really exist) - no confirmation mail is sent
4. User can pretend his someone else
**Expected behavior**
When changing mail, a mail confirmation should be sent no matter what.
**Your Configuration (please complete the following information):**
- Exact BookStack Version (Found in settings): BookStack v0.26.2
- PHP Version: v7.2.19
- Hosting Method (Nginx/Apache/Docker): Nginx on Ubuntu 18.04
| 1.0 | Users can modify their profiles and pretend they're someone else - **Describe the bug**
Any user can impersonate anyone else on the wiki.
A user (attacker) register using his own mail address, email confirmation is activated so he click on the link in a mail he received. He can then change his First Name, Last Name, profile picture to make it seems he's someone else... That far it's fine because we can still see his mail address.
But then... the user can change his mail and no mail confirmation is sent.
Because of that, an attacker can also use a mail that doesn't exist. My mail contains an "l" but the attacker can replace it by an "I" ("i" uppercase).
Moreover, the domain restriction doesn't apply when changing mail. I think this is expected behavior but this is still a problem in my opinion.
Which means the user can say he's the CEO...
**Steps To Reproduce**
Steps to reproduce the behavior:
1. Register using an real mail address
2. Confirm Registration by clinking the link in the received mail
3. Change the mail of the user (the mail doesn't have to really exist) - no confirmation mail is sent
4. User can pretend his someone else
**Expected behavior**
When changing mail, a mail confirmation should be sent no matter what.
**Your Configuration (please complete the following information):**
- Exact BookStack Version (Found in settings): BookStack v0.26.2
- PHP Version: v7.2.19
- Hosting Method (Nginx/Apache/Docker): Nginx on Ubuntu 18.04
| priority | users can modify their profiles and pretend they re someone else describe the bug any user can impersonate anyone else on the wiki a user attacker register using his own mail address email confirmation is activated so he click on the link in a mail he received he can then change his first name last name profile picture to make it seems he s someone else that far it s fine because we can still see his mail address but then the user can change his mail and no mail confirmation is sent because of that an attacker can also use a mail that doesn t exist my mail contains an l but the attacker can replace it by an i i uppercase moreover the domain restriction doesn t apply when changing mail i think this is expected behavior but this is still a problem in my opinion which means the user can say he s the ceo steps to reproduce steps to reproduce the behavior register using an real mail address confirm registration by clinking the link in the received mail change the mail of the user the mail doesn t have to really exist no confirmation mail is sent user can pretend his someone else expected behavior when changing mail a mail confirmation should be sent no matter what your configuration please complete the following information exact bookstack version found in settings bookstack php version hosting method nginx apache docker nginx on ubuntu | 1 |
137,306 | 30,667,100,384 | IssuesEvent | 2023-07-25 19:09:56 | h4sh5/pypi-auto-scanner | https://api.github.com/repos/h4sh5/pypi-auto-scanner | opened | hpfrec 0.2.10 has 1 GuardDog issues | guarddog code-execution | https://pypi.org/project/hpfrec
https://inspector.pypi.io/project/hpfrec
```{
"dependency": "hpfrec",
"version": "0.2.10",
"result": {
"issues": 1,
"errors": {},
"results": {
"code-execution": [
{
"location": "hpfrec-0.2.10/setup.py:197",
"code": " val = subprocess.run(cmd + comm + [fname], capture_output=silent_tests).returncode",
"message": "This package is executing OS commands in the setup.py file"
}
]
},
"path": "/tmp/tmptxrk_78m/hpfrec"
}
}``` | 1.0 | hpfrec 0.2.10 has 1 GuardDog issues - https://pypi.org/project/hpfrec
https://inspector.pypi.io/project/hpfrec
```{
"dependency": "hpfrec",
"version": "0.2.10",
"result": {
"issues": 1,
"errors": {},
"results": {
"code-execution": [
{
"location": "hpfrec-0.2.10/setup.py:197",
"code": " val = subprocess.run(cmd + comm + [fname], capture_output=silent_tests).returncode",
"message": "This package is executing OS commands in the setup.py file"
}
]
},
"path": "/tmp/tmptxrk_78m/hpfrec"
}
}``` | non_priority | hpfrec has guarddog issues dependency hpfrec version result issues errors results code execution location hpfrec setup py code val subprocess run cmd comm capture output silent tests returncode message this package is executing os commands in the setup py file path tmp tmptxrk hpfrec | 0 |
16,955 | 3,586,835,866 | IssuesEvent | 2016-01-30 00:21:08 | rancher/rancher | https://api.github.com/repos/rancher/rancher | closed | Graphs are receiving data every 5 seconds but showing every second | area/container area/host area/ui kind/bug release/v1.0.0 status/resolved status/to-test | version - master jan 07
Steps:
1. Create a host or a container
2. Click on host name or container name
Results: Data points coming in every 5 seconds but graphs are showing for every second

Expected: Show points every 5 seconds and slow down how fast it's coming across (right now it's very difficult to mouse over a point because it's going by so quickly) | 1.0 | Graphs are receiving data every 5 seconds but showing every second - version - master jan 07
Steps:
1. Create a host or a container
2. Click on host name or container name
Results: Data points coming in every 5 seconds but graphs are showing for every second

Expected: Show points every 5 seconds and slow down how fast it's coming across (right now it's very difficult to mouse over a point because it's going by so quickly) | non_priority | graphs are receiving data every seconds but showing every second version master jan steps create a host or a container click on host name or container name results data points coming in every seconds but graphs are showing for every second expected show points every seconds and slow down how fast it s coming across right now it s very difficult to mouse over a point because it s going by so quickly | 0 |
251,048 | 7,998,030,306 | IssuesEvent | 2018-07-21 04:45:52 | Repair-DeskPOS/RepairDesk-BUGS-IMPROVEMENTS | https://api.github.com/repos/Repair-DeskPOS/RepairDesk-BUGS-IMPROVEMENTS | closed | Multiple SKU - Uniqueness Validation Required | Medium Priority Resolved bug inventory | I'm also encountering an annoying bug with multi-SKUs that I'll publish to the GitHub repo soon if I don't forget. A lot of items are saying the SKU is existing already while a few are allowing me to add the specific SKU. e.g. iPhone 6 screen has had SKU 1234 for Sentrix, I go to add multiple SKUs and add Sentrix 1234 for that same item that has existed, says SKU exists already. However a few other items allow me to add it and some don't. Super weird. Haha | 1.0 | Multiple SKU - Uniqueness Validation Required - I'm also encountering an annoying bug with multi-SKUs that I'll publish to the GitHub repo soon if I don't forget. A lot of items are saying the SKU is existing already while a few are allowing me to add the specific SKU. e.g. iPhone 6 screen has had SKU 1234 for Sentrix, I go to add multiple SKUs and add Sentrix 1234 for that same item that has existed, says SKU exists already. However a few other items allow me to add it and some don't. Super weird. Haha | priority | multiple sku uniqueness validation required i m also encountering an annoying bug with multi skus that i ll publish to the github repo soon if i don t forget a lot of items are saying the sku is existing already while a few are allowing me to add the specific sku e g iphone screen has had sku for sentrix i go to add multiple skus and add sentrix for that same item that has existed says sku exists already however a few other items allow me to add it and some don t super weird haha | 1 |
818,521 | 30,693,473,844 | IssuesEvent | 2023-07-26 16:44:34 | ianarawjo/ChainForge | https://api.github.com/repos/ianarawjo/ChainForge | closed | Add Chat Turn Nodes | high priority future feature | This is the current major push for the next release, and related to a previous issue. It involves substantial changes across the front and backends of the app to support passing โchat historyโ on response objects and in the cache.
This feature is being prioritized as several pilot users hinted at wanting it, in addition to an original issue raised here. | 1.0 | Add Chat Turn Nodes - This is the current major push for the next release, and related to a previous issue. It involves substantial changes across the front and backends of the app to support passing โchat historyโ on response objects and in the cache.
This feature is being prioritized as several pilot users hinted at wanting it, in addition to an original issue raised here. | priority | add chat turn nodes this is the current major push for the next release and related to a previous issue it involves substantial changes across the front and backends of the app to support passing โchat historyโ on response objects and in the cache this feature is being prioritized as several pilot users hinted at wanting it in addition to an original issue raised here | 1 |
447,892 | 12,906,796,571 | IssuesEvent | 2020-07-15 02:50:12 | tutorbookapp/tutorbook | https://api.github.com/repos/tutorbookapp/tutorbook | opened | Make subjects editable in "People" dashboard | category:front-end priority:p2 type:enhancement | **Is your feature request related to a problem? Please describe.**
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
Orgs cannot edit their user's mentoring or tutoring subjects. We'll need that functionality in order to close #87.
**Describe the solution you'd like**
A clear and concise description of what you want to happen.
We should:
1. Update the `Select` component to support the normal `TextField` variant (i.e. non-outlined... the one with the line ripple that's being used in our `DataTable`).
2. Replace the "Mentoring subjects" and "Tutoring subjects" text in the "People" dashboard `DataTable` with those normal `SubjectSelect` variants. | 1.0 | Make subjects editable in "People" dashboard - **Is your feature request related to a problem? Please describe.**
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
Orgs cannot edit their user's mentoring or tutoring subjects. We'll need that functionality in order to close #87.
**Describe the solution you'd like**
A clear and concise description of what you want to happen.
We should:
1. Update the `Select` component to support the normal `TextField` variant (i.e. non-outlined... the one with the line ripple that's being used in our `DataTable`).
2. Replace the "Mentoring subjects" and "Tutoring subjects" text in the "People" dashboard `DataTable` with those normal `SubjectSelect` variants. | priority | make subjects editable in people dashboard is your feature request related to a problem please describe a clear and concise description of what the problem is ex i m always frustrated when orgs cannot edit their user s mentoring or tutoring subjects we ll need that functionality in order to close describe the solution you d like a clear and concise description of what you want to happen we should update the select component to support the normal textfield variant i e non outlined the one with the line ripple that s being used in our datatable replace the mentoring subjects and tutoring subjects text in the people dashboard datatable with those normal subjectselect variants | 1 |
334,077 | 24,403,699,519 | IssuesEvent | 2022-10-05 05:24:39 | DhanushNehru/Python-Scripts | https://api.github.com/repos/DhanushNehru/Python-Scripts | closed | Change the script files into separate folders | help wanted documentation hacktoberfest good first issue | Need to change the python script files into separate folders
And each folder should contain a README.md and the respective project files | 1.0 | Change the script files into separate folders - Need to change the python script files into separate folders
And each folder should contain a README.md and the respective project files | non_priority | change the script files into separate folders need to change the python script files into separate folders and each folder should contain a readme md and the respective project files | 0 |
42,115 | 6,964,379,127 | IssuesEvent | 2017-12-08 21:24:51 | TerraME/terrame | https://api.github.com/repos/TerraME/terrame | closed | Review ZeroBrane tutorials and demos | Documentation task | Review all ZeroBrane tutorials and demos:
1) Check links
2) Check if everything executes
3) Check if it is easy to understand | 1.0 | Review ZeroBrane tutorials and demos - Review all ZeroBrane tutorials and demos:
1) Check links
2) Check if everything executes
3) Check if it is easy to understand | non_priority | review zerobrane tutorials and demos review all zerobrane tutorials and demos check links check if everything executes check if it is easy to understand | 0 |
12,239 | 9,659,947,627 | IssuesEvent | 2019-05-20 14:30:28 | elastic/beats | https://api.github.com/repos/elastic/beats | closed | Input docker behaviour with Openshift 3.10 | :infrastructure Filebeat Metricbeat [zube]: In Progress containers enhancement libbeat v7.2.0 | Filebeat Version : 6.4.3-1
Openshift version : 3.10
Since Openshift version 3.10, docker has been replaced by cri-o. Log format changed from json to cri format and we need to use input docker to parse file as describe in this issue https://github.com/elastic/beats/issues/7418
Nethertheless, the path of docker logs in Openshift 3.10 is /var/log/containers/<pod_name>_<namespace>_<container_name>-<container_id>.log. Docker input consider this is this /var/lib/docker/containers/<container_id>/*.log.
I used this workaround for all docker
<pre>filebeat:
inputs:
- type: docker
containers:
path: "/var/log/containers"
ids:
- ''
symlinks: true
multiline.pattern: '^\['
multiline.match: after
multiline.negate: true
fields:
type: openshift-pods
fields_under_root: true
exclude_lines: ["DEBUG","TRACE"]
exclude_files: ["rabbitmq","nginx","redis"]</pre>
It will considered this path -> /var/log/containers//*.log and it's ok if I wanted to process all log on the same way. In the other side, I need to process rabbitmq, nginx and redis pods on another ways but I'm blocked;
For example
<pre>
filebeat:
inputs:
- type: docker
containers:
path: "/var/log/containers"
ids:
- ''
symlinks: true
multiline.pattern: '^[0-9]{4}-[0-9]{2}-[0-9]{2}'
multiline.match: after
multiline.negate: true
fields:
type: rabbit-pods
fields_under_root: true
## Negative pattern not supported
exclude_lines: [".*(?!rabbitmq).*"]
##
exclude_lines: ["DEBUG","TRACE"]
</pre>
This example failed. I can't use exclude_line with negative pattern. Include line is not supported too. I think it should be good to be able to modify the "/*.log" automatically added by filebeat with input docker.
PS : directory /var/log/pods should be the good directory for input but it contain only ID of dockers and I'll lost all <pod_name>_<namespace>_<container_name>-<container_id> I mentionned before. | 1.0 | Input docker behaviour with Openshift 3.10 - Filebeat Version : 6.4.3-1
Openshift version : 3.10
Since Openshift version 3.10, docker has been replaced by cri-o. Log format changed from json to cri format and we need to use input docker to parse file as describe in this issue https://github.com/elastic/beats/issues/7418
Nethertheless, the path of docker logs in Openshift 3.10 is /var/log/containers/<pod_name>_<namespace>_<container_name>-<container_id>.log. Docker input consider this is this /var/lib/docker/containers/<container_id>/*.log.
I used this workaround for all docker
<pre>filebeat:
inputs:
- type: docker
containers:
path: "/var/log/containers"
ids:
- ''
symlinks: true
multiline.pattern: '^\['
multiline.match: after
multiline.negate: true
fields:
type: openshift-pods
fields_under_root: true
exclude_lines: ["DEBUG","TRACE"]
exclude_files: ["rabbitmq","nginx","redis"]</pre>
It will considered this path -> /var/log/containers//*.log and it's ok if I wanted to process all log on the same way. In the other side, I need to process rabbitmq, nginx and redis pods on another ways but I'm blocked;
For example
<pre>
filebeat:
inputs:
- type: docker
containers:
path: "/var/log/containers"
ids:
- ''
symlinks: true
multiline.pattern: '^[0-9]{4}-[0-9]{2}-[0-9]{2}'
multiline.match: after
multiline.negate: true
fields:
type: rabbit-pods
fields_under_root: true
## Negative pattern not supported
exclude_lines: [".*(?!rabbitmq).*"]
##
exclude_lines: ["DEBUG","TRACE"]
</pre>
This example failed. I can't use exclude_line with negative pattern. Include line is not supported too. I think it should be good to be able to modify the "/*.log" automatically added by filebeat with input docker.
PS : directory /var/log/pods should be the good directory for input but it contain only ID of dockers and I'll lost all <pod_name>_<namespace>_<container_name>-<container_id> I mentionned before. | non_priority | input docker behaviour with openshift filebeat version openshift version since openshift version docker has been replaced by cri o log format changed from json to cri format and we need to use input docker to parse file as describe in this issue nethertheless the path of docker logs in openshift is var log containers log docker input consider this is this var lib docker containers log i used this workaround for all docker filebeat inputs type docker containers path var log containers ids symlinks true multiline pattern multiline match after multiline negate true fields type openshift pods fields under root true exclude lines exclude files it will considered this path var log containers log and it s ok if i wanted to process all log on the same way in the other side i need to process rabbitmq nginx and redis pods on another ways but i m blocked for example filebeat inputs type docker containers path var log containers ids symlinks true multiline pattern multiline match after multiline negate true fields type rabbit pods fields under root true negative pattern not supported exclude lines exclude lines this example failed i can t use exclude line with negative pattern include line is not supported too i think it should be good to be able to modify the log automatically added by filebeat with input docker ps directory var log pods should be the good directory for input but it contain only id of dockers and i ll lost all i mentionned before | 0 |
69,499 | 14,990,281,577 | IssuesEvent | 2021-01-29 06:02:08 | Infosecdecompress/infosecdecompress | https://api.github.com/repos/Infosecdecompress/infosecdecompress | closed | CVE-2018-19797 (Medium) detected in opennmsopennms-source-26.0.0-1, node-sass-4.14.1.tgz - autoclosed | security vulnerability | ## CVE-2018-19797 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>opennmsopennms-source-26.0.0-1</b>, <b>node-sass-4.14.1.tgz</b></p></summary>
<p>
<details><summary><b>node-sass-4.14.1.tgz</b></p></summary>
<p>Wrapper around libsass</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p>
<p>Path to dependency file: infosecdecompress/package.json</p>
<p>Path to vulnerable library: infosecdecompress/node_modules/node-sass/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-sass-4.14.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Infosecdecompress/infosecdecompress/commit/3e657cadb5c07492f1468e49db63b000cac0a900">3e657cadb5c07492f1468e49db63b000cac0a900</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Selector_List::populate_extends in SharedPtr.hpp (used by ast.cpp and ast_selectors.cpp) may cause a Denial of Service (application crash) via a crafted sass input file.
<p>Publish Date: 2018-12-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19797>CVE-2018-19797</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19797">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19797</a></p>
<p>Release Date: 2018-12-03</p>
<p>Fix Resolution: libsass-3.6.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-19797 (Medium) detected in opennmsopennms-source-26.0.0-1, node-sass-4.14.1.tgz - autoclosed - ## CVE-2018-19797 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>opennmsopennms-source-26.0.0-1</b>, <b>node-sass-4.14.1.tgz</b></p></summary>
<p>
<details><summary><b>node-sass-4.14.1.tgz</b></p></summary>
<p>Wrapper around libsass</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p>
<p>Path to dependency file: infosecdecompress/package.json</p>
<p>Path to vulnerable library: infosecdecompress/node_modules/node-sass/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-sass-4.14.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Infosecdecompress/infosecdecompress/commit/3e657cadb5c07492f1468e49db63b000cac0a900">3e657cadb5c07492f1468e49db63b000cac0a900</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Selector_List::populate_extends in SharedPtr.hpp (used by ast.cpp and ast_selectors.cpp) may cause a Denial of Service (application crash) via a crafted sass input file.
<p>Publish Date: 2018-12-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19797>CVE-2018-19797</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19797">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19797</a></p>
<p>Release Date: 2018-12-03</p>
<p>Fix Resolution: libsass-3.6.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in opennmsopennms source node sass tgz autoclosed cve medium severity vulnerability vulnerable libraries opennmsopennms source node sass tgz node sass tgz wrapper around libsass library home page a href path to dependency file infosecdecompress package json path to vulnerable library infosecdecompress node modules node sass package json dependency hierarchy x node sass tgz vulnerable library found in head commit a href found in base branch master vulnerability details in libsass a null pointer dereference in the function sass selector list populate extends in sharedptr hpp used by ast cpp and ast selectors cpp may cause a denial of service application crash via a crafted sass input file publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass step up your open source security game with whitesource | 0 |
258,180 | 22,290,328,540 | IssuesEvent | 2022-06-12 09:03:14 | Nedilko/weekends | https://api.github.com/repos/Nedilko/weekends | closed | [Test case]: Verify that theme can be changed | test case | ### Description
This TC verifies that user able to change theme from light to dark and from dark to light.
Design - https://www.figma.com/file/k8veH6xqaVXV0DGAtiENFI/weekends?node-id=30%3A4
Preconditions:
- Local storage is empty
- On first application start set Day - Friday, Hour - 18:00.
- Current day is Monday or Tuesday or Wednesday or Thursday or Friday (until 18:00)
### Steps to reproduce
1. Go to https://weekends.nac.in.ua/
2. Click "Apply" button
3. Click on theme toggle switcher on the top right corner
4. Click on theme toggle switcher on the top right corner
### Expected result
1. Modal appears with possibility to choose day and hour left to weekends.
2. Modal disappears. Application name with timer in the center of screen. Application theme is set to light. Toggle position is left.
3. Theme changes from light to dark. Theme toggle changes position from left (off) to right (on).
4. Theme changes from dark to light. Theme toggle changes position from right to left.
| 1.0 | [Test case]: Verify that theme can be changed - ### Description
This TC verifies that user able to change theme from light to dark and from dark to light.
Design - https://www.figma.com/file/k8veH6xqaVXV0DGAtiENFI/weekends?node-id=30%3A4
Preconditions:
- Local storage is empty
- On first application start set Day - Friday, Hour - 18:00.
- Current day is Monday or Tuesday or Wednesday or Thursday or Friday (until 18:00)
### Steps to reproduce
1. Go to https://weekends.nac.in.ua/
2. Click "Apply" button
3. Click on theme toggle switcher on the top right corner
4. Click on theme toggle switcher on the top right corner
### Expected result
1. Modal appears with possibility to choose day and hour left to weekends.
2. Modal disappears. Application name with timer in the center of screen. Application theme is set to light. Toggle position is left.
3. Theme changes from light to dark. Theme toggle changes position from left (off) to right (on).
4. Theme changes from dark to light. Theme toggle changes position from right to left.
| non_priority | verify that theme can be changed description this tc verifies that user able to change theme from light to dark and from dark to light design preconditions local storage is empty on first application start set day friday hour current day is monday or tuesday or wednesday or thursday or friday until steps to reproduce go to click apply button click on theme toggle switcher on the top right corner click on theme toggle switcher on the top right corner expected result modal appears with possibility to choose day and hour left to weekends modal disappears application name with timer in the center of screen application theme is set to light toggle position is left theme changes from light to dark theme toggle changes position from left off to right on theme changes from dark to light theme toggle changes position from right to left | 0 |
86,928 | 15,755,902,569 | IssuesEvent | 2021-03-31 02:35:07 | turkdevops/node | https://api.github.com/repos/turkdevops/node | opened | CVE-2019-1010266 (Medium) detected in lodash-2.4.1.tgz | security vulnerability | ## CVE-2019-1010266 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.1.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, & extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.1.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.1.tgz</a></p>
<p>Path to dependency file: node/deps/npm/package.json</p>
<p>Path to vulnerable library: node/deps/npm/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- nock-0.34.1.tgz (Root Library)
- :x: **lodash-2.4.1.tgz** (Vulnerable Library)
<p>Found in base branch: <b>archived-io.js-v0.10</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11.
<p>Publish Date: 2019-07-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-1010266>CVE-2019-1010266</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010266">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010266</a></p>
<p>Release Date: 2019-07-17</p>
<p>Fix Resolution: 4.17.11</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-1010266 (Medium) detected in lodash-2.4.1.tgz - ## CVE-2019-1010266 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.1.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, & extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.1.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.1.tgz</a></p>
<p>Path to dependency file: node/deps/npm/package.json</p>
<p>Path to vulnerable library: node/deps/npm/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- nock-0.34.1.tgz (Root Library)
- :x: **lodash-2.4.1.tgz** (Vulnerable Library)
<p>Found in base branch: <b>archived-io.js-v0.10</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11.
<p>Publish Date: 2019-07-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-1010266>CVE-2019-1010266</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010266">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010266</a></p>
<p>Release Date: 2019-07-17</p>
<p>Fix Resolution: 4.17.11</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in lodash tgz cve medium severity vulnerability vulnerable library lodash tgz a utility library delivering consistency customization performance extras library home page a href path to dependency file node deps npm package json path to vulnerable library node deps npm node modules lodash package json dependency hierarchy nock tgz root library x lodash tgz vulnerable library found in base branch archived io js vulnerability details lodash prior to is affected by cwe uncontrolled resource consumption the impact is denial of service the component is date handler the attack vector is attacker provides very long strings which the library attempts to match using a regular expression the fixed version is publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
791,373 | 27,861,650,141 | IssuesEvent | 2023-03-21 07:00:47 | ansible-collections/azure | https://api.github.com/repos/ansible-collections/azure | closed | Issue with azure_rm_webapp_info | question medium_priority work in | <!--- Verify first that your issue is not already reported on GitHub -->
<!--- Also test if the latest release and devel branch are affected too -->
<!--- Complete *all* sections as described, this form is processed automatically -->
##### SUMMARY
<!--- Explain the problem briefly below -->
Unable to retrieve info of an azure app service (webapp). Error is unclear or is the module is broken.
##### ISSUE TYPE
- Bug Report
##### COMPONENT NAME
<!--- Write the short name of the module, plugin, task or feature below, use your best guess if unsure -->
`azure.azcollection.azure_rm_webapp_info`
##### ANSIBLE VERSION
<!--- Paste verbatim output from "ansible --version" between quotes -->
```paste below
ansible 2.9.6
```
##### COLLECTION VERSION
<!--- Paste verbatim output from "ansible-galaxy collection list <namespace>.<collection>" between the quotes
for example: ansible-galaxy collection list community.general
-->
```paste below
1.14.0
```
##### OS / ENVIRONMENT
<!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. -->
`Linux` `x64` `ubuntu 22.04`
##### STEPS TO REPRODUCE
<!--- Describe exactly how to reproduce the problem, using a minimal test-case -->
- Create a resource group called `test-rg`
- Create and app service plan
- Create a web app within the new service plan
- Docker container
- Private Azure Container Registry
- Connect to ACR using admin creds for pull
- Enable vnet integration
- Use module `azure_rm_webapp_info` and only pass in a resource group, as per the examples provided
- Try to assign the information to a fact
<!--- Paste example playbooks or commands between quotes below -->
```yaml
- name: Get facts for web apps
azure.azcollection.azure_rm_webapp_info:
resource_group: "test-rg"
register: webapp_list
```
<!--- HINT: You can paste gist.github.com links for larger files -->
##### EXPECTED RESULTS
<!--- Describe what you expected to happen when running the steps above -->
Output of the web app info contained in the fact called `webapp_list`
##### ACTUAL RESULTS
<!--- Describe what actually happened. If possible run with extra verbosity (-vvvv) -->
`fatal: [localhost]: FAILED! => ***"changed": false, "module_stderr": "Datetime with no tzinfo will be considered UTC.\nTraceback (most recent call last):\n File \"/root/.ansible/tmp/ansible-tmp-1676569203.7987483-172578-17808830956604/AnsiballZ_azure_rm_webapp_info.py\", line 107, in <module>\n _ansiballz_main()\n File \"/root/.ansible/tmp/ansible-tmp-1676569203.7987483-172578-17808830956604/AnsiballZ_azure_rm_webapp_info.py\", line 99, in _ansiballz_main\n invoke_module(zipped_mod, temp_path, ANSIBALLZ_PARAMS)\n File \"/root/.ansible/tmp/ansible-tmp-1676569203.7987483-172578-17808830956604/AnsiballZ_azure_rm_webapp_info.py\", line 47, in invoke_module\n runpy.run_module(mod_name='ansible_collections.azure.azcollection.plugins.modules.azure_rm_webapp_info', init_globals=dict(_module_fqn='ansible_collections.azure.azcollection.plugins.modules.azure_rm_webapp_info', _modlib_path=modlib_path),\n File \"/usr/lib/python3.10/runpy.py\", line 224, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib/python3.10/runpy.py\", line 96, in _run_module_code\n _run_code(code, mod_globals, init_globals,\n File \"/usr/lib/python3.10/runpy.py\", line 86, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 516, in <module>\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 512, in main\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 280, in __init__\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/module_utils/azure_rm_common.py\", line 472, in __init__\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 296, in exec_module\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 329, in list_by_resource_group\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 429, in get_curated_webapp\nUnboundLocalError: local variable 'app_settings' referenced before assignment\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1***`
<!--- Paste verbatim command output between quotes -->
```paste below
```
| 1.0 | Issue with azure_rm_webapp_info - <!--- Verify first that your issue is not already reported on GitHub -->
<!--- Also test if the latest release and devel branch are affected too -->
<!--- Complete *all* sections as described, this form is processed automatically -->
##### SUMMARY
<!--- Explain the problem briefly below -->
Unable to retrieve info of an azure app service (webapp). Error is unclear or is the module is broken.
##### ISSUE TYPE
- Bug Report
##### COMPONENT NAME
<!--- Write the short name of the module, plugin, task or feature below, use your best guess if unsure -->
`azure.azcollection.azure_rm_webapp_info`
##### ANSIBLE VERSION
<!--- Paste verbatim output from "ansible --version" between quotes -->
```paste below
ansible 2.9.6
```
##### COLLECTION VERSION
<!--- Paste verbatim output from "ansible-galaxy collection list <namespace>.<collection>" between the quotes
for example: ansible-galaxy collection list community.general
-->
```paste below
1.14.0
```
##### OS / ENVIRONMENT
<!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. -->
`Linux` `x64` `ubuntu 22.04`
##### STEPS TO REPRODUCE
<!--- Describe exactly how to reproduce the problem, using a minimal test-case -->
- Create a resource group called `test-rg`
- Create and app service plan
- Create a web app within the new service plan
- Docker container
- Private Azure Container Registry
- Connect to ACR using admin creds for pull
- Enable vnet integration
- Use module `azure_rm_webapp_info` and only pass in a resource group, as per the examples provided
- Try to assign the information to a fact
<!--- Paste example playbooks or commands between quotes below -->
```yaml
- name: Get facts for web apps
azure.azcollection.azure_rm_webapp_info:
resource_group: "test-rg"
register: webapp_list
```
<!--- HINT: You can paste gist.github.com links for larger files -->
##### EXPECTED RESULTS
<!--- Describe what you expected to happen when running the steps above -->
Output of the web app info contained in the fact called `webapp_list`
##### ACTUAL RESULTS
<!--- Describe what actually happened. If possible run with extra verbosity (-vvvv) -->
`fatal: [localhost]: FAILED! => ***"changed": false, "module_stderr": "Datetime with no tzinfo will be considered UTC.\nTraceback (most recent call last):\n File \"/root/.ansible/tmp/ansible-tmp-1676569203.7987483-172578-17808830956604/AnsiballZ_azure_rm_webapp_info.py\", line 107, in <module>\n _ansiballz_main()\n File \"/root/.ansible/tmp/ansible-tmp-1676569203.7987483-172578-17808830956604/AnsiballZ_azure_rm_webapp_info.py\", line 99, in _ansiballz_main\n invoke_module(zipped_mod, temp_path, ANSIBALLZ_PARAMS)\n File \"/root/.ansible/tmp/ansible-tmp-1676569203.7987483-172578-17808830956604/AnsiballZ_azure_rm_webapp_info.py\", line 47, in invoke_module\n runpy.run_module(mod_name='ansible_collections.azure.azcollection.plugins.modules.azure_rm_webapp_info', init_globals=dict(_module_fqn='ansible_collections.azure.azcollection.plugins.modules.azure_rm_webapp_info', _modlib_path=modlib_path),\n File \"/usr/lib/python3.10/runpy.py\", line 224, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib/python3.10/runpy.py\", line 96, in _run_module_code\n _run_code(code, mod_globals, init_globals,\n File \"/usr/lib/python3.10/runpy.py\", line 86, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 516, in <module>\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 512, in main\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 280, in __init__\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/module_utils/azure_rm_common.py\", line 472, in __init__\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 296, in exec_module\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 329, in list_by_resource_group\n File \"/tmp/ansible_azure.azcollection.azure_rm_webapp_info_payload_dy1wefvr/ansible_azure.azcollection.azure_rm_webapp_info_payload.zip/ansible_collections/azure/azcollection/plugins/modules/azure_rm_webapp_info.py\", line 429, in get_curated_webapp\nUnboundLocalError: local variable 'app_settings' referenced before assignment\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1***`
<!--- Paste verbatim command output between quotes -->
```paste below
```
| priority | issue with azure rm webapp info summary unable to retrieve info of an azure app service webapp error is unclear or is the module is broken issue type bug report component name azure azcollection azure rm webapp info ansible version paste below ansible collection version between the quotes for example ansible galaxy collection list community general paste below os environment linux ubuntu steps to reproduce create a resource group called test rg create and app service plan create a web app within the new service plan docker container private azure container registry connect to acr using admin creds for pull enable vnet integration use module azure rm webapp info and only pass in a resource group as per the examples provided try to assign the information to a fact yaml name get facts for web apps azure azcollection azure rm webapp info resource group test rg register webapp list expected results output of the web app info contained in the fact called webapp list actual results fatal failed changed false module stderr datetime with no tzinfo will be considered utc ntraceback most recent call last n file root ansible tmp ansible tmp ansiballz azure rm webapp info py line in n ansiballz main n file root ansible tmp ansible tmp ansiballz azure rm webapp info py line in ansiballz main n invoke module zipped mod temp path ansiballz params n file root ansible tmp ansible tmp ansiballz azure rm webapp info py line in invoke module n runpy run module mod name ansible collections azure azcollection plugins modules azure rm webapp info init globals dict module fqn ansible collections azure azcollection plugins modules azure rm webapp info modlib path modlib path n file usr lib runpy py line in run module n return run module code code init globals run name mod spec n file usr lib runpy py line in run module code n run code code mod globals init globals n file usr lib runpy py line in run code n exec code run globals n file tmp ansible azure azcollection azure rm webapp info payload ansible azure azcollection azure rm webapp info payload zip ansible collections azure azcollection plugins modules azure rm webapp info py line in n file tmp ansible azure azcollection azure rm webapp info payload ansible azure azcollection azure rm webapp info payload zip ansible collections azure azcollection plugins modules azure rm webapp info py line in main n file tmp ansible azure azcollection azure rm webapp info payload ansible azure azcollection azure rm webapp info payload zip ansible collections azure azcollection plugins modules azure rm webapp info py line in init n file tmp ansible azure azcollection azure rm webapp info payload ansible azure azcollection azure rm webapp info payload zip ansible collections azure azcollection plugins module utils azure rm common py line in init n file tmp ansible azure azcollection azure rm webapp info payload ansible azure azcollection azure rm webapp info payload zip ansible collections azure azcollection plugins modules azure rm webapp info py line in exec module n file tmp ansible azure azcollection azure rm webapp info payload ansible azure azcollection azure rm webapp info payload zip ansible collections azure azcollection plugins modules azure rm webapp info py line in list by resource group n file tmp ansible azure azcollection azure rm webapp info payload ansible azure azcollection azure rm webapp info payload zip ansible collections azure azcollection plugins modules azure rm webapp info py line in get curated webapp nunboundlocalerror local variable app settings referenced before assignment n module stdout msg module failure nsee stdout stderr for the exact error rc paste below | 1 |
151,868 | 13,437,310,330 | IssuesEvent | 2020-09-07 15:42:47 | kinvolk/lokomotive | https://api.github.com/repos/kinvolk/lokomotive | opened | Provide a way for goreleaser to use different GPG key | area/updates kind/documentation |
Right now goreleaser arbitrarily selects a GPG key to sign the release with. It does not respect the gitconfig.
- There is a way to provide the GPG key using env var. The doc to follow is https://goreleaser.com/ci/actions/#signing.
- Update the release doc after this.
Following config has worked for me in the past:
```yaml
# Enable signing checksums.
signs:
- artifacts: all
args: ["-u", "11A11111AA111111", "--output", "${signature}", "--detach-sign", "${artifact}"]
``` | 1.0 | Provide a way for goreleaser to use different GPG key -
Right now goreleaser arbitrarily selects a GPG key to sign the release with. It does not respect the gitconfig.
- There is a way to provide the GPG key using env var. The doc to follow is https://goreleaser.com/ci/actions/#signing.
- Update the release doc after this.
Following config has worked for me in the past:
```yaml
# Enable signing checksums.
signs:
- artifacts: all
args: ["-u", "11A11111AA111111", "--output", "${signature}", "--detach-sign", "${artifact}"]
``` | non_priority | provide a way for goreleaser to use different gpg key right now goreleaser arbitrarily selects a gpg key to sign the release with it does not respect the gitconfig there is a way to provide the gpg key using env var the doc to follow is update the release doc after this following config has worked for me in the past yaml enable signing checksums signs artifacts all args | 0 |
317,338 | 9,663,585,423 | IssuesEvent | 2019-05-21 01:23:55 | NCIOCPL/cgov-digital-platform | https://api.github.com/repos/NCIOCPL/cgov-digital-platform | closed | Update Meta Description Field to allow 600 characters | High priority change request | Because PDQ has meta descriptions longer than 320 characters, we need to update the meta description field to allow 600 characters.
This is needed to continue migration scripting. | 1.0 | Update Meta Description Field to allow 600 characters - Because PDQ has meta descriptions longer than 320 characters, we need to update the meta description field to allow 600 characters.
This is needed to continue migration scripting. | priority | update meta description field to allow characters because pdq has meta descriptions longer than characters we need to update the meta description field to allow characters this is needed to continue migration scripting | 1 |
755,868 | 26,444,390,107 | IssuesEvent | 2023-01-16 05:20:43 | yugabyte/yugabyte-db | https://api.github.com/repos/yugabyte/yugabyte-db | closed | [YSQL] Probabilistically trigger ANALYZE for each table from YSQL | kind/enhancement area/ysql priority/medium | Jira Link: [DB-4318](https://yugabyte.atlassian.net/browse/DB-4318)
### Description
ANALYZE for a table is to be triggered with probability P = (number of mutations/ anlthresh) from each YSQL instance after periodically, or after some number of mutations.
1. The "number of mutations" for a table includes only committed mutations.
2. anlthresh is based on the GUCs - `autovacuum_analyze_threshold` and `autovacuum_analyze_scale_factor`. It is calculated as anlthresh = autovacuum_analyze_threshold + autovacuum_analyze_scale_factor * (number of tuples in the table). This is based on this code line in Pg - `anlthresh = (float4) anl_base_thresh + anl_scale_factor * reltuples`
This will involve triggering an RPC to the yb master leader which then triggers the ANALYZE command on some YSQL instance and ensures that only one instance of ANALYZE runs at a time for each table. The master will also have load balancing logic to spread ANALYZE command executions across YSQL instances.
| 1.0 | [YSQL] Probabilistically trigger ANALYZE for each table from YSQL - Jira Link: [DB-4318](https://yugabyte.atlassian.net/browse/DB-4318)
### Description
ANALYZE for a table is to be triggered with probability P = (number of mutations/ anlthresh) from each YSQL instance after periodically, or after some number of mutations.
1. The "number of mutations" for a table includes only committed mutations.
2. anlthresh is based on the GUCs - `autovacuum_analyze_threshold` and `autovacuum_analyze_scale_factor`. It is calculated as anlthresh = autovacuum_analyze_threshold + autovacuum_analyze_scale_factor * (number of tuples in the table). This is based on this code line in Pg - `anlthresh = (float4) anl_base_thresh + anl_scale_factor * reltuples`
This will involve triggering an RPC to the yb master leader which then triggers the ANALYZE command on some YSQL instance and ensures that only one instance of ANALYZE runs at a time for each table. The master will also have load balancing logic to spread ANALYZE command executions across YSQL instances.
| priority | probabilistically trigger analyze for each table from ysql jira link description analyze for a table is to be triggered with probability p number of mutations anlthresh from each ysql instance after periodically or after some number of mutations the number of mutations for a table includes only committed mutations anlthresh is based on the gucs autovacuum analyze threshold and autovacuum analyze scale factor it is calculated as anlthresh autovacuum analyze threshold autovacuum analyze scale factor number of tuples in the table this is based on this code line in pg anlthresh anl base thresh anl scale factor reltuples this will involve triggering an rpc to the yb master leader which then triggers the analyze command on some ysql instance and ensures that only one instance of analyze runs at a time for each table the master will also have load balancing logic to spread analyze command executions across ysql instances | 1 |
747,918 | 26,102,139,810 | IssuesEvent | 2022-12-27 08:34:33 | bounswe/bounswe2022group2 | https://api.github.com/repos/bounswe/bounswe2022group2 | closed | Mobile: Get Other Users Profile Backend Connection | priority-critical status-new mobile back-connection | ### Issue Description
I will implement backend connection of get other users profile page.
### Step Details
Steps that will be performed:
- [x] Analyze get user endpoint
- [x] Implement backend connection
### Final Actions
After the work is done, related PR will be provided here. Further implementation details will be found under this PR.
### Deadline of the Issue
27.12.2022 - 08.00 | 1.0 | Mobile: Get Other Users Profile Backend Connection - ### Issue Description
I will implement backend connection of get other users profile page.
### Step Details
Steps that will be performed:
- [x] Analyze get user endpoint
- [x] Implement backend connection
### Final Actions
After the work is done, related PR will be provided here. Further implementation details will be found under this PR.
### Deadline of the Issue
27.12.2022 - 08.00 | priority | mobile get other users profile backend connection issue description i will implement backend connection of get other users profile page step details steps that will be performed analyze get user endpoint implement backend connection final actions after the work is done related pr will be provided here further implementation details will be found under this pr deadline of the issue | 1 |
575,380 | 17,029,028,123 | IssuesEvent | 2021-07-04 06:50:36 | emmamei/cdkey | https://api.github.com/repos/emmamei/cdkey | opened | dialogListen (internal command) is overloaded | bug priority reliabilityfix | As many as 4 or 5 listeners are opened with the main menus; this is a functional error.
Separate the functions out, and open listeners only as needed at the point of need. | 1.0 | dialogListen (internal command) is overloaded - As many as 4 or 5 listeners are opened with the main menus; this is a functional error.
Separate the functions out, and open listeners only as needed at the point of need. | priority | dialoglisten internal command is overloaded as many as or listeners are opened with the main menus this is a functional error separate the functions out and open listeners only as needed at the point of need | 1 |
64,254 | 15,832,924,009 | IssuesEvent | 2021-04-06 15:06:29 | ClickHouse/ClickHouse | https://api.github.com/repos/ClickHouse/ClickHouse | opened | Update ClickHouse for M1 Mac Support | build | ClickHouse build failed on M1 Mac
**Operating system**
Mac OS Big Sur 11.2.3
**Cmake version**
cmake version 3.20.0
**Compiler name and version**
AppleClang compiler
**Full cmake and/or ninja output**
-- The C compiler identification is AppleClang 12.0.0.12000032
-- The CXX compiler identification is AppleClang 12.0.0.12000032
-- Detecting C compiler ABI info
-- Detecting C compiler ABI info - done
-- Check for working C compiler: /Library/Developer/CommandLineTools/usr/bin/cc - skipped
-- Detecting C compile features
-- Detecting C compile features - done
-- Detecting CXX compiler ABI info
-- Detecting CXX compiler ABI info - done
-- Check for working CXX compiler: /Library/Developer/CommandLineTools/usr/bin/c++ - skipped
-- Detecting CXX compile features
-- Detecting CXX compile features - done
-- The ASM compiler identification is Clang
-- Found assembler: /Library/Developer/CommandLineTools/usr/bin/cc
CMake Error at cmake/arch.cmake:14 (message):
32bit platforms are not supported
Call Stack (most recent call first):
CMakeLists.txt:44 (include)
Docker images is failed too:
runtime: failed to create new OS thread (have 2 already; errno=22)
fatal error: newosproc
runtime stack:
runtime.throw(0x4cb21f, 0x9)
/usr/local/go/src/runtime/panic.go:566 +0x95
runtime.newosproc(0xc420028000, 0xc420037fc0)
/usr/local/go/src/runtime/os_linux.go:160 +0x194
runtime.newm(0x4d6db8, 0x0)
/usr/local/go/src/runtime/proc.go:1572 +0x132
runtime.main.func1()
/usr/local/go/src/runtime/proc.go:126 +0x36
runtime.systemstack(0x53ae00)
/usr/local/go/src/runtime/asm_amd64.s:298 +0x79
runtime.mstart()
/usr/local/go/src/runtime/proc.go:1079
goroutine 1 [running]:
runtime.systemstack_switch()
/usr/local/go/src/runtime/asm_amd64.s:252 fp=0xc420022768 sp=0xc420022760
runtime.main()
/usr/local/go/src/runtime/proc.go:127 +0x6c fp=0xc4200227c0 sp=0xc420022768
runtime.goexit()
/usr/local/go/src/runtime/asm_amd64.s:2086 +0x1 fp=0xc4200227c8 sp=0xc4200227c0
Configuration file '' isn't readable by user with id '101' | 1.0 | Update ClickHouse for M1 Mac Support - ClickHouse build failed on M1 Mac
**Operating system**
Mac OS Big Sur 11.2.3
**Cmake version**
cmake version 3.20.0
**Compiler name and version**
AppleClang compiler
**Full cmake and/or ninja output**
-- The C compiler identification is AppleClang 12.0.0.12000032
-- The CXX compiler identification is AppleClang 12.0.0.12000032
-- Detecting C compiler ABI info
-- Detecting C compiler ABI info - done
-- Check for working C compiler: /Library/Developer/CommandLineTools/usr/bin/cc - skipped
-- Detecting C compile features
-- Detecting C compile features - done
-- Detecting CXX compiler ABI info
-- Detecting CXX compiler ABI info - done
-- Check for working CXX compiler: /Library/Developer/CommandLineTools/usr/bin/c++ - skipped
-- Detecting CXX compile features
-- Detecting CXX compile features - done
-- The ASM compiler identification is Clang
-- Found assembler: /Library/Developer/CommandLineTools/usr/bin/cc
CMake Error at cmake/arch.cmake:14 (message):
32bit platforms are not supported
Call Stack (most recent call first):
CMakeLists.txt:44 (include)
Docker images is failed too:
runtime: failed to create new OS thread (have 2 already; errno=22)
fatal error: newosproc
runtime stack:
runtime.throw(0x4cb21f, 0x9)
/usr/local/go/src/runtime/panic.go:566 +0x95
runtime.newosproc(0xc420028000, 0xc420037fc0)
/usr/local/go/src/runtime/os_linux.go:160 +0x194
runtime.newm(0x4d6db8, 0x0)
/usr/local/go/src/runtime/proc.go:1572 +0x132
runtime.main.func1()
/usr/local/go/src/runtime/proc.go:126 +0x36
runtime.systemstack(0x53ae00)
/usr/local/go/src/runtime/asm_amd64.s:298 +0x79
runtime.mstart()
/usr/local/go/src/runtime/proc.go:1079
goroutine 1 [running]:
runtime.systemstack_switch()
/usr/local/go/src/runtime/asm_amd64.s:252 fp=0xc420022768 sp=0xc420022760
runtime.main()
/usr/local/go/src/runtime/proc.go:127 +0x6c fp=0xc4200227c0 sp=0xc420022768
runtime.goexit()
/usr/local/go/src/runtime/asm_amd64.s:2086 +0x1 fp=0xc4200227c8 sp=0xc4200227c0
Configuration file '' isn't readable by user with id '101' | non_priority | update clickhouse for mac support clickhouse build failed on mac operating system mac os big sur cmake version cmake version compiler name and version appleclang compiler full cmake and or ninja output the c compiler identification is appleclang the cxx compiler identification is appleclang detecting c compiler abi info detecting c compiler abi info done check for working c compiler library developer commandlinetools usr bin cc skipped detecting c compile features detecting c compile features done detecting cxx compiler abi info detecting cxx compiler abi info done check for working cxx compiler library developer commandlinetools usr bin c skipped detecting cxx compile features detecting cxx compile features done the asm compiler identification is clang found assembler library developer commandlinetools usr bin cc cmake error at cmake arch cmake message platforms are not supported call stack most recent call first cmakelists txt include docker images is failed too runtime failed to create new os thread have already errno fatal error newosproc runtime stack runtime throw usr local go src runtime panic go runtime newosproc usr local go src runtime os linux go runtime newm usr local go src runtime proc go runtime main usr local go src runtime proc go runtime systemstack usr local go src runtime asm s runtime mstart usr local go src runtime proc go goroutine runtime systemstack switch usr local go src runtime asm s fp sp runtime main usr local go src runtime proc go fp sp runtime goexit usr local go src runtime asm s fp sp configuration file isn t readable by user with id | 0 |
603,947 | 18,674,514,580 | IssuesEvent | 2021-10-31 10:21:43 | AY2122S1-CS2113T-F14-3/tp | https://api.github.com/repos/AY2122S1-CS2113T-F14-3/tp | closed | [PE-D] Feature did not work, adding schedule with quantifier | priority.High type.Bug | 
<!--session: 1635497037138-3d4857ae-1d3d-4193-8643-08af139c8315-->
<!--Version: Web v3.4.1-->
-------------
Labels: `type.FeatureFlaw` `severity.Medium`
original: KZQ1999/ped#9 | 1.0 | [PE-D] Feature did not work, adding schedule with quantifier - 
<!--session: 1635497037138-3d4857ae-1d3d-4193-8643-08af139c8315-->
<!--Version: Web v3.4.1-->
-------------
Labels: `type.FeatureFlaw` `severity.Medium`
original: KZQ1999/ped#9 | priority | feature did not work adding schedule with quantifier labels type featureflaw severity medium original ped | 1 |
300,123 | 25,947,260,815 | IssuesEvent | 2022-12-17 04:56:01 | denoland/deno | https://api.github.com/repos/denoland/deno | opened | Synchronous test steps | suggestion testing | When everything is synchronous, I feel like the following should not need to be awaited:
```ts
Deno.test("something", (t) => {
t.step("some step", () => {
console.log(5);
});
});
```
Maybe there is some technical reason that I'm not remembering.
Currently it throws:
```
error: Error: There were still test steps running after the current scope finished execution. Ensure all steps are awaited (ex. `await t.step(...)`).
``` | 1.0 | Synchronous test steps - When everything is synchronous, I feel like the following should not need to be awaited:
```ts
Deno.test("something", (t) => {
t.step("some step", () => {
console.log(5);
});
});
```
Maybe there is some technical reason that I'm not remembering.
Currently it throws:
```
error: Error: There were still test steps running after the current scope finished execution. Ensure all steps are awaited (ex. `await t.step(...)`).
``` | non_priority | synchronous test steps when everything is synchronous i feel like the following should not need to be awaited ts deno test something t t step some step console log maybe there is some technical reason that i m not remembering currently it throws error error there were still test steps running after the current scope finished execution ensure all steps are awaited ex await t step | 0 |
92,304 | 18,819,383,859 | IssuesEvent | 2021-11-10 05:52:15 | paulevsGitch/BetterNether | https://api.github.com/repos/paulevsGitch/BetterNether | closed | world fix | bug in dev code | after upgrading better-nether from 5.3.5-1.17.1 to 5.3.7-1.17.1, when loading the world, I am prompted to run "fixes", but apparently they do not work. Because every time you start the world, this window pops up again and again.
https://pastebin.com/VMfxGnKr
Any ideas? | 1.0 | world fix - after upgrading better-nether from 5.3.5-1.17.1 to 5.3.7-1.17.1, when loading the world, I am prompted to run "fixes", but apparently they do not work. Because every time you start the world, this window pops up again and again.
https://pastebin.com/VMfxGnKr
Any ideas? | non_priority | world fix after upgrading better nether from to when loading the world i am prompted to run fixes but apparently they do not work because every time you start the world this window pops up again and again any ideas | 0 |
60,292 | 7,329,471,752 | IssuesEvent | 2018-03-05 05:17:09 | Microsoft/vscode | https://api.github.com/repos/Microsoft/vscode | closed | Notifications header not keyboard accessible | accessibility as-designed insiders workbench-notifications | The notifications header is not keyboard accessible and therefore not allowing access to
the expand, collapse and clear all buttons.

| 1.0 | Notifications header not keyboard accessible - The notifications header is not keyboard accessible and therefore not allowing access to
the expand, collapse and clear all buttons.

| non_priority | notifications header not keyboard accessible the notifications header is not keyboard accessible and therefore not allowing access to the expand collapse and clear all buttons | 0 |
21,151 | 10,577,801,684 | IssuesEvent | 2019-10-07 20:56:20 | davisboy/HighSpot | https://api.github.com/repos/davisboy/HighSpot | closed | CVE-2018-20190 (Medium) detected in node-sass-v4.12.0 | security vulnerability | ## CVE-2018-20190 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.12.0</b></p></summary>
<p>
<p>:rainbow: Node.js bindings to libsass</p>
<p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/davisboy/HighSpot/commit/9019d9002f21dd88fdbf0b531dd6e75c792cd560">9019d9002f21dd88fdbf0b531dd6e75c792cd560</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (66)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /HighSpot/node_modules/node-sass/src/libsass/src/expand.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/expand.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/factory.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/operators.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/boolean.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/util.hpp
- /HighSpot/node_modules/node-sass/src/sass_types/value.h
- /HighSpot/node_modules/node-sass/src/libsass/src/emitter.hpp
- /HighSpot/node_modules/node-sass/src/callback_bridge.h
- /HighSpot/node_modules/node-sass/src/libsass/src/file.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/sass.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/operation.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/operators.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/constants.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/error_handling.hpp
- /HighSpot/node_modules/node-sass/src/custom_importer_bridge.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/parser.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/constants.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/list.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/cssize.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/functions.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/util.cpp
- /HighSpot/node_modules/node-sass/src/custom_function_bridge.cpp
- /HighSpot/node_modules/node-sass/src/custom_importer_bridge.h
- /HighSpot/node_modules/node-sass/src/libsass/src/bind.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/eval.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/inspect.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/backtrace.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/extend.cpp
- /HighSpot/node_modules/node-sass/src/sass_context_wrapper.h
- /HighSpot/node_modules/node-sass/src/sass_types/sass_value_wrapper.h
- /HighSpot/node_modules/node-sass/src/libsass/src/error_handling.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/parser.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/debugger.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/emitter.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/number.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/color.h
- /HighSpot/node_modules/node-sass/src/libsass/src/sass_values.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/ast.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/output.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/check_nesting.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/null.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/functions.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/cssize.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/prelexer.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/ast.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/to_c.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/to_value.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/inspect.hpp
- /HighSpot/node_modules/node-sass/src/sass_types/color.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/values.cpp
- /HighSpot/node_modules/node-sass/src/sass_context_wrapper.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/list.h
- /HighSpot/node_modules/node-sass/src/libsass/src/check_nesting.hpp
- /HighSpot/node_modules/node-sass/src/sass_types/map.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/to_value.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/context.cpp
- /HighSpot/node_modules/node-sass/src/binding.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/string.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/sass_context.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/prelexer.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/context.hpp
- /HighSpot/node_modules/node-sass/src/sass_types/boolean.h
- /HighSpot/node_modules/node-sass/src/libsass/src/eval.cpp
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Eval::operator()(Sass::Supports_Operator*) in eval.cpp may cause a Denial of Service (application crash) via a crafted sass input file.
<p>Publish Date: 2018-12-17
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20190>CVE-2018-20190</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20190">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20190</a></p>
<p>Release Date: 2018-12-17</p>
<p>Fix Resolution: 3.6.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-20190 (Medium) detected in node-sass-v4.12.0 - ## CVE-2018-20190 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.12.0</b></p></summary>
<p>
<p>:rainbow: Node.js bindings to libsass</p>
<p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/davisboy/HighSpot/commit/9019d9002f21dd88fdbf0b531dd6e75c792cd560">9019d9002f21dd88fdbf0b531dd6e75c792cd560</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (66)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /HighSpot/node_modules/node-sass/src/libsass/src/expand.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/expand.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/factory.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/operators.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/boolean.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/util.hpp
- /HighSpot/node_modules/node-sass/src/sass_types/value.h
- /HighSpot/node_modules/node-sass/src/libsass/src/emitter.hpp
- /HighSpot/node_modules/node-sass/src/callback_bridge.h
- /HighSpot/node_modules/node-sass/src/libsass/src/file.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/sass.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/operation.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/operators.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/constants.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/error_handling.hpp
- /HighSpot/node_modules/node-sass/src/custom_importer_bridge.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/parser.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/constants.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/list.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/cssize.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/functions.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/util.cpp
- /HighSpot/node_modules/node-sass/src/custom_function_bridge.cpp
- /HighSpot/node_modules/node-sass/src/custom_importer_bridge.h
- /HighSpot/node_modules/node-sass/src/libsass/src/bind.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/eval.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/inspect.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/backtrace.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/extend.cpp
- /HighSpot/node_modules/node-sass/src/sass_context_wrapper.h
- /HighSpot/node_modules/node-sass/src/sass_types/sass_value_wrapper.h
- /HighSpot/node_modules/node-sass/src/libsass/src/error_handling.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/parser.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/debugger.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/emitter.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/number.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/color.h
- /HighSpot/node_modules/node-sass/src/libsass/src/sass_values.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/ast.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/output.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/check_nesting.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/null.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/functions.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/cssize.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/prelexer.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/ast.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/to_c.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/to_value.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/inspect.hpp
- /HighSpot/node_modules/node-sass/src/sass_types/color.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/values.cpp
- /HighSpot/node_modules/node-sass/src/sass_context_wrapper.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/list.h
- /HighSpot/node_modules/node-sass/src/libsass/src/check_nesting.hpp
- /HighSpot/node_modules/node-sass/src/sass_types/map.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/to_value.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/context.cpp
- /HighSpot/node_modules/node-sass/src/binding.cpp
- /HighSpot/node_modules/node-sass/src/sass_types/string.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/sass_context.cpp
- /HighSpot/node_modules/node-sass/src/libsass/src/prelexer.hpp
- /HighSpot/node_modules/node-sass/src/libsass/src/context.hpp
- /HighSpot/node_modules/node-sass/src/sass_types/boolean.h
- /HighSpot/node_modules/node-sass/src/libsass/src/eval.cpp
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Eval::operator()(Sass::Supports_Operator*) in eval.cpp may cause a Denial of Service (application crash) via a crafted sass input file.
<p>Publish Date: 2018-12-17
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20190>CVE-2018-20190</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20190">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20190</a></p>
<p>Release Date: 2018-12-17</p>
<p>Fix Resolution: 3.6.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in node sass cve medium severity vulnerability vulnerable library node rainbow node js bindings to libsass library home page a href found in head commit a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries highspot node modules node sass src libsass src expand hpp highspot node modules node sass src libsass src expand cpp highspot node modules node sass src sass types factory cpp highspot node modules node sass src libsass src operators cpp highspot node modules node sass src sass types boolean cpp highspot node modules node sass src libsass src util hpp highspot node modules node sass src sass types value h highspot node modules node sass src libsass src emitter hpp highspot node modules node sass src callback bridge h highspot node modules node sass src libsass src file cpp highspot node modules node sass src libsass src sass cpp highspot node modules node sass src libsass src operation hpp highspot node modules node sass src libsass src operators hpp highspot node modules node sass src libsass src constants hpp highspot node modules node sass src libsass src error handling hpp highspot node modules node sass src custom importer bridge cpp highspot node modules node sass src libsass src parser hpp highspot node modules node sass src libsass src constants cpp highspot node modules node sass src sass types list cpp highspot node modules node sass src libsass src cssize cpp highspot node modules node sass src libsass src functions hpp highspot node modules node sass src libsass src util cpp highspot node modules node sass src custom function bridge cpp highspot node modules node sass src custom importer bridge h highspot node modules node sass src libsass src bind cpp highspot node modules node sass src libsass src eval hpp highspot node modules node sass src libsass src inspect cpp highspot node modules node sass src libsass src backtrace cpp highspot node modules node sass src libsass src extend cpp highspot node modules node sass src sass context wrapper h highspot node modules node sass src sass types sass value wrapper h highspot node modules node sass src libsass src error handling cpp highspot node modules node sass src libsass src parser cpp highspot node modules node sass src libsass src debugger hpp highspot node modules node sass src libsass src emitter cpp highspot node modules node sass src sass types number cpp highspot node modules node sass src sass types color h highspot node modules node sass src libsass src sass values cpp highspot node modules node sass src libsass src ast hpp highspot node modules node sass src libsass src output cpp highspot node modules node sass src libsass src check nesting cpp highspot node modules node sass src sass types null cpp highspot node modules node sass src libsass src ast def macros hpp highspot node modules node sass src libsass src functions cpp highspot node modules node sass src libsass src cssize hpp highspot node modules node sass src libsass src prelexer cpp highspot node modules node sass src libsass src ast cpp highspot node modules node sass src libsass src to c cpp highspot node modules node sass src libsass src to value hpp highspot node modules node sass src libsass src ast fwd decl hpp highspot node modules node sass src libsass src inspect hpp highspot node modules node sass src sass types color cpp highspot node modules node sass src libsass src values cpp highspot node modules node sass src sass context wrapper cpp highspot node modules node sass src sass types list h highspot node modules node sass src libsass src check nesting hpp highspot node modules node sass src sass types map cpp highspot node modules node sass src libsass src to value cpp highspot node modules node sass src libsass src context cpp highspot node modules node sass src binding cpp highspot node modules node sass src sass types string cpp highspot node modules node sass src libsass src sass context cpp highspot node modules node sass src libsass src prelexer hpp highspot node modules node sass src libsass src context hpp highspot node modules node sass src sass types boolean h highspot node modules node sass src libsass src eval cpp vulnerability details in libsass a null pointer dereference in the function sass eval operator sass supports operator in eval cpp may cause a denial of service application crash via a crafted sass input file publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
3,359 | 5,557,325,319 | IssuesEvent | 2017-03-24 11:42:54 | tuna/issues | https://api.github.com/repos/tuna/issues | closed | Homebrew bottles ๅ
ๆ ๆณๆพๅฐๅบ่ชๅจ่ทณ่ฝฌ | Service Issue | ๅฆๆไธไธช bottle ๅจไธ้ข 404 not found๏ผไผ็ดๆฅๆฅๅคฑ่ดฅ๏ผๆญฃ็กฎ็ๆนๅผๆฏ่ทณ่ฝฌๅฐๅฎๆนๅฏนๅบ็ๅฐๅๅปไธ่ฝฝ:
```
==> Downloading https://mirrors.tuna.tsinghua.edu.cn/homebrew-bottles/bottles/awscli-1.11.64.sierra.bottle.tar.gz
curl: (22) The requested URL returned error: 404 Not Found
Error: Failed to download resource "awscli"
Download failed: https://mirrors.tuna.tsinghua.edu.cn/homebrew-bottles/bottles/awscli-1.11.64.sierra.bottle.tar.gz
Warning: Bottle installation failed: building from source.
```
USTC ็ๅค็ๆนๅผๆฏๅฏน็๏ผ
```
==> Upgrading awscli
==> Downloading https://mirrors.ustc.edu.cn/homebrew-bottles/bottles/awscli-1.11.64.sierra.bottle.tar.gz
==> Downloading from https://homebrew.bintray.com/bottles/awscli-1.11.64.sierra.bottle.tar.gz
######################################################################## 100.0%
==> Pouring awscli-1.11.64.sierra.bottle.tar.gz
``` | 1.0 | Homebrew bottles ๅ
ๆ ๆณๆพๅฐๅบ่ชๅจ่ทณ่ฝฌ - ๅฆๆไธไธช bottle ๅจไธ้ข 404 not found๏ผไผ็ดๆฅๆฅๅคฑ่ดฅ๏ผๆญฃ็กฎ็ๆนๅผๆฏ่ทณ่ฝฌๅฐๅฎๆนๅฏนๅบ็ๅฐๅๅปไธ่ฝฝ:
```
==> Downloading https://mirrors.tuna.tsinghua.edu.cn/homebrew-bottles/bottles/awscli-1.11.64.sierra.bottle.tar.gz
curl: (22) The requested URL returned error: 404 Not Found
Error: Failed to download resource "awscli"
Download failed: https://mirrors.tuna.tsinghua.edu.cn/homebrew-bottles/bottles/awscli-1.11.64.sierra.bottle.tar.gz
Warning: Bottle installation failed: building from source.
```
USTC ็ๅค็ๆนๅผๆฏๅฏน็๏ผ
```
==> Upgrading awscli
==> Downloading https://mirrors.ustc.edu.cn/homebrew-bottles/bottles/awscli-1.11.64.sierra.bottle.tar.gz
==> Downloading from https://homebrew.bintray.com/bottles/awscli-1.11.64.sierra.bottle.tar.gz
######################################################################## 100.0%
==> Pouring awscli-1.11.64.sierra.bottle.tar.gz
``` | non_priority | homebrew bottles ๅ
ๆ ๆณๆพๅฐๅบ่ชๅจ่ทณ่ฝฌ ๅฆๆไธไธช bottle ๅจไธ้ข not found๏ผไผ็ดๆฅๆฅๅคฑ่ดฅ๏ผๆญฃ็กฎ็ๆนๅผๆฏ่ทณ่ฝฌๅฐๅฎๆนๅฏนๅบ็ๅฐๅๅปไธ่ฝฝ downloading curl the requested url returned error not found error failed to download resource awscli download failed warning bottle installation failed building from source ustc ็ๅค็ๆนๅผๆฏๅฏน็๏ผ upgrading awscli downloading downloading from pouring awscli sierra bottle tar gz | 0 |
615,629 | 19,270,831,502 | IssuesEvent | 2021-12-10 05:03:01 | GuillermoFloresV/Project3_Group12_Backend | https://api.github.com/repos/GuillermoFloresV/Project3_Group12_Backend | closed | Accept Project | Priority: 5 Difficulty: 3 | As a User I want to be able to see who has requested my Projects and accept the request.
How will it be tested:
API endpoints will be tested with Postman. Request and Response verification.
| 1.0 | Accept Project - As a User I want to be able to see who has requested my Projects and accept the request.
How will it be tested:
API endpoints will be tested with Postman. Request and Response verification.
| priority | accept project as a user i want to be able to see who has requested my projects and accept the request how will it be tested api endpoints will be tested with postman request and response verification | 1 |
9,343 | 3,036,945,460 | IssuesEvent | 2015-08-06 14:42:50 | SonarSource/sonarlint-vs | https://api.github.com/repos/SonarSource/sonarlint-vs | closed | Rule: Fields should not be initialized to default values | in test & review rule | Replaces http://jira.sonarsource.com/browse/LINTVS-98
A reference type field is automatically initialized to `null`, while a value type is initialized to the default value of the type. So initializing a field to its default value is useless. This initialization can happen both in a field initializer or in the constructor.
R# only reports on field initializers, and not constructor ones (it might not be that simple to recognize the latter).
```
class X
{
public int field = 0; //Noncompliant, it is already 0, it has a minor performance impact that we reinitialize
public object o = null; //Noncompliant (R# doesn't warn on this one)
}
```
R# ID: *RedundantDefaultFieldInitializer*
http://www.codeproject.com/Articles/10439/Gain-performance-by-not-initializing-variables
http://blog.codinghorror.com/for-best-results-dont-initialize-variables/
Implements http://jira.sonarsource.com/browse/RSPEC-3052 | 1.0 | Rule: Fields should not be initialized to default values - Replaces http://jira.sonarsource.com/browse/LINTVS-98
A reference type field is automatically initialized to `null`, while a value type is initialized to the default value of the type. So initializing a field to its default value is useless. This initialization can happen both in a field initializer or in the constructor.
R# only reports on field initializers, and not constructor ones (it might not be that simple to recognize the latter).
```
class X
{
public int field = 0; //Noncompliant, it is already 0, it has a minor performance impact that we reinitialize
public object o = null; //Noncompliant (R# doesn't warn on this one)
}
```
R# ID: *RedundantDefaultFieldInitializer*
http://www.codeproject.com/Articles/10439/Gain-performance-by-not-initializing-variables
http://blog.codinghorror.com/for-best-results-dont-initialize-variables/
Implements http://jira.sonarsource.com/browse/RSPEC-3052 | non_priority | rule fields should not be initialized to default values replaces a reference type field is automatically initialized to null while a value type is initialized to the default value of the type so initializing a field to its default value is useless this initialization can happen both in a field initializer or in the constructor r only reports on field initializers and not constructor ones it might not be that simple to recognize the latter class x public int field noncompliant it is already it has a minor performance impact that we reinitialize public object o null noncompliant r doesn t warn on this one r id redundantdefaultfieldinitializer implements | 0 |
147,461 | 19,522,821,805 | IssuesEvent | 2021-12-29 22:26:44 | swagger-api/swagger-codegen | https://api.github.com/repos/swagger-api/swagger-codegen | opened | CVE-2020-36187 (High) detected in multiple libraries | security vulnerability | ## CVE-2020-36187 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.8.8.jar</b>, <b>jackson-databind-2.8.9.jar</b>, <b>jackson-databind-2.6.4.jar</b>, <b>jackson-databind-2.4.5.jar</b>, <b>jackson-databind-2.7.8.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.8.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.8.jar</p>
<p>
Dependency Hierarchy:
- finch-circe_2.11-0.15.1.jar (Root Library)
- circe-jackson28_2.11-0.8.0.jar
- :x: **jackson-databind-2.8.8.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.8.9.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.9.jar</p>
<p>
Dependency Hierarchy:
- play-guice_2.12-2.6.3.jar (Root Library)
- play_2.12-2.6.3.jar
- :x: **jackson-databind-2.8.9.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.6.4.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/java/jersey1/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar,/aches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.6.4.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.4.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/scala/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar</p>
<p>
Dependency Hierarchy:
- swagger-core-1.5.8.jar (Root Library)
- :x: **jackson-databind-2.4.5.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.7.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.7.8.jar</p>
<p>
Dependency Hierarchy:
- lagom-scaladsl-api_2.11-1.3.8.jar (Root Library)
- lagom-api_2.11-1.3.8.jar
- play_2.11-2.5.13.jar
- :x: **jackson-databind-2.7.8.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/swagger-api/swagger-codegen/commit/4b7a8d7d7384aa6a27d6309c35ade0916edae7ed">4b7a8d7d7384aa6a27d6309c35ade0916edae7ed</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.
<p>Publish Date: 2021-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187>CVE-2020-36187</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2997">https://github.com/FasterXML/jackson-databind/issues/2997</a></p>
<p>Release Date: 2021-01-06</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.github.finagle:finch-circe_2.11:0.15.1;io.circe:circe-jackson28_2.11:0.8.0;com.fasterxml.jackson.core:jackson-databind:2.8.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.9","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.typesafe.play:play-guice_2.12:2.6.3;com.typesafe.play:play_2.12:2.6.3;com.fasterxml.jackson.core:jackson-databind:2.8.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.4","packageFilePaths":["/samples/client/petstore/java/jersey1/build.gradle"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.6.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.4.5","packageFilePaths":["/samples/client/petstore/scala/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.swagger:swagger-core:1.5.8;com.fasterxml.jackson.core:jackson-databind:2.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.7.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.lightbend.lagom:lagom-scaladsl-api_2.11:1.3.8;com.lightbend.lagom:lagom-api_2.11:1.3.8;com.typesafe.play:play_2.11:2.5.13;com.fasterxml.jackson.core:jackson-databind:2.7.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36187","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-36187 (High) detected in multiple libraries - ## CVE-2020-36187 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.8.8.jar</b>, <b>jackson-databind-2.8.9.jar</b>, <b>jackson-databind-2.6.4.jar</b>, <b>jackson-databind-2.4.5.jar</b>, <b>jackson-databind-2.7.8.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.8.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.8.jar</p>
<p>
Dependency Hierarchy:
- finch-circe_2.11-0.15.1.jar (Root Library)
- circe-jackson28_2.11-0.8.0.jar
- :x: **jackson-databind-2.8.8.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.8.9.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.9.jar</p>
<p>
Dependency Hierarchy:
- play-guice_2.12-2.6.3.jar (Root Library)
- play_2.12-2.6.3.jar
- :x: **jackson-databind-2.8.9.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.6.4.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/java/jersey1/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar,/aches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.6.4.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.4.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/scala/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar</p>
<p>
Dependency Hierarchy:
- swagger-core-1.5.8.jar (Root Library)
- :x: **jackson-databind-2.4.5.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.7.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.7.8.jar</p>
<p>
Dependency Hierarchy:
- lagom-scaladsl-api_2.11-1.3.8.jar (Root Library)
- lagom-api_2.11-1.3.8.jar
- play_2.11-2.5.13.jar
- :x: **jackson-databind-2.7.8.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/swagger-api/swagger-codegen/commit/4b7a8d7d7384aa6a27d6309c35ade0916edae7ed">4b7a8d7d7384aa6a27d6309c35ade0916edae7ed</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.
<p>Publish Date: 2021-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187>CVE-2020-36187</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2997">https://github.com/FasterXML/jackson-databind/issues/2997</a></p>
<p>Release Date: 2021-01-06</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.github.finagle:finch-circe_2.11:0.15.1;io.circe:circe-jackson28_2.11:0.8.0;com.fasterxml.jackson.core:jackson-databind:2.8.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.9","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.typesafe.play:play-guice_2.12:2.6.3;com.typesafe.play:play_2.12:2.6.3;com.fasterxml.jackson.core:jackson-databind:2.8.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.4","packageFilePaths":["/samples/client/petstore/java/jersey1/build.gradle"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.6.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.4.5","packageFilePaths":["/samples/client/petstore/scala/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.swagger:swagger-core:1.5.8;com.fasterxml.jackson.core:jackson-databind:2.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.7.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.lightbend.lagom:lagom-scaladsl-api_2.11:1.3.8;com.lightbend.lagom:lagom-api_2.11:1.3.8;com.typesafe.play:play_2.11:2.5.13;com.fasterxml.jackson.core:jackson-databind:2.7.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36187","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cache com fasterxml jackson core jackson databind bundles jackson databind jar dependency hierarchy finch circe jar root library circe jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cache com fasterxml jackson core jackson databind bundles jackson databind jar dependency hierarchy play guice jar root library play jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file samples client petstore java build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar aches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file samples client petstore scala build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy swagger core jar root library x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cache com fasterxml jackson core jackson databind bundles jackson databind jar dependency hierarchy lagom scaladsl api jar root library lagom api jar play jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp dbcp datasources sharedpooldatasource publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com github finagle finch circe io circe circe com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency true dependencytree com typesafe play play guice com typesafe play play com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency true dependencytree io swagger swagger core com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency true dependencytree com lightbend lagom lagom scaladsl api com lightbend lagom lagom api com typesafe play play com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp dbcp datasources sharedpooldatasource vulnerabilityurl | 0 |
755,604 | 26,434,323,663 | IssuesEvent | 2023-01-15 07:17:14 | fredo-ai/Fredo-Public | https://api.github.com/repos/fredo-ai/Fredo-Public | closed | Email verification code improvement | priority-1 current sprint | 1. Add a big button "Verify Email" to the end of the email template
2 Button should link to Whatsapp + append the pre-text with the 4 digit code. that way user can click -> redirected to Fredo bot on whatsapp -> the code already in the text box he just need to send.
See example: https://wa.me/972525277961?text=5555 | 1.0 | Email verification code improvement - 1. Add a big button "Verify Email" to the end of the email template
2 Button should link to Whatsapp + append the pre-text with the 4 digit code. that way user can click -> redirected to Fredo bot on whatsapp -> the code already in the text box he just need to send.
See example: https://wa.me/972525277961?text=5555 | priority | email verification code improvement add a big button verify email to the end of the email template button should link to whatsapp append the pre text with the digit code that way user can click redirected to fredo bot on whatsapp the code already in the text box he just need to send see example | 1 |
270,840 | 29,116,092,348 | IssuesEvent | 2023-05-17 01:11:12 | pazhanivel07/frameworks_base_Aosp10_r33 | https://api.github.com/repos/pazhanivel07/frameworks_base_Aosp10_r33 | opened | CVE-2023-21110 (Medium) detected in baseandroid-10.0.0_r46 | Mend: dependency security vulnerability | ## CVE-2023-21110 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r46</b></p></summary>
<p>
<p>Android framework classes and services</p>
<p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/services/core/java/com/android/server/notification/SnoozeHelper.java</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In several functions of SnoozeHelper.java, there is a possible way to grant notifications access due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-258422365
<p>Publish Date: 2023-05-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-21110>CVE-2023-21110</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/e0de4236a68cbfc4052cc034093209f943824ca0">https://android.googlesource.com/platform/frameworks/base/+/e0de4236a68cbfc4052cc034093209f943824ca0</a></p>
<p>Release Date: 2023-05-15</p>
<p>Fix Resolution: android-13.0.0_r49</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2023-21110 (Medium) detected in baseandroid-10.0.0_r46 - ## CVE-2023-21110 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r46</b></p></summary>
<p>
<p>Android framework classes and services</p>
<p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/services/core/java/com/android/server/notification/SnoozeHelper.java</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In several functions of SnoozeHelper.java, there is a possible way to grant notifications access due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-258422365
<p>Publish Date: 2023-05-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-21110>CVE-2023-21110</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/e0de4236a68cbfc4052cc034093209f943824ca0">https://android.googlesource.com/platform/frameworks/base/+/e0de4236a68cbfc4052cc034093209f943824ca0</a></p>
<p>Release Date: 2023-05-15</p>
<p>Fix Resolution: android-13.0.0_r49</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in baseandroid cve medium severity vulnerability vulnerable library baseandroid android framework classes and services library home page a href found in base branch master vulnerable source files services core java com android server notification snoozehelper java vulnerability details in several functions of snoozehelper java there is a possible way to grant notifications access due to resource exhaustion this could lead to local escalation of privilege with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with mend | 0 |
221,063 | 7,373,455,961 | IssuesEvent | 2018-03-13 17:19:07 | VanilleBid/weekly-saleor | https://api.github.com/repos/VanilleBid/weekly-saleor | opened | Be able to get a permalink to cart | Dashboard Feature Front-store Moderate Priority | In the cart view we should be able to generate a link to create the exact same cart.
Also, the staff should be able to generate carts from the back office. | 1.0 | Be able to get a permalink to cart - In the cart view we should be able to generate a link to create the exact same cart.
Also, the staff should be able to generate carts from the back office. | priority | be able to get a permalink to cart in the cart view we should be able to generate a link to create the exact same cart also the staff should be able to generate carts from the back office | 1 |
404,478 | 27,488,234,793 | IssuesEvent | 2023-03-04 09:53:13 | NixOS/nix | https://api.github.com/repos/NixOS/nix | opened | nix repl command completeness | documentation | ## Problem
The fidelity between the implemented nix repl commands and the repl documentation is not 100%.
In the file for #7661 pull request you can see some suggested changes to the shown repl documentation for the `:?` command.
## Checklist
As advised by @edolstra this gap should be closed in conjunction with moving the documentation to `repl.md` and linking that to the `:?` command via `ShowHelp()` in `main.cc`.
<!-- make sure this issue is not redundant or obsolete -->
- [ ] checked [latest Nix manual] \([source])
- [ ] checked [open documentation issues and pull requests] for possible duplicates
[latest Nix manual]: https://nixos.org/manual/nix/unstable/
[source]: https://github.com/NixOS/nix/tree/master/doc/manual/src
[open documentation issues and pull requests]: https://github.com/NixOS/nix/labels/documentation
## Proposal
<!-- propose a solution -->
## Priorities
Add :+1: to [issues you find important](https://github.com/NixOS/nix/issues?q=is%3Aissue+is%3Aopen+sort%3Areactions-%2B1-desc).
| 1.0 | nix repl command completeness - ## Problem
The fidelity between the implemented nix repl commands and the repl documentation is not 100%.
In the file for #7661 pull request you can see some suggested changes to the shown repl documentation for the `:?` command.
## Checklist
As advised by @edolstra this gap should be closed in conjunction with moving the documentation to `repl.md` and linking that to the `:?` command via `ShowHelp()` in `main.cc`.
<!-- make sure this issue is not redundant or obsolete -->
- [ ] checked [latest Nix manual] \([source])
- [ ] checked [open documentation issues and pull requests] for possible duplicates
[latest Nix manual]: https://nixos.org/manual/nix/unstable/
[source]: https://github.com/NixOS/nix/tree/master/doc/manual/src
[open documentation issues and pull requests]: https://github.com/NixOS/nix/labels/documentation
## Proposal
<!-- propose a solution -->
## Priorities
Add :+1: to [issues you find important](https://github.com/NixOS/nix/issues?q=is%3Aissue+is%3Aopen+sort%3Areactions-%2B1-desc).
| non_priority | nix repl command completeness problem the fidelity between the implemented nix repl commands and the repl documentation is not in the file for pull request you can see some suggested changes to the shown repl documentation for the command checklist as advised by edolstra this gap should be closed in conjunction with moving the documentation to repl md and linking that to the command via showhelp in main cc checked checked for possible duplicates proposal priorities add to | 0 |
173,541 | 21,176,829,654 | IssuesEvent | 2022-04-08 01:27:53 | chaitanya00/aem-wknd | https://api.github.com/repos/chaitanya00/aem-wknd | opened | CVE-2022-21681 (High) detected in marked-0.3.5.tgz | security vulnerability | ## CVE-2022-21681 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-0.3.5.tgz</b></p></summary>
<p>A markdown parser built for speed</p>
<p>Library home page: <a href="https://registry.npmjs.org/marked/-/marked-0.3.5.tgz">https://registry.npmjs.org/marked/-/marked-0.3.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/marked/package.json</p>
<p>
Dependency Hierarchy:
- :x: **marked-0.3.5.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
<p>Publish Date: 2022-01-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-21681>CVE-2022-21681</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-5v2h-r2cx-5xgj">https://github.com/advisories/GHSA-5v2h-r2cx-5xgj</a></p>
<p>Release Date: 2022-01-14</p>
<p>Fix Resolution: marked - 4.0.10</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-21681 (High) detected in marked-0.3.5.tgz - ## CVE-2022-21681 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-0.3.5.tgz</b></p></summary>
<p>A markdown parser built for speed</p>
<p>Library home page: <a href="https://registry.npmjs.org/marked/-/marked-0.3.5.tgz">https://registry.npmjs.org/marked/-/marked-0.3.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/marked/package.json</p>
<p>
Dependency Hierarchy:
- :x: **marked-0.3.5.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
<p>Publish Date: 2022-01-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-21681>CVE-2022-21681</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-5v2h-r2cx-5xgj">https://github.com/advisories/GHSA-5v2h-r2cx-5xgj</a></p>
<p>Release Date: 2022-01-14</p>
<p>Fix Resolution: marked - 4.0.10</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in marked tgz cve high severity vulnerability vulnerable library marked tgz a markdown parser built for speed library home page a href path to dependency file package json path to vulnerable library node modules marked package json dependency hierarchy x marked tgz vulnerable library found in base branch master vulnerability details marked is a markdown parser and compiler prior to version the regular expression inline reflinksearch may cause catastrophic backtracking against some strings and lead to a denial of service dos anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected this issue is patched in version as a workaround avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution marked step up your open source security game with whitesource | 0 |
461,681 | 13,234,376,387 | IssuesEvent | 2020-08-18 16:11:41 | modulz/stitches | https://api.github.com/repos/modulz/stitches | closed | Cannot style a component that uses hooks | POC: bug priority: 1 | > Invalid hook call. Hooks can only be called inside of the body of a function component.
https://codesandbox.io/s/dreamy-visvesvaraya-hqt0u | 1.0 | Cannot style a component that uses hooks - > Invalid hook call. Hooks can only be called inside of the body of a function component.
https://codesandbox.io/s/dreamy-visvesvaraya-hqt0u | priority | cannot style a component that uses hooks invalid hook call hooks can only be called inside of the body of a function component | 1 |
34,336 | 7,447,128,035 | IssuesEvent | 2018-03-28 11:27:02 | kerdokullamae/test_koik_issued | https://api.github.com/repos/kerdokullamae/test_koik_issued | closed | Imporditud andmete probleem | P: high R: fixed T: defect | **Reported by sven syld on 27 Aug 2012 12:43 UTC**
'''Object'''
AISist imporditud andmed - asutused-isikud, kirjeldusรผksused jne.
'''Description'''
Andmetes leidub naljakaid asju - "...atsioon. \x0d\x0a\x0d\x0a17.dets.1919 ..." ([link](http://dev.dira.teepub/et/person/view/110000009088?name_first_letter=P&name=politsei)).
Probleem tekib andmete vรคljastamisel AIS-ist PG-sse, tรคpsemini AIS-i expordil ([link](http://infocenter.sybase.com/help/index.jsp?topic=/com.sybase.infocenter.dc38151.1270/html/iqref/Output.htm))
'''Todo'''
Parandada ja lasta import uuesti kรคima. | 1.0 | Imporditud andmete probleem - **Reported by sven syld on 27 Aug 2012 12:43 UTC**
'''Object'''
AISist imporditud andmed - asutused-isikud, kirjeldusรผksused jne.
'''Description'''
Andmetes leidub naljakaid asju - "...atsioon. \x0d\x0a\x0d\x0a17.dets.1919 ..." ([link](http://dev.dira.teepub/et/person/view/110000009088?name_first_letter=P&name=politsei)).
Probleem tekib andmete vรคljastamisel AIS-ist PG-sse, tรคpsemini AIS-i expordil ([link](http://infocenter.sybase.com/help/index.jsp?topic=/com.sybase.infocenter.dc38151.1270/html/iqref/Output.htm))
'''Todo'''
Parandada ja lasta import uuesti kรคima. | non_priority | imporditud andmete probleem reported by sven syld on aug utc object aisist imporditud andmed asutused isikud kirjeldusรผksused jne description andmetes leidub naljakaid asju atsioon dets probleem tekib andmete vรคljastamisel ais ist pg sse tรคpsemini ais i expordil todo parandada ja lasta import uuesti kรคima | 0 |
255,108 | 8,108,831,037 | IssuesEvent | 2018-08-14 04:12:56 | Crizov/HealthClientApp | https://api.github.com/repos/Crizov/HealthClientApp | opened | US111 - Upload supplementary files from local storage | priority: H size: 3 | As a patient I want to upload supplementary files from local storage so that I can add local files to the data packet
**Acceptance Criteria:**
1. on the create packet screen, add a section that allows a user to upload a file.
2. When "select file" button is pressed, open the phone's local file explorer.
3. allow user to select a file, and get the selected file's ref.
4. when data packet is sent, save the file to firebase using the file ref | 1.0 | US111 - Upload supplementary files from local storage - As a patient I want to upload supplementary files from local storage so that I can add local files to the data packet
**Acceptance Criteria:**
1. on the create packet screen, add a section that allows a user to upload a file.
2. When "select file" button is pressed, open the phone's local file explorer.
3. allow user to select a file, and get the selected file's ref.
4. when data packet is sent, save the file to firebase using the file ref | priority | upload supplementary files from local storage as a patient i want to upload supplementary files from local storage so that i can add local files to the data packet acceptance criteria on the create packet screen add a section that allows a user to upload a file when select file button is pressed open the phone s local file explorer allow user to select a file and get the selected file s ref when data packet is sent save the file to firebase using the file ref | 1 |
32,406 | 12,126,069,022 | IssuesEvent | 2020-04-22 16:26:38 | mixcore/mix.core | https://api.github.com/repos/mixcore/mix.core | closed | CVE-2018-19838 (Medium) detected in node-sass-4.13.0.tgz, node-sass-0bd48bbad6fccb0da16d3bdf76ad541f5f45ec70 | security vulnerability | ## CVE-2018-19838 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.13.0.tgz</b></p></summary>
<p>
<details><summary><b>node-sass-4.13.0.tgz</b></p></summary>
<p>Wrapper around libsass</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.13.0.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.13.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/mix.core/src/WebApplication1/ClientApp/package.json</p>
<p>Path to vulnerable library: /mix.core/src/WebApplication1/ClientApp/node_modules/node-sass/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-sass-4.13.0.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/mixcore/mix.core/commit/bd312c87103111cf005a36a25823c65e1c23669f">bd312c87103111cf005a36a25823c65e1c23669f</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In LibSass prior to 3.5.5, functions inside ast.cpp for IMPLEMENT_AST_OPERATORS expansion allow attackers to cause a denial-of-service resulting from stack consumption via a crafted sass file, as demonstrated by recursive calls involving clone(), cloneChildren(), and copy().
<p>Publish Date: 2018-12-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19838>CVE-2018-19838</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sass/libsass/blob/3.6.0/src/ast.cpp">https://github.com/sass/libsass/blob/3.6.0/src/ast.cpp</a></p>
<p>Release Date: 2019-07-01</p>
<p>Fix Resolution: LibSass - 3.6.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-19838 (Medium) detected in node-sass-4.13.0.tgz, node-sass-0bd48bbad6fccb0da16d3bdf76ad541f5f45ec70 - ## CVE-2018-19838 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.13.0.tgz</b></p></summary>
<p>
<details><summary><b>node-sass-4.13.0.tgz</b></p></summary>
<p>Wrapper around libsass</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.13.0.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.13.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/mix.core/src/WebApplication1/ClientApp/package.json</p>
<p>Path to vulnerable library: /mix.core/src/WebApplication1/ClientApp/node_modules/node-sass/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-sass-4.13.0.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/mixcore/mix.core/commit/bd312c87103111cf005a36a25823c65e1c23669f">bd312c87103111cf005a36a25823c65e1c23669f</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In LibSass prior to 3.5.5, functions inside ast.cpp for IMPLEMENT_AST_OPERATORS expansion allow attackers to cause a denial-of-service resulting from stack consumption via a crafted sass file, as demonstrated by recursive calls involving clone(), cloneChildren(), and copy().
<p>Publish Date: 2018-12-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19838>CVE-2018-19838</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sass/libsass/blob/3.6.0/src/ast.cpp">https://github.com/sass/libsass/blob/3.6.0/src/ast.cpp</a></p>
<p>Release Date: 2019-07-01</p>
<p>Fix Resolution: LibSass - 3.6.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in node sass tgz node sass cve medium severity vulnerability vulnerable libraries node sass tgz node sass tgz wrapper around libsass library home page a href path to dependency file tmp ws scm mix core src clientapp package json path to vulnerable library mix core src clientapp node modules node sass package json dependency hierarchy x node sass tgz vulnerable library found in head commit a href vulnerability details in libsass prior to functions inside ast cpp for implement ast operators expansion allow attackers to cause a denial of service resulting from stack consumption via a crafted sass file as demonstrated by recursive calls involving clone clonechildren and copy publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass step up your open source security game with whitesource | 0 |
151,684 | 19,664,002,893 | IssuesEvent | 2022-01-10 20:11:42 | Gabriel-Alves-Cunha/muse | https://api.github.com/repos/Gabriel-Alves-Cunha/muse | closed | CVE-2021-35065 (High) detected in glob-parent-5.1.2.tgz - autoclosed | security vulnerability | ## CVE-2021-35065 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>glob-parent-5.1.2.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- chokidar-3.5.2.tgz (Root Library)
- :x: **glob-parent-5.1.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gabriel-Alves-Cunha/muse/commit/6139357f20c3af950c6fc254ef36acf77bb8c8b6">6139357f20c3af950c6fc254ef36acf77bb8c8b6</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/gulpjs/glob-parent/pull/49">https://github.com/gulpjs/glob-parent/pull/49</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution: glob-parent - 6.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-35065 (High) detected in glob-parent-5.1.2.tgz - autoclosed - ## CVE-2021-35065 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>glob-parent-5.1.2.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- chokidar-3.5.2.tgz (Root Library)
- :x: **glob-parent-5.1.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gabriel-Alves-Cunha/muse/commit/6139357f20c3af950c6fc254ef36acf77bb8c8b6">6139357f20c3af950c6fc254ef36acf77bb8c8b6</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/gulpjs/glob-parent/pull/49">https://github.com/gulpjs/glob-parent/pull/49</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution: glob-parent - 6.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in glob parent tgz autoclosed cve high severity vulnerability vulnerable library glob parent tgz extract the non magic parent path from a glob string library home page a href path to dependency file package json path to vulnerable library node modules glob parent package json dependency hierarchy chokidar tgz root library x glob parent tgz vulnerable library found in head commit a href found in base branch main vulnerability details the package glob parent before are vulnerable to regular expression denial of service redos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent step up your open source security game with whitesource | 0 |
57,523 | 14,165,340,302 | IssuesEvent | 2020-11-12 07:02:44 | NixOS/nixpkgs | https://api.github.com/repos/NixOS/nixpkgs | closed | Vulnerability roundup 84: openvpn-2.4.7: 2 advisories | 1.severity: security | [search](https://search.nix.gsc.io/?q=openvpn&i=fosho&repos=NixOS-nixpkgs), [files](https://github.com/NixOS/nixpkgs/search?utf8=%E2%9C%93&q=openvpn+in%3Apath&type=Code)
* [ ] [CVE-2020-7224](https://nvd.nist.gov/vuln/detail/CVE-2020-7224) CVSSv3=9.8 (nixos-19.09)
* [ ] [CVE-2020-11810](https://nvd.nist.gov/vuln/detail/CVE-2020-11810) CVSSv3=3.7 (nixos-19.09)
Scanned versions: nixos-19.09: 31dcaa5eb67. May contain false positives.
| True | Vulnerability roundup 84: openvpn-2.4.7: 2 advisories - [search](https://search.nix.gsc.io/?q=openvpn&i=fosho&repos=NixOS-nixpkgs), [files](https://github.com/NixOS/nixpkgs/search?utf8=%E2%9C%93&q=openvpn+in%3Apath&type=Code)
* [ ] [CVE-2020-7224](https://nvd.nist.gov/vuln/detail/CVE-2020-7224) CVSSv3=9.8 (nixos-19.09)
* [ ] [CVE-2020-11810](https://nvd.nist.gov/vuln/detail/CVE-2020-11810) CVSSv3=3.7 (nixos-19.09)
Scanned versions: nixos-19.09: 31dcaa5eb67. May contain false positives.
| non_priority | vulnerability roundup openvpn advisories nixos nixos scanned versions nixos may contain false positives | 0 |
197,875 | 6,965,633,831 | IssuesEvent | 2017-12-09 08:53:07 | openfoodfacts/openfoodfacts-androidapp | https://api.github.com/repos/openfoodfacts/openfoodfacts-androidapp | opened | The Storage Permission is asked at the wrong time | permissions priority | The Storage Permission is asked at the wrong time, and thus scary. It is asked when you land on an existing product page.
**Why would I possibly need the storage permission to view a product ?**
- We only need it when **adding a new product from images already on the device**.
- Otherwise, **if adding a new product from the camera, we only need the camera**.
- **If adding additional photos to an existing product**, we can show the permission request **when the users clicks on the "Add more photos" button** | 1.0 | The Storage Permission is asked at the wrong time - The Storage Permission is asked at the wrong time, and thus scary. It is asked when you land on an existing product page.
**Why would I possibly need the storage permission to view a product ?**
- We only need it when **adding a new product from images already on the device**.
- Otherwise, **if adding a new product from the camera, we only need the camera**.
- **If adding additional photos to an existing product**, we can show the permission request **when the users clicks on the "Add more photos" button** | priority | the storage permission is asked at the wrong time the storage permission is asked at the wrong time and thus scary it is asked when you land on an existing product page why would i possibly need the storage permission to view a product we only need it when adding a new product from images already on the device otherwise if adding a new product from the camera we only need the camera if adding additional photos to an existing product we can show the permission request when the users clicks on the add more photos button | 1 |
419,607 | 28,148,710,465 | IssuesEvent | 2023-04-02 19:41:35 | apache/streampipes | https://api.github.com/repos/apache/streampipes | closed | Extend Python docs with dark mode | good first issue documentation | ### Body
Our [Python docs](https://github.com/apache/streampipes/tree/dev/streampipes-client-python/docs) are built using [mkdocs-material](https://squidfunk.github.io/mkdocs-material/).
This allows to easily configure a dark mode as described here: https://squidfunk.github.io/mkdocs-material/setup/changing-the-colors/?h=dark+mode#color-palette-toggle
This issue is about configuring the dark mode for our Python docs via the [mkdocs.yml](https://github.com/apache/streampipes/blob/dev/streampipes-client-python/mkdocs.yml). Please pay some attention on the selected primary and accent color for the dark theme.
### Monitoring
As this issue is marked as good first issue: one of @SvenO3 , or @bossenti are happy to provide help for getting started, just tag (one of) them if you want to start working on this issue and need some help.
This issue is ideal for people that are interested in getting started with StreamPipes, and want to get a little hands-on to our Python library.
### StreamPipes Committer
I acknowledge that I am a maintainer/committer of the Apache StreamPipes project. | 1.0 | Extend Python docs with dark mode - ### Body
Our [Python docs](https://github.com/apache/streampipes/tree/dev/streampipes-client-python/docs) are built using [mkdocs-material](https://squidfunk.github.io/mkdocs-material/).
This allows to easily configure a dark mode as described here: https://squidfunk.github.io/mkdocs-material/setup/changing-the-colors/?h=dark+mode#color-palette-toggle
This issue is about configuring the dark mode for our Python docs via the [mkdocs.yml](https://github.com/apache/streampipes/blob/dev/streampipes-client-python/mkdocs.yml). Please pay some attention on the selected primary and accent color for the dark theme.
### Monitoring
As this issue is marked as good first issue: one of @SvenO3 , or @bossenti are happy to provide help for getting started, just tag (one of) them if you want to start working on this issue and need some help.
This issue is ideal for people that are interested in getting started with StreamPipes, and want to get a little hands-on to our Python library.
### StreamPipes Committer
I acknowledge that I am a maintainer/committer of the Apache StreamPipes project. | non_priority | extend python docs with dark mode body our are built using this allows to easily configure a dark mode as described here this issue is about configuring the dark mode for our python docs via the please pay some attention on the selected primary and accent color for the dark theme monitoring as this issue is marked as good first issue one of or bossenti are happy to provide help for getting started just tag one of them if you want to start working on this issue and need some help this issue is ideal for people that are interested in getting started with streampipes and want to get a little hands on to our python library streampipes committer i acknowledge that i am a maintainer committer of the apache streampipes project | 0 |
601,355 | 18,400,993,820 | IssuesEvent | 2021-10-12 16:16:31 | tnc-ca-geo/animl-frontend | https://api.github.com/repos/tnc-ca-geo/animl-frontend | opened | Fix view saving bug: explicitly bake currently selected camera & deployment into filters | bug high priority | Currently when creating a view that includes all currently available cameras & deployments, the filters saved for that view for cameras & deployments will be "null", which means that all new cameras/deps that get added after that will be included in that view. Maybe when you save a view, bake the currently selected cams and deps into the filter? | 1.0 | Fix view saving bug: explicitly bake currently selected camera & deployment into filters - Currently when creating a view that includes all currently available cameras & deployments, the filters saved for that view for cameras & deployments will be "null", which means that all new cameras/deps that get added after that will be included in that view. Maybe when you save a view, bake the currently selected cams and deps into the filter? | priority | fix view saving bug explicitly bake currently selected camera deployment into filters currently when creating a view that includes all currently available cameras deployments the filters saved for that view for cameras deployments will be null which means that all new cameras deps that get added after that will be included in that view maybe when you save a view bake the currently selected cams and deps into the filter | 1 |
9,640 | 30,110,342,207 | IssuesEvent | 2023-06-30 07:11:38 | DevExpress/testcafe | https://api.github.com/repos/DevExpress/testcafe | closed | In nativeAutomation, setFileUpload does nothing | TYPE: bug FREQUENCY: level 1 SYSTEM: native automation | ### What is your Scenario?
Scenario need to upload a file
### What is the Current behavior?
await t.setFileUpload does nothing
### What is the Expected behavior?
await t.setFileUpload sets the file to upload
### What isย your public website URL? (or attach your complete example)
https://www.htmlquick.com/reference/tags/input-file.html
### What isย your TestCafeย test code?
import { Selector } from 'testcafe';
fixture `Sandbox`
test('fileinput', async t =>{
await t.navigateTo("https://www.htmlquick.com/reference/tags/input-file.html");
await t.maximizeWindow();
var input = "[name='uploadedfile']";
await t.setFilesToUpload(input, "C:\\Windows\\win.ini");
await t.expect (Selector(input).value).contains("win.ini")
//await t.click('[value="Send data"]');
//await t.expect(Selector('caption').innerText).contains('Uploaded files');
await t.debug();
})
### Your complete configuration file
"skipJsErrors": true,
### Your complete test report
_No response_
### Screenshots
_No response_
### Steps to Reproduce
I have the same issue on a server that I cannot share so I tried to find a public website to reproduce.
Here the sendData is failing because of target='blank' under nativeAutomation so I just check the value of the input.
Running with nativeAutomation, the input is not set.
With the option --disable-native-automation , test is passing
### TestCafe version
3.0.0
### Node.js version
18.16.0 and 16.19.2
### Command-line arguments
--disable-multiple-windows
### Browser name(s) and version(s)
chrome
### Platform(s) and version(s)
Windows 11, Ubuntu 20
### Other
_No response_ | 1.0 | In nativeAutomation, setFileUpload does nothing - ### What is your Scenario?
Scenario need to upload a file
### What is the Current behavior?
await t.setFileUpload does nothing
### What is the Expected behavior?
await t.setFileUpload sets the file to upload
### What isย your public website URL? (or attach your complete example)
https://www.htmlquick.com/reference/tags/input-file.html
### What isย your TestCafeย test code?
import { Selector } from 'testcafe';
fixture `Sandbox`
test('fileinput', async t =>{
await t.navigateTo("https://www.htmlquick.com/reference/tags/input-file.html");
await t.maximizeWindow();
var input = "[name='uploadedfile']";
await t.setFilesToUpload(input, "C:\\Windows\\win.ini");
await t.expect (Selector(input).value).contains("win.ini")
//await t.click('[value="Send data"]');
//await t.expect(Selector('caption').innerText).contains('Uploaded files');
await t.debug();
})
### Your complete configuration file
"skipJsErrors": true,
### Your complete test report
_No response_
### Screenshots
_No response_
### Steps to Reproduce
I have the same issue on a server that I cannot share so I tried to find a public website to reproduce.
Here the sendData is failing because of target='blank' under nativeAutomation so I just check the value of the input.
Running with nativeAutomation, the input is not set.
With the option --disable-native-automation , test is passing
### TestCafe version
3.0.0
### Node.js version
18.16.0 and 16.19.2
### Command-line arguments
--disable-multiple-windows
### Browser name(s) and version(s)
chrome
### Platform(s) and version(s)
Windows 11, Ubuntu 20
### Other
_No response_ | non_priority | in nativeautomation setfileupload does nothing what is your scenario scenario need to upload a file what is the current behavior await t setfileupload does nothing what is the expected behavior await t setfileupload sets the file to upload what isย your public website url or attach your complete example what isย your testcafeย test code import selector from testcafe fixture sandbox test fileinput async t await t navigateto await t maximizewindow var input await t setfilestoupload input c windows win ini await t expect selector input value contains win ini await t click await t expect selector caption innertext contains uploaded files await t debug your complete configuration file skipjserrors true your complete test report no response screenshots no response steps to reproduce i have the same issue on a server that i cannot share so i tried to find a public website to reproduce here the senddata is failing because of target blank under nativeautomation so i just check the value of the input running with nativeautomation the input is not set with the option disable native automation test is passing testcafe version node js version and command line arguments disable multiple windows browser name s and version s chrome platform s and version s windows ubuntu other no response | 0 |
10,396 | 4,763,469,561 | IssuesEvent | 2016-10-25 14:32:37 | CartoDB/cartodb | https://api.github.com/repos/CartoDB/cartodb | closed | 'JOIN from 2nd layer' analysis breaks when changing parameters | Analysis bug Builder | An already applied 'JOIN from 2nd layer' analysis breaks after any parameter is changed from the UI.
**Use this file to reproduce
[p_places_JOIN_w_borders (on 2016-10-24 at 10.26.39).carto.zip](https://github.com/CartoDB/cartodb/files/547506/p_places_JOIN_w_borders.on.2016-10-24.at.10.26.39.carto.zip)**
## STR
1 - Create a map from 'populated places' dataset
2 - Add 'join columns from 2nd layer' analysis
3 - chose the following params:
- input 2: world borders
- foreign keys:
- populated places: `adm0_a3`
- world borders: `iso3`
- columns:
- populated places: `cartodb_id`, `name`, `pop_max`
- world borders: `name`, `area`, `pop2005`
4 - Apply the analysis. **NOTE: using the `.carto` file attached gets you directly to this point**
----
5 - Change any parameter in the analysis configuration: join type, columns selected on any input dataset, whatever
6 - Apply the changes: the map breaks with a PostGIS error:
```
"Postgis Plugin: ERROR: transform: couldn't project point (180 -90 0): tolerance condition error (-20)โตโตin executeQuery Full sql was: 'SELECT ST_AsTWKB(ST_Simplify(ST_RemoveRepeatedPoints("the_geom_webmercator",1e-05),1e-05,true),5) AS geom FROM (SELECT ST_Transform(the_geom, 3857) the_geom_webmercator, cartodb_id, left_cartodb_id, name, pop_max, right_name, right_area, right_pop2005โตFROM (SELECT _cdb_analysis_right_source.cartodb_id as cartodb_id, _cdb_analysis_right_source.the_geom as the_geom, _cdb_analysis_left_source.cartodb_id as left_cartodb_id, _cdb_analysis_left_source.name, _cdb_analysis_left_source.pop_max, _cdb_analysis_right_source.name as right_name, _cdb_analysis_right_source.area as right_area, _cdb_analysis_right_source.pop2005 as right_pop2005โตFROMโต (SELECT * FROM ernestomb.populated_places) AS _cdb_analysis_left_sourceโต INNER JOINโต (SELECT * FROM world_borders_1) AS _cdb_analysis_right_sourceโตON _cdb_analysis_left_source.adm0_a3 = _cdb_analysis_right_source.iso3) _cdb_analysis_query) as cdbq WHERE "the_geom_webmercator" && ST_MakeEnvelope(-20037508.3,20037508.25881302,-20037508.25881302,20037508.3,3857)'โต"
```

cc/ @saleiva @CartoDB/support | 1.0 | 'JOIN from 2nd layer' analysis breaks when changing parameters - An already applied 'JOIN from 2nd layer' analysis breaks after any parameter is changed from the UI.
**Use this file to reproduce
[p_places_JOIN_w_borders (on 2016-10-24 at 10.26.39).carto.zip](https://github.com/CartoDB/cartodb/files/547506/p_places_JOIN_w_borders.on.2016-10-24.at.10.26.39.carto.zip)**
## STR
1 - Create a map from 'populated places' dataset
2 - Add 'join columns from 2nd layer' analysis
3 - chose the following params:
- input 2: world borders
- foreign keys:
- populated places: `adm0_a3`
- world borders: `iso3`
- columns:
- populated places: `cartodb_id`, `name`, `pop_max`
- world borders: `name`, `area`, `pop2005`
4 - Apply the analysis. **NOTE: using the `.carto` file attached gets you directly to this point**
----
5 - Change any parameter in the analysis configuration: join type, columns selected on any input dataset, whatever
6 - Apply the changes: the map breaks with a PostGIS error:
```
"Postgis Plugin: ERROR: transform: couldn't project point (180 -90 0): tolerance condition error (-20)โตโตin executeQuery Full sql was: 'SELECT ST_AsTWKB(ST_Simplify(ST_RemoveRepeatedPoints("the_geom_webmercator",1e-05),1e-05,true),5) AS geom FROM (SELECT ST_Transform(the_geom, 3857) the_geom_webmercator, cartodb_id, left_cartodb_id, name, pop_max, right_name, right_area, right_pop2005โตFROM (SELECT _cdb_analysis_right_source.cartodb_id as cartodb_id, _cdb_analysis_right_source.the_geom as the_geom, _cdb_analysis_left_source.cartodb_id as left_cartodb_id, _cdb_analysis_left_source.name, _cdb_analysis_left_source.pop_max, _cdb_analysis_right_source.name as right_name, _cdb_analysis_right_source.area as right_area, _cdb_analysis_right_source.pop2005 as right_pop2005โตFROMโต (SELECT * FROM ernestomb.populated_places) AS _cdb_analysis_left_sourceโต INNER JOINโต (SELECT * FROM world_borders_1) AS _cdb_analysis_right_sourceโตON _cdb_analysis_left_source.adm0_a3 = _cdb_analysis_right_source.iso3) _cdb_analysis_query) as cdbq WHERE "the_geom_webmercator" && ST_MakeEnvelope(-20037508.3,20037508.25881302,-20037508.25881302,20037508.3,3857)'โต"
```

cc/ @saleiva @CartoDB/support | non_priority | join from layer analysis breaks when changing parameters an already applied join from layer analysis breaks after any parameter is changed from the ui use this file to reproduce str create a map from populated places dataset add join columns from layer analysis chose the following params input world borders foreign keys populated places world borders columns populated places cartodb id name pop max world borders name area apply the analysis note using the carto file attached gets you directly to this point change any parameter in the analysis configuration join type columns selected on any input dataset whatever apply the changes the map breaks with a postgis error postgis plugin error transform couldn t project point tolerance condition error โตโตin executequery full sql was select st astwkb st simplify st removerepeatedpoints the geom webmercator true as geom from select st transform the geom the geom webmercator cartodb id left cartodb id name pop max right name right area right โตfrom select cdb analysis right source cartodb id as cartodb id cdb analysis right source the geom as the geom cdb analysis left source cartodb id as left cartodb id cdb analysis left source name cdb analysis left source pop max cdb analysis right source name as right name cdb analysis right source area as right area cdb analysis right source as right โตfromโต select from ernestomb populated places as cdb analysis left sourceโต inner joinโต select from world borders as cdb analysis right sourceโตon cdb analysis left source cdb analysis right source cdb analysis query as cdbq where the geom webmercator st makeenvelope โต cc saleiva cartodb support | 0 |
229,532 | 7,575,597,496 | IssuesEvent | 2018-04-24 02:36:25 | jsonwebtoken/jsonwebtoken.github.io | https://api.github.com/repos/jsonwebtoken/jsonwebtoken.github.io | closed | Show definition or highlight spec claims | enhancement low-priority | It would be great if the definitions of the built-in claims of the spec (e.g. `jti`, `iat`, etc.) could be seen by hovering over the claim name. As a first step, it might be useful to highlight these claims in some way as to distinguish them from custom claims.
For a list of claims, see https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.
| 1.0 | Show definition or highlight spec claims - It would be great if the definitions of the built-in claims of the spec (e.g. `jti`, `iat`, etc.) could be seen by hovering over the claim name. As a first step, it might be useful to highlight these claims in some way as to distinguish them from custom claims.
For a list of claims, see https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.
| priority | show definition or highlight spec claims it would be great if the definitions of the built in claims of the spec e g jti iat etc could be seen by hovering over the claim name as a first step it might be useful to highlight these claims in some way as to distinguish them from custom claims for a list of claims see | 1 |
377,851 | 11,185,391,856 | IssuesEvent | 2020-01-01 01:10:22 | PIQuIL/QuCumber | https://api.github.com/repos/PIQuIL/QuCumber | closed | Update CI | Priority: Medium Size: Medium Status: In Progress continuous-integration enhancement | - [x] Move format checking from travis to restyled-io
- [ ] Keep checking format for jupyter notebooks on travis, though
- [ ] Consider moving away from the invoke package to click
- [x] Use travis stages and tox to run unit tests, test documentation and package builds | 1.0 | Update CI - - [x] Move format checking from travis to restyled-io
- [ ] Keep checking format for jupyter notebooks on travis, though
- [ ] Consider moving away from the invoke package to click
- [x] Use travis stages and tox to run unit tests, test documentation and package builds | priority | update ci move format checking from travis to restyled io keep checking format for jupyter notebooks on travis though consider moving away from the invoke package to click use travis stages and tox to run unit tests test documentation and package builds | 1 |
794,774 | 28,048,878,942 | IssuesEvent | 2023-03-29 02:53:06 | janus-idp/backstage-showcase | https://api.github.com/repos/janus-idp/backstage-showcase | opened | Be able to generate a Changelog.md | priority/medium kind/chore | ### What needs to be done?
We want to be able to list all the changes between release and publish a Changelog.md file with a tool like:
https://github.com/spring-io/github-changelog-generator | 1.0 | Be able to generate a Changelog.md - ### What needs to be done?
We want to be able to list all the changes between release and publish a Changelog.md file with a tool like:
https://github.com/spring-io/github-changelog-generator | priority | be able to generate a changelog md what needs to be done we want to be able to list all the changes between release and publish a changelog md file with a tool like | 1 |
325,372 | 27,872,127,807 | IssuesEvent | 2023-03-21 14:04:53 | eclipse-openj9/openj9 | https://api.github.com/repos/eclipse-openj9/openj9 | opened | zlinux CS testing crash vmState=0xffffffff | comp:vm comp:gc test failure blocker segfault | https://openj9-jenkins.osuosl.org/job/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_0/494/
- no diagnostics
https://openj9-jenkins.osuosl.org/job/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_1/495/
- https://openj9-artifactory.osuosl.org/artifactory/ci-openj9/Test/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_1/495/system_test_output.tar.gz
https://openj9-jenkins.osuosl.org/job/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_2/494/
- https://openj9-artifactory.osuosl.org/artifactory/ci-openj9/Test/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_2/494/system_test_output.tar.gz
LambdaLoadTest_CS_5m_0
MathLoadTest_autosimd_CS_5m_0
ParallelStreamsLoadTest_CS_0
DaaLoadTest_daa2_CS_5m_0
DaaLoadTest_daa3_CS_5m_0
DaaLoadTest_daa1_CS_5m_0
MathLoadTest_bigdecimal_CS_5m_0
ClassLoadingTest_CS_5m_0
https://openj9-jenkins.osuosl.org/job/Test_openjdk11_j9_extended.system_s390x_linux_Nightly_testList_0/497
- https://openj9-artifactory.osuosl.org/artifactory/ci-openj9/Test/Test_openjdk11_j9_extended.system_s390x_linux_Nightly_testList_0/497/system_test_output.tar.gz
DaaLoadTest_all_CS_5m_0
MathLoadTest_all_CS_5m_0
```
DLT stderr Type=Segmentation error vmState=0xffffffff
DLT stderr J9Generic_Signal_Number=00000018 Signal_Number=0000000b Error_Value=00000000 Signal_Code=00000001
DLT stderr Handler1=000003FF7F2C8458 Handler2=000003FF7F1B33D0 InaccessibleAddress=0000000000000000
DLT stderr gpr0=0000000000000002 gpr1=000003FF7F112CA0 gpr2=0000000000000000 gpr3=0000000000000058
DLT stderr gpr4=000003FF7D15BE90 gpr5=0000000000000000 gpr6=000003FF78055D50 gpr7=000003FF78039578
DLT stderr gpr8=000003FF78055C70 gpr9=000003FF7F326F00 gpr10=000003FF7FA49FB8 gpr11=000003FF78028A90
DLT stderr gpr12=000003FF7FF26F88 gpr13=000003FF7D347588 gpr14=000003FF7D15BE92 gpr15=000003FF7FF6D1A8
DLT stderr psw=000003FF7F326F00 mask=0705000180000000 fpc=00000000 bea=000003FF7D15BE90
DLT stderr fpr0 ffffffffffffffff (f: 4294967296.000000, d: -nan)
DLT stderr fpr1 0000000000000400 (f: 1024.000000, d: 5.059232e-321)
DLT stderr fpr2 000003ff7f1ec1ff (f: 2132722176.000000, d: 2.171855e-311)
DLT stderr fpr3 0000000000000000 (f: 0.000000, d: 0.000000e+00)
DLT stderr fpr4 0000000000000007 (f: 7.000000, d: 3.458460e-323)
DLT stderr fpr5 000000641cec42a0 (f: 485245600.000000, d: 2.124393e-312)
DLT stderr fpr6 000003ff78000938 (f: 2013268224.000000, d: 2.171796e-311)
DLT stderr fpr7 0000000000000000 (f: 0.000000, d: 0.000000e+00)
DLT stderr fpr8 0000000000040000 (f: 262144.000000, d: 1.295163e-318)
DLT stderr fpr9 000002aa3159a880 (f: 827959424.000000, d: 1.447610e-311)
DLT stderr fpr10 0000000001d0a8e0 (f: 30451936.000000, d: 1.504526e-316)
DLT stderr fpr11 000003ffd0ffb0a0 (f: 3506417920.000000, d: 2.172534e-311)
DLT stderr fpr12 0000000001d0b128 (f: 30454056.000000, d: 1.504630e-316)
DLT stderr fpr13 000002aa313a2938 (f: 825895232.000000, d: 1.447609e-311)
DLT stderr fpr14 0000000000000000 (f: 0.000000, d: 0.000000e+00)
DLT stderr fpr15 0000000000000000 (f: 0.000000, d: 0.000000e+00)
DLT stderr Module=/home/jenkins/workspace/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_0/openjdkbinary/j2sdk-image/lib/default/libj9vm29.so
DLT stderr Module_base_address=000003FF7F280000
DLT stderr Target=2_90_20230320_503 (Linux 5.4.0-137-generic)
DLT stderr CPU=s390x (4 logical CPUs) (0x1f58f7000 RAM)
```
Changes between last working and first failing build.
OpenJ9: 9e9fe327f9d
OMR: e07b5edc181
OpenJDK11: a6a55907b48 - openj9-openjdk-jdk11
OpenJ9: c03c76e5071
OMR: 1a20c5d2b24
OpenJDK11: bd949902500 - openj9-openjdk-jdk11
https://github.com/eclipse-openj9/openj9/compare/9e9fe327f9d...c03c76e5071
https://github.com/eclipse-openj9/openj9-omr/compare/e07b5edc181...1a20c5d2b24
https://github.com/ibmruntimes/openj9-openjdk-jdk11/compare/a6a55907b48...bd949902500
@tajila @dmitripivkine | 1.0 | zlinux CS testing crash vmState=0xffffffff - https://openj9-jenkins.osuosl.org/job/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_0/494/
- no diagnostics
https://openj9-jenkins.osuosl.org/job/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_1/495/
- https://openj9-artifactory.osuosl.org/artifactory/ci-openj9/Test/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_1/495/system_test_output.tar.gz
https://openj9-jenkins.osuosl.org/job/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_2/494/
- https://openj9-artifactory.osuosl.org/artifactory/ci-openj9/Test/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_2/494/system_test_output.tar.gz
LambdaLoadTest_CS_5m_0
MathLoadTest_autosimd_CS_5m_0
ParallelStreamsLoadTest_CS_0
DaaLoadTest_daa2_CS_5m_0
DaaLoadTest_daa3_CS_5m_0
DaaLoadTest_daa1_CS_5m_0
MathLoadTest_bigdecimal_CS_5m_0
ClassLoadingTest_CS_5m_0
https://openj9-jenkins.osuosl.org/job/Test_openjdk11_j9_extended.system_s390x_linux_Nightly_testList_0/497
- https://openj9-artifactory.osuosl.org/artifactory/ci-openj9/Test/Test_openjdk11_j9_extended.system_s390x_linux_Nightly_testList_0/497/system_test_output.tar.gz
DaaLoadTest_all_CS_5m_0
MathLoadTest_all_CS_5m_0
```
DLT stderr Type=Segmentation error vmState=0xffffffff
DLT stderr J9Generic_Signal_Number=00000018 Signal_Number=0000000b Error_Value=00000000 Signal_Code=00000001
DLT stderr Handler1=000003FF7F2C8458 Handler2=000003FF7F1B33D0 InaccessibleAddress=0000000000000000
DLT stderr gpr0=0000000000000002 gpr1=000003FF7F112CA0 gpr2=0000000000000000 gpr3=0000000000000058
DLT stderr gpr4=000003FF7D15BE90 gpr5=0000000000000000 gpr6=000003FF78055D50 gpr7=000003FF78039578
DLT stderr gpr8=000003FF78055C70 gpr9=000003FF7F326F00 gpr10=000003FF7FA49FB8 gpr11=000003FF78028A90
DLT stderr gpr12=000003FF7FF26F88 gpr13=000003FF7D347588 gpr14=000003FF7D15BE92 gpr15=000003FF7FF6D1A8
DLT stderr psw=000003FF7F326F00 mask=0705000180000000 fpc=00000000 bea=000003FF7D15BE90
DLT stderr fpr0 ffffffffffffffff (f: 4294967296.000000, d: -nan)
DLT stderr fpr1 0000000000000400 (f: 1024.000000, d: 5.059232e-321)
DLT stderr fpr2 000003ff7f1ec1ff (f: 2132722176.000000, d: 2.171855e-311)
DLT stderr fpr3 0000000000000000 (f: 0.000000, d: 0.000000e+00)
DLT stderr fpr4 0000000000000007 (f: 7.000000, d: 3.458460e-323)
DLT stderr fpr5 000000641cec42a0 (f: 485245600.000000, d: 2.124393e-312)
DLT stderr fpr6 000003ff78000938 (f: 2013268224.000000, d: 2.171796e-311)
DLT stderr fpr7 0000000000000000 (f: 0.000000, d: 0.000000e+00)
DLT stderr fpr8 0000000000040000 (f: 262144.000000, d: 1.295163e-318)
DLT stderr fpr9 000002aa3159a880 (f: 827959424.000000, d: 1.447610e-311)
DLT stderr fpr10 0000000001d0a8e0 (f: 30451936.000000, d: 1.504526e-316)
DLT stderr fpr11 000003ffd0ffb0a0 (f: 3506417920.000000, d: 2.172534e-311)
DLT stderr fpr12 0000000001d0b128 (f: 30454056.000000, d: 1.504630e-316)
DLT stderr fpr13 000002aa313a2938 (f: 825895232.000000, d: 1.447609e-311)
DLT stderr fpr14 0000000000000000 (f: 0.000000, d: 0.000000e+00)
DLT stderr fpr15 0000000000000000 (f: 0.000000, d: 0.000000e+00)
DLT stderr Module=/home/jenkins/workspace/Test_openjdk11_j9_sanity.system_s390x_linux_Nightly_testList_0/openjdkbinary/j2sdk-image/lib/default/libj9vm29.so
DLT stderr Module_base_address=000003FF7F280000
DLT stderr Target=2_90_20230320_503 (Linux 5.4.0-137-generic)
DLT stderr CPU=s390x (4 logical CPUs) (0x1f58f7000 RAM)
```
Changes between last working and first failing build.
OpenJ9: 9e9fe327f9d
OMR: e07b5edc181
OpenJDK11: a6a55907b48 - openj9-openjdk-jdk11
OpenJ9: c03c76e5071
OMR: 1a20c5d2b24
OpenJDK11: bd949902500 - openj9-openjdk-jdk11
https://github.com/eclipse-openj9/openj9/compare/9e9fe327f9d...c03c76e5071
https://github.com/eclipse-openj9/openj9-omr/compare/e07b5edc181...1a20c5d2b24
https://github.com/ibmruntimes/openj9-openjdk-jdk11/compare/a6a55907b48...bd949902500
@tajila @dmitripivkine | non_priority | zlinux cs testing crash vmstate no diagnostics lambdaloadtest cs mathloadtest autosimd cs parallelstreamsloadtest cs daaloadtest cs daaloadtest cs daaloadtest cs mathloadtest bigdecimal cs classloadingtest cs daaloadtest all cs mathloadtest all cs dlt stderr type segmentation error vmstate dlt stderr signal number signal number error value signal code dlt stderr inaccessibleaddress dlt stderr dlt stderr dlt stderr dlt stderr dlt stderr psw mask fpc bea dlt stderr ffffffffffffffff f d nan dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr f d dlt stderr module home jenkins workspace test sanity system linux nightly testlist openjdkbinary image lib default so dlt stderr module base address dlt stderr target linux generic dlt stderr cpu logical cpus ram changes between last working and first failing build omr openjdk omr openjdk tajila dmitripivkine | 0 |
740,056 | 25,734,365,855 | IssuesEvent | 2022-12-07 23:06:58 | pytorch/pytorch | https://api.github.com/repos/pytorch/pytorch | closed | On CPU-only machine received OSError from importing: libcublas.so.11: cannot open shared object file | high priority triage review oncall: binaries module: regression | ### ๐ Describe the bug
On a CPU-only machine, in Amazon Linux 2 latest docker image, install latest PyTorch(1.13) via pip and import, received this error.
However in my sense, PyTorch should not install GPU related components on a CPU-only machine without CUDA and nvidia related package installed?
Steps to reproduce:
```
docker pull amazonlinux:2
docker run --rm -it amazonlinux:2 /bin/bash
bash-4.2# yum install -y python3 python3-devel python3-distutils
bash-4.2# python3 -m pip install torch
bash-4.2# python3 -c "import torch"
```
Then get error message:
```
Traceback (most recent call last):
File "<string>", line 1, in <module>
File "/usr/local/lib64/python3.7/site-packages/torch/__init__.py", line 191, in <module>
_load_global_deps()
File "/usr/local/lib64/python3.7/site-packages/torch/__init__.py", line 153, in _load_global_deps
ctypes.CDLL(lib_path, mode=ctypes.RTLD_GLOBAL)
File "/usr/lib64/python3.7/ctypes/__init__.py", line 359, in __init__
self._handle = _dlopen(self._name, mode)
OSError: libcublas.so.11: cannot open shared object file: No such file or directory
```
### Versions
Collecting environment information...
PyTorch version: N/A
Is debug build: N/A
CUDA used to build PyTorch: N/A
ROCM used to build PyTorch: N/A
OS: Amazon Linux 2 (x86_64)
GCC version: Could not collect
Clang version: Could not collect
CMake version: Could not collect
Libc version: glibc-2.2.5
Python version: 3.7.10 (default, Jun 3 2021, 00:02:01) [GCC 7.3.1 20180712 (Red Hat 7.3.1-13)] (64-bit runtime)
Python platform: Linux-5.4.214-134.408.amzn2int.x86_64-x86_64-with-glibc2.2.5
Is CUDA available: N/A
CUDA runtime version: Could not collect
CUDA_MODULE_LOADING set to: N/A
GPU models and configuration: Could not collect
Nvidia driver version: Could not collect
cuDNN version: Could not collect
HIP runtime version: N/A
MIOpen runtime version: N/A
Is XNNPACK available: N/A
Versions of relevant libraries:
[pip3] torch==1.13.0
[conda] Could not collect
cc @ezyang @gchanan @zou3519 @seemethere @malfet | 1.0 | On CPU-only machine received OSError from importing: libcublas.so.11: cannot open shared object file - ### ๐ Describe the bug
On a CPU-only machine, in Amazon Linux 2 latest docker image, install latest PyTorch(1.13) via pip and import, received this error.
However in my sense, PyTorch should not install GPU related components on a CPU-only machine without CUDA and nvidia related package installed?
Steps to reproduce:
```
docker pull amazonlinux:2
docker run --rm -it amazonlinux:2 /bin/bash
bash-4.2# yum install -y python3 python3-devel python3-distutils
bash-4.2# python3 -m pip install torch
bash-4.2# python3 -c "import torch"
```
Then get error message:
```
Traceback (most recent call last):
File "<string>", line 1, in <module>
File "/usr/local/lib64/python3.7/site-packages/torch/__init__.py", line 191, in <module>
_load_global_deps()
File "/usr/local/lib64/python3.7/site-packages/torch/__init__.py", line 153, in _load_global_deps
ctypes.CDLL(lib_path, mode=ctypes.RTLD_GLOBAL)
File "/usr/lib64/python3.7/ctypes/__init__.py", line 359, in __init__
self._handle = _dlopen(self._name, mode)
OSError: libcublas.so.11: cannot open shared object file: No such file or directory
```
### Versions
Collecting environment information...
PyTorch version: N/A
Is debug build: N/A
CUDA used to build PyTorch: N/A
ROCM used to build PyTorch: N/A
OS: Amazon Linux 2 (x86_64)
GCC version: Could not collect
Clang version: Could not collect
CMake version: Could not collect
Libc version: glibc-2.2.5
Python version: 3.7.10 (default, Jun 3 2021, 00:02:01) [GCC 7.3.1 20180712 (Red Hat 7.3.1-13)] (64-bit runtime)
Python platform: Linux-5.4.214-134.408.amzn2int.x86_64-x86_64-with-glibc2.2.5
Is CUDA available: N/A
CUDA runtime version: Could not collect
CUDA_MODULE_LOADING set to: N/A
GPU models and configuration: Could not collect
Nvidia driver version: Could not collect
cuDNN version: Could not collect
HIP runtime version: N/A
MIOpen runtime version: N/A
Is XNNPACK available: N/A
Versions of relevant libraries:
[pip3] torch==1.13.0
[conda] Could not collect
cc @ezyang @gchanan @zou3519 @seemethere @malfet | priority | on cpu only machine received oserror from importing libcublas so cannot open shared object file ๐ describe the bug on a cpu only machine in amazon linux latest docker image install latest pytorch via pip and import received this error however in my sense pytorch should not install gpu related components on a cpu only machine without cuda and nvidia related package installed steps to reproduce docker pull amazonlinux docker run rm it amazonlinux bin bash bash yum install y devel distutils bash m pip install torch bash c import torch then get error message traceback most recent call last file line in file usr local site packages torch init py line in load global deps file usr local site packages torch init py line in load global deps ctypes cdll lib path mode ctypes rtld global file usr ctypes init py line in init self handle dlopen self name mode oserror libcublas so cannot open shared object file no such file or directory versions collecting environment information pytorch version n a is debug build n a cuda used to build pytorch n a rocm used to build pytorch n a os amazon linux gcc version could not collect clang version could not collect cmake version could not collect libc version glibc python version default jun bit runtime python platform linux with is cuda available n a cuda runtime version could not collect cuda module loading set to n a gpu models and configuration could not collect nvidia driver version could not collect cudnn version could not collect hip runtime version n a miopen runtime version n a is xnnpack available n a versions of relevant libraries torch could not collect cc ezyang gchanan seemethere malfet | 1 |
37,261 | 8,244,822,812 | IssuesEvent | 2018-09-11 07:47:48 | Chisel-Team/Chisel | https://api.github.com/repos/Chisel-Team/Chisel | closed | Chiseled a stack of blocks, gave me a single block back instead of a stack | 1.10 bug-code complete-code | Using chisel 1.10.2-0.2.0.43 with the config setting for chisels not taking damage and using the I-Chisel | 2.0 | Chiseled a stack of blocks, gave me a single block back instead of a stack - Using chisel 1.10.2-0.2.0.43 with the config setting for chisels not taking damage and using the I-Chisel | non_priority | chiseled a stack of blocks gave me a single block back instead of a stack using chisel with the config setting for chisels not taking damage and using the i chisel | 0 |
687,671 | 23,534,861,933 | IssuesEvent | 2022-08-19 19:24:26 | metabase/metabase | https://api.github.com/repos/metabase/metabase | reopened | Breadcrumb is displaying wrong "path" order when collection in moved inside another | Type:Bug Priority:P3 Organization/Collections | **Describe the bug**
Breadcrumb is displaying wrong "path" order when collection in moved inside another.
**To Reproduce**
1. Create a new collection named "Collection**1**" in "Our analytics".
2. Create another collection named "Collection**2**" with a collection named "Collection**3**" inside it, also in "Our analytics", so when we enter "Collection**3**" its breadcrumb is :
"Our analytics/Collection**2**/Collection**3**"
3. Move "Collection**2**" inside "Collection**1**", so when we enter "Collection**3**" its breadcrumb is :
"Our analytics/Collection**1**/Collection**2**/Collection**3**"
4. Create another collection named "Collection**4**".
5. Move "Collection**1**" inside "Collection**4**".
6. Enter "Collection**3**" and see its breadcrumb shown as:
"Our analytics/Collection**1**/Collection**2**"/Collection**3**/Collection**4**"
**Expected behavior**
Breadcrumb display order should be:
"Our analytics/Collection**4**/Collection**1**/Collection**2**/Collection**3**/"
Note in the video "Collection**4**" appears last.
**Screenshots**

**Severity**
It is annoying some users.
**Additional context**
N/A
**Metabase Diagnostic Info**
```json
{
"browser-info": {
"language": "pt-BR",
"platform": "Linux x86_64",
"userAgent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36",
"vendor": "Google Inc."
},
"system-info": {
"java.runtime.name": "OpenJDK Runtime Environment",
"java.runtime.version": "11.0.5+10",
"java.vendor": "AdoptOpenJDK",
"java.vendor.url": "https://adoptopenjdk.net/",
"java.version": "11.0.5",
"java.vm.name": "OpenJDK 64-Bit Server VM",
"java.vm.version": "11.0.5+10",
"os.name": "Linux",
"os.version": "4.19.106-coreos",
"user.language": "en",
"user.timezone": "GMT"
},
"metabase-info": {
"databases": [
"postgres",
"sqlserver",
"druid",
"googleanalytics",
"presto",
"h2"
],
"hosting-env": "unknown",
"application-database": "postgres",
"application-database-details": {
"database": {
"name": "PostgreSQL",
"version": "11.5"
},
"jdbc-driver": {
"name": "PostgreSQL JDBC Driver",
"version": "42.2.8"
}
},
"run-mode": "prod",
"version": {
"date": "2020-02-25",
"tag": "v0.34.3",
"branch": "release-0.34.x",
"hash": "1a83edb"
},
"settings": {
"report-timezone": "UTC"
}
}
}
``` | 1.0 | Breadcrumb is displaying wrong "path" order when collection in moved inside another - **Describe the bug**
Breadcrumb is displaying wrong "path" order when collection in moved inside another.
**To Reproduce**
1. Create a new collection named "Collection**1**" in "Our analytics".
2. Create another collection named "Collection**2**" with a collection named "Collection**3**" inside it, also in "Our analytics", so when we enter "Collection**3**" its breadcrumb is :
"Our analytics/Collection**2**/Collection**3**"
3. Move "Collection**2**" inside "Collection**1**", so when we enter "Collection**3**" its breadcrumb is :
"Our analytics/Collection**1**/Collection**2**/Collection**3**"
4. Create another collection named "Collection**4**".
5. Move "Collection**1**" inside "Collection**4**".
6. Enter "Collection**3**" and see its breadcrumb shown as:
"Our analytics/Collection**1**/Collection**2**"/Collection**3**/Collection**4**"
**Expected behavior**
Breadcrumb display order should be:
"Our analytics/Collection**4**/Collection**1**/Collection**2**/Collection**3**/"
Note in the video "Collection**4**" appears last.
**Screenshots**

**Severity**
It is annoying some users.
**Additional context**
N/A
**Metabase Diagnostic Info**
```json
{
"browser-info": {
"language": "pt-BR",
"platform": "Linux x86_64",
"userAgent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36",
"vendor": "Google Inc."
},
"system-info": {
"java.runtime.name": "OpenJDK Runtime Environment",
"java.runtime.version": "11.0.5+10",
"java.vendor": "AdoptOpenJDK",
"java.vendor.url": "https://adoptopenjdk.net/",
"java.version": "11.0.5",
"java.vm.name": "OpenJDK 64-Bit Server VM",
"java.vm.version": "11.0.5+10",
"os.name": "Linux",
"os.version": "4.19.106-coreos",
"user.language": "en",
"user.timezone": "GMT"
},
"metabase-info": {
"databases": [
"postgres",
"sqlserver",
"druid",
"googleanalytics",
"presto",
"h2"
],
"hosting-env": "unknown",
"application-database": "postgres",
"application-database-details": {
"database": {
"name": "PostgreSQL",
"version": "11.5"
},
"jdbc-driver": {
"name": "PostgreSQL JDBC Driver",
"version": "42.2.8"
}
},
"run-mode": "prod",
"version": {
"date": "2020-02-25",
"tag": "v0.34.3",
"branch": "release-0.34.x",
"hash": "1a83edb"
},
"settings": {
"report-timezone": "UTC"
}
}
}
``` | priority | breadcrumb is displaying wrong path order when collection in moved inside another describe the bug breadcrumb is displaying wrong path order when collection in moved inside another to reproduce create a new collection named collection in our analytics create another collection named collection with a collection named collection inside it also in our analytics so when we enter collection its breadcrumb is our analytics collection collection move collection inside collection so when we enter collection its breadcrumb is our analytics collection collection collection create another collection named collection move collection inside collection enter collection and see its breadcrumb shown as our analytics collection collection collection collection expected behavior breadcrumb display order should be our analytics collection collection collection collection note in the video collection appears last screenshots severity it is annoying some users additional context n a metabase diagnostic info json browser info language pt br platform linux useragent mozilla linux applewebkit khtml like gecko chrome safari vendor google inc system info java runtime name openjdk runtime environment java runtime version java vendor adoptopenjdk java vendor url java version java vm name openjdk bit server vm java vm version os name linux os version coreos user language en user timezone gmt metabase info databases postgres sqlserver druid googleanalytics presto hosting env unknown application database postgres application database details database name postgresql version jdbc driver name postgresql jdbc driver version run mode prod version date tag branch release x hash settings report timezone utc | 1 |
74,075 | 3,427,995,877 | IssuesEvent | 2015-12-10 06:31:36 | sceene/sprint-planning | https://api.github.com/repos/sceene/sprint-planning | closed | Global: Profile Actions | HIGH PRIORITY | ## Places Actions
- [x] Share
- Trigger the Share Modal
- [x] Contact
- Show real phone number.
- It's currently showing a hardcoded phone number.
- [x] Uber
- You can implement this without API. I'll need the following information (See image below)
- REDIRECT URL
- ORIGIN URI
- [x] Directions
- Open in Apple maps
## Events Actions
- [x] Share
- Trigger the Share Modal
- [ ] Get Tickets
- ``` "eventTickets" ```
- Translate the ``` provider ```: Ac = Active, Eb = Eventbrite, Tf = Ticketfly, Sg = Seatgeek etc
- These should open a web view modal
- [ ] Uber
- Same as Places UX
- [ ] Directions
- Open in Apple maps
## People Actions
- [ ] Share
- Trigger the Share Modal
- [ ] Contact
- Open the Conversation Screen Modal | 1.0 | Global: Profile Actions - ## Places Actions
- [x] Share
- Trigger the Share Modal
- [x] Contact
- Show real phone number.
- It's currently showing a hardcoded phone number.
- [x] Uber
- You can implement this without API. I'll need the following information (See image below)
- REDIRECT URL
- ORIGIN URI
- [x] Directions
- Open in Apple maps
## Events Actions
- [x] Share
- Trigger the Share Modal
- [ ] Get Tickets
- ``` "eventTickets" ```
- Translate the ``` provider ```: Ac = Active, Eb = Eventbrite, Tf = Ticketfly, Sg = Seatgeek etc
- These should open a web view modal
- [ ] Uber
- Same as Places UX
- [ ] Directions
- Open in Apple maps
## People Actions
- [ ] Share
- Trigger the Share Modal
- [ ] Contact
- Open the Conversation Screen Modal | priority | global profile actions places actions share trigger the share modal contact show real phone number it s currently showing a hardcoded phone number uber you can implement this without api i ll need the following information see image below redirect url origin uri directions open in apple maps events actions share trigger the share modal get tickets eventtickets translate the provider ac active eb eventbrite tf ticketfly sg seatgeek etc these should open a web view modal uber same as places ux directions open in apple maps people actions share trigger the share modal contact open the conversation screen modal | 1 |
22,452 | 7,177,015,728 | IssuesEvent | 2018-01-31 12:07:20 | zeebe-io/zeebe | https://api.github.com/repos/zeebe-io/zeebe | opened | Test suite hangs during maven run with "Address already in use" | broker ready unstable build | Sometimes the test suite stops and fails as it cannot bind to the given network address as it claims it is still in use.
```
11:59:15.834 [localhost:51015] [service-container-action-0] INFO io.zeebe.broker.services - Using /tmp/junit4316972134707707111/persistent-broker/metrics/metrics.zeebe for counters
Exception in thread "actor-runner-service-container" java.lang.RuntimeException: Failed to bind to address: localhost/127.0.0.1:51017
at io.zeebe.transport.impl.ServerSocketBinding.doBind(ServerSocketBinding.java:58)
at io.zeebe.transport.ServerTransportBuilder.buildTransportContext(ServerTransportBuilder.java:124)
at io.zeebe.transport.ServerTransportBuilder.buildBuffering(ServerTransportBuilder.java:111)
at io.zeebe.broker.transport.BufferingServerTransportService.start(BufferingServerTransportService.java:63)
at io.zeebe.servicecontainer.impl.ServiceController$InvokeStartState.doWork(ServiceController.java:269)
at io.zeebe.servicecontainer.impl.ServiceController.doWork(ServiceController.java:138)
at io.zeebe.servicecontainer.impl.ServiceContainerImpl.doWork(ServiceContainerImpl.java:119)
at io.zeebe.util.actor.ActorRunner.tryRunActor(ActorRunner.java:180)
at io.zeebe.util.actor.ActorRunner.runActor(ActorRunner.java:160)
at io.zeebe.util.actor.ActorRunner.doWork(ActorRunner.java:129)
at io.zeebe.util.actor.ActorRunner.doWorkUntilClose(ActorRunner.java:86)
at io.zeebe.util.LogUtil.doWithMDC(LogUtil.java:34)
at io.zeebe.util.actor.ActorRunner.run(ActorRunner.java:77)
at java.lang.Thread.run(Thread.java:748)
Caused by: java.net.BindException: Address already in use
at sun.nio.ch.Net.bind0(Native Method)
at sun.nio.ch.Net.bind(Net.java:433)
at sun.nio.ch.Net.bind(Net.java:425)
at sun.nio.ch.ServerSocketChannelImpl.bind(ServerSocketChannelImpl.java:223)
at java.nio.channels.ServerSocketChannel.bind(ServerSocketChannel.java:157)
at io.zeebe.transport.impl.ServerSocketBinding.doBind(ServerSocketBinding.java:53)
... 13 more
``` | 1.0 | Test suite hangs during maven run with "Address already in use" - Sometimes the test suite stops and fails as it cannot bind to the given network address as it claims it is still in use.
```
11:59:15.834 [localhost:51015] [service-container-action-0] INFO io.zeebe.broker.services - Using /tmp/junit4316972134707707111/persistent-broker/metrics/metrics.zeebe for counters
Exception in thread "actor-runner-service-container" java.lang.RuntimeException: Failed to bind to address: localhost/127.0.0.1:51017
at io.zeebe.transport.impl.ServerSocketBinding.doBind(ServerSocketBinding.java:58)
at io.zeebe.transport.ServerTransportBuilder.buildTransportContext(ServerTransportBuilder.java:124)
at io.zeebe.transport.ServerTransportBuilder.buildBuffering(ServerTransportBuilder.java:111)
at io.zeebe.broker.transport.BufferingServerTransportService.start(BufferingServerTransportService.java:63)
at io.zeebe.servicecontainer.impl.ServiceController$InvokeStartState.doWork(ServiceController.java:269)
at io.zeebe.servicecontainer.impl.ServiceController.doWork(ServiceController.java:138)
at io.zeebe.servicecontainer.impl.ServiceContainerImpl.doWork(ServiceContainerImpl.java:119)
at io.zeebe.util.actor.ActorRunner.tryRunActor(ActorRunner.java:180)
at io.zeebe.util.actor.ActorRunner.runActor(ActorRunner.java:160)
at io.zeebe.util.actor.ActorRunner.doWork(ActorRunner.java:129)
at io.zeebe.util.actor.ActorRunner.doWorkUntilClose(ActorRunner.java:86)
at io.zeebe.util.LogUtil.doWithMDC(LogUtil.java:34)
at io.zeebe.util.actor.ActorRunner.run(ActorRunner.java:77)
at java.lang.Thread.run(Thread.java:748)
Caused by: java.net.BindException: Address already in use
at sun.nio.ch.Net.bind0(Native Method)
at sun.nio.ch.Net.bind(Net.java:433)
at sun.nio.ch.Net.bind(Net.java:425)
at sun.nio.ch.ServerSocketChannelImpl.bind(ServerSocketChannelImpl.java:223)
at java.nio.channels.ServerSocketChannel.bind(ServerSocketChannel.java:157)
at io.zeebe.transport.impl.ServerSocketBinding.doBind(ServerSocketBinding.java:53)
... 13 more
``` | non_priority | test suite hangs during maven run with address already in use sometimes the test suite stops and fails as it cannot bind to the given network address as it claims it is still in use info io zeebe broker services using tmp persistent broker metrics metrics zeebe for counters exception in thread actor runner service container java lang runtimeexception failed to bind to address localhost at io zeebe transport impl serversocketbinding dobind serversocketbinding java at io zeebe transport servertransportbuilder buildtransportcontext servertransportbuilder java at io zeebe transport servertransportbuilder buildbuffering servertransportbuilder java at io zeebe broker transport bufferingservertransportservice start bufferingservertransportservice java at io zeebe servicecontainer impl servicecontroller invokestartstate dowork servicecontroller java at io zeebe servicecontainer impl servicecontroller dowork servicecontroller java at io zeebe servicecontainer impl servicecontainerimpl dowork servicecontainerimpl java at io zeebe util actor actorrunner tryrunactor actorrunner java at io zeebe util actor actorrunner runactor actorrunner java at io zeebe util actor actorrunner dowork actorrunner java at io zeebe util actor actorrunner doworkuntilclose actorrunner java at io zeebe util logutil dowithmdc logutil java at io zeebe util actor actorrunner run actorrunner java at java lang thread run thread java caused by java net bindexception address already in use at sun nio ch net native method at sun nio ch net bind net java at sun nio ch net bind net java at sun nio ch serversocketchannelimpl bind serversocketchannelimpl java at java nio channels serversocketchannel bind serversocketchannel java at io zeebe transport impl serversocketbinding dobind serversocketbinding java more | 0 |
1,291 | 3,535,541,007 | IssuesEvent | 2016-01-16 16:02:57 | dirkgroenen/mopidy-mopify | https://api.github.com/repos/dirkgroenen/mopidy-mopify | closed | Play next and add to queue ain't working anymore | bug service | Since consume mode is disabled some queue features won't work anymore. This is caused by the index songs are added on. When consume mode was one the current playing track always had index `0`. With consume mode on the current playing track index can be different, so tracks should be added after that index instead after `0`. | 1.0 | Play next and add to queue ain't working anymore - Since consume mode is disabled some queue features won't work anymore. This is caused by the index songs are added on. When consume mode was one the current playing track always had index `0`. With consume mode on the current playing track index can be different, so tracks should be added after that index instead after `0`. | non_priority | play next and add to queue ain t working anymore since consume mode is disabled some queue features won t work anymore this is caused by the index songs are added on when consume mode was one the current playing track always had index with consume mode on the current playing track index can be different so tracks should be added after that index instead after | 0 |
335,616 | 10,164,136,842 | IssuesEvent | 2019-08-07 10:54:36 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | zwift.com - design is broken | browser-firefox-mobile engine-gecko priority-important status-contact-success status-first-contact | <!-- @browser: Firefox Mobile 60.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:60.0) Gecko/60.0 Firefox/60.0 -->
<!-- @reported_with: web -->
**URL**: http://zwift.com/b/strava-challenge-complete-feb-2018/
**Browser / Version**: Firefox Mobile 60.0
**Operating System**: Android 8.1.0
**Tested Another Browser**: Yes
**Problem type**: Design is broken
**Description**: The check button has some interference with a text
**Steps to Reproduce**:
Look at the check button before the submit button
[](https://webcompat.com/uploads/2018/2/89c8ed90-eb32-42ac-8597-f0cf40325849.jpeg)
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | 1.0 | zwift.com - design is broken - <!-- @browser: Firefox Mobile 60.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:60.0) Gecko/60.0 Firefox/60.0 -->
<!-- @reported_with: web -->
**URL**: http://zwift.com/b/strava-challenge-complete-feb-2018/
**Browser / Version**: Firefox Mobile 60.0
**Operating System**: Android 8.1.0
**Tested Another Browser**: Yes
**Problem type**: Design is broken
**Description**: The check button has some interference with a text
**Steps to Reproduce**:
Look at the check button before the submit button
[](https://webcompat.com/uploads/2018/2/89c8ed90-eb32-42ac-8597-f0cf40325849.jpeg)
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | priority | zwift com design is broken url browser version firefox mobile operating system android tested another browser yes problem type design is broken description the check button has some interference with a text steps to reproduce look at the check button before the submit button from with โค๏ธ | 1 |
83,612 | 7,876,578,115 | IssuesEvent | 2018-06-26 01:56:14 | openshiftio/openshift.io | https://api.github.com/repos/openshiftio/openshift.io | opened | Incident: cannot create an application | area/launcher area/tests team/launcher team/platform type/incident-report | == "cannot create an application"
*Period*: "20 Jun 2018 - 21 Jun 2018"
*System*: "OSiO|Launcher"
*Effected*: "~40 users"
=== Story
Fabric8-UI updated OSIO to the latest commit. This push to prod produced an error when trying to create a new application after creating a new space. This was seen in prod-preview and in the e2e tests.
It was initially reported at https://github.com/openshiftio/openshift.io/issues/3833
=== Rundown
I was not aware of the issue that was filed against prod-preview and I did not check the e2e tests. The commits being pushed had updates that were needed for the end of sprint demo. So I did a quick run through on prod-preview. All the commits appear to have take effect and not broken. I didn't look in areas not related to the commits.
Once it was promoted, the OP of #3833 upgraded it to a SEV1. With that awareness we immediately started looking into it and for a cause. When we could not reproduce it locally, I revert the prod update removing the issue from production.
The team continued to try to reproduce it locally. Eventually, @dlabrecq found an order to build PatternFly, Launcher, and then fabric8-UI that didn't break the Launcher. We think it had to do with Launcher package-locke.json getting out of sync with PatternFly version.
It appears that Launcher had a different version of Patternfly then fabric8-ui and the conflict created this error. Once the builds were cleaned up everything worked.
=== Takeaway
The immediate change is that I look at the e2e test before pushing to prod.
Long term we are looking at adding the e2e test results to the build for pushing to prod.
We also agreed that something in prod-preview can be a SEV1 if pushing to prod will break prod.
| 1.0 | Incident: cannot create an application - == "cannot create an application"
*Period*: "20 Jun 2018 - 21 Jun 2018"
*System*: "OSiO|Launcher"
*Effected*: "~40 users"
=== Story
Fabric8-UI updated OSIO to the latest commit. This push to prod produced an error when trying to create a new application after creating a new space. This was seen in prod-preview and in the e2e tests.
It was initially reported at https://github.com/openshiftio/openshift.io/issues/3833
=== Rundown
I was not aware of the issue that was filed against prod-preview and I did not check the e2e tests. The commits being pushed had updates that were needed for the end of sprint demo. So I did a quick run through on prod-preview. All the commits appear to have take effect and not broken. I didn't look in areas not related to the commits.
Once it was promoted, the OP of #3833 upgraded it to a SEV1. With that awareness we immediately started looking into it and for a cause. When we could not reproduce it locally, I revert the prod update removing the issue from production.
The team continued to try to reproduce it locally. Eventually, @dlabrecq found an order to build PatternFly, Launcher, and then fabric8-UI that didn't break the Launcher. We think it had to do with Launcher package-locke.json getting out of sync with PatternFly version.
It appears that Launcher had a different version of Patternfly then fabric8-ui and the conflict created this error. Once the builds were cleaned up everything worked.
=== Takeaway
The immediate change is that I look at the e2e test before pushing to prod.
Long term we are looking at adding the e2e test results to the build for pushing to prod.
We also agreed that something in prod-preview can be a SEV1 if pushing to prod will break prod.
| non_priority | incident cannot create an application cannot create an application period jun jun system osio launcher effected users story ui updated osio to the latest commit this push to prod produced an error when trying to create a new application after creating a new space this was seen in prod preview and in the tests it was initially reported at rundown i was not aware of the issue that was filed against prod preview and i did not check the tests the commits being pushed had updates that were needed for the end of sprint demo so i did a quick run through on prod preview all the commits appear to have take effect and not broken i didn t look in areas not related to the commits once it was promoted the op of upgraded it to a with that awareness we immediately started looking into it and for a cause when we could not reproduce it locally i revert the prod update removing the issue from production the team continued to try to reproduce it locally eventually dlabrecq found an order to build patternfly launcher and then ui that didn t break the launcher we think it had to do with launcher package locke json getting out of sync with patternfly version it appears that launcher had a different version of patternfly then ui and the conflict created this error once the builds were cleaned up everything worked takeaway the immediate change is that i look at the test before pushing to prod long term we are looking at adding the test results to the build for pushing to prod we also agreed that something in prod preview can be a if pushing to prod will break prod | 0 |
716,491 | 24,635,989,724 | IssuesEvent | 2022-10-17 08:00:11 | status-im/status-desktop | https://api.github.com/repos/status-im/status-desktop | opened | [suite_messaging / tst_ChatFlow] - "The user can activate image unfurling" scenario fails | bug Chat priority F2: important squish S:1 messenger | ### Description
1. `The user can activate image unfurling` scenario works **standalone** but when it runs as part of the sequence, the action to **activate link preview** doesn't work.
2. Once it is updated, remove `mayfail` tag.
**IMPORTANT**: Ensure it works standalone and also as part of the sequence. | 1.0 | [suite_messaging / tst_ChatFlow] - "The user can activate image unfurling" scenario fails - ### Description
1. `The user can activate image unfurling` scenario works **standalone** but when it runs as part of the sequence, the action to **activate link preview** doesn't work.
2. Once it is updated, remove `mayfail` tag.
**IMPORTANT**: Ensure it works standalone and also as part of the sequence. | priority | the user can activate image unfurling scenario fails description the user can activate image unfurling scenario works standalone but when it runs as part of the sequence the action to activate link preview doesn t work once it is updated remove mayfail tag important ensure it works standalone and also as part of the sequence | 1 |
222,613 | 7,434,392,662 | IssuesEvent | 2018-03-26 10:52:04 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | www.nbcsports.com - design is broken | browser-firefox-mobile priority-normal | <!-- @browser: Firefox Mobile 61.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 6.0.1; Mobile; rv:61.0) Gecko/61.0 Firefox/61.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: http://www.nbcsports.com/
**Browser / Version**: Firefox Mobile 61.0
**Operating System**: Android 6.0.1
**Tested Another Browser**: Unknown
**Problem type**: Design is broken
**Description**: Banner stories scroll, then disappear
**Steps to Reproduce**:
[](https://webcompat.com/uploads/2018/3/a4a946a2-7b2e-4dfd-99ef-6605b1892004.jpg)
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | 1.0 | www.nbcsports.com - design is broken - <!-- @browser: Firefox Mobile 61.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 6.0.1; Mobile; rv:61.0) Gecko/61.0 Firefox/61.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: http://www.nbcsports.com/
**Browser / Version**: Firefox Mobile 61.0
**Operating System**: Android 6.0.1
**Tested Another Browser**: Unknown
**Problem type**: Design is broken
**Description**: Banner stories scroll, then disappear
**Steps to Reproduce**:
[](https://webcompat.com/uploads/2018/3/a4a946a2-7b2e-4dfd-99ef-6605b1892004.jpg)
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | priority | design is broken url browser version firefox mobile operating system android tested another browser unknown problem type design is broken description banner stories scroll then disappear steps to reproduce from with โค๏ธ | 1 |
602,963 | 18,519,135,459 | IssuesEvent | 2021-10-20 13:26:55 | AY2122S1-CS2103T-T12-2/tp | https://api.github.com/repos/AY2122S1-CS2103T-T12-2/tp | closed | Update GUI for help function | type.Enhancement priority.High | Update the GUI for the additional window for help command.
Change the information shown upon the help command call. From URL to an overview of the available commands | 1.0 | Update GUI for help function - Update the GUI for the additional window for help command.
Change the information shown upon the help command call. From URL to an overview of the available commands | priority | update gui for help function update the gui for the additional window for help command change the information shown upon the help command call from url to an overview of the available commands | 1 |
427,943 | 29,871,556,662 | IssuesEvent | 2023-06-20 08:50:17 | OSeMOSYS/OSeMOSYS_GNU_MathProg | https://api.github.com/repos/OSeMOSYS/OSeMOSYS_GNU_MathProg | closed | Archiving OSeMOSYS | documentation enhancement | I was wondering if we should archive the OSeMOSYS code in Zenodo.
Right now we have a citation file in the repo asking the user to reference the 2011 OSeMOSYS paper.
But an archive on Zenodo would allow to specifically point to the version of OSeMOSYS used with a DOI.
I see that pyPSA has archived it's GitHub repo whereas Calliope hasn't. | 1.0 | Archiving OSeMOSYS - I was wondering if we should archive the OSeMOSYS code in Zenodo.
Right now we have a citation file in the repo asking the user to reference the 2011 OSeMOSYS paper.
But an archive on Zenodo would allow to specifically point to the version of OSeMOSYS used with a DOI.
I see that pyPSA has archived it's GitHub repo whereas Calliope hasn't. | non_priority | archiving osemosys i was wondering if we should archive the osemosys code in zenodo right now we have a citation file in the repo asking the user to reference the osemosys paper but an archive on zenodo would allow to specifically point to the version of osemosys used with a doi i see that pypsa has archived it s github repo whereas calliope hasn t | 0 |
640,189 | 20,775,891,935 | IssuesEvent | 2022-03-16 10:26:13 | passwordcockpit/passwordcockpit | https://api.github.com/repos/passwordcockpit/passwordcockpit | closed | Problems in the view of access rights to a folder | bug fe priority-normal | Elements are overlapped when the screen is small | 1.0 | Problems in the view of access rights to a folder - Elements are overlapped when the screen is small | priority | problems in the view of access rights to a folder elements are overlapped when the screen is small | 1 |
389,838 | 11,517,768,387 | IssuesEvent | 2020-02-14 09:08:38 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | www.bilibili.com - see bug description | browser-fenix engine-gecko priority-critical | <!-- @browser: Firefox Mobile 75.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:75.0) Gecko/75.0 Firefox/75.0 -->
<!-- @reported_with: -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/48241 -->
<!-- @extra_labels: browser-fenix -->
**URL**: https://www.bilibili.com/
**Browser / Version**: Firefox Mobile 75.0
**Operating System**: Android
**Tested Another Browser**: Yes
**Problem type**: Something else
**Description**: ่ทณ่ฝฌAPP
**Steps to Reproduce**:
่ฎฟ้ฎไธป้กตๆฒกๆ้ฎ้ข๏ผ็นๅป่ฟไปปๆ่ง้ขๆญๆพๅฐฑไผ่ทณ่ฝฌๅฐAPP้พๆฅ๏ผ่ฏฅAPPๆชๅฎ่ฃ
ไนไธๆณๅฎ่ฃ
๏ผๅบ็ฐไธๆฏๆ็ๅ่ฎฎ๏ผ่ง้ขๆ ๆณๆญฃๅธธๆญๆพ๏ผๅชๅฎ่ฃ
ไบublockๆฉๅฑใๆต่ฏ่ฟๅ
ถไปๆต่งๆ ้ฎ้ขใ
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | 1.0 | www.bilibili.com - see bug description - <!-- @browser: Firefox Mobile 75.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:75.0) Gecko/75.0 Firefox/75.0 -->
<!-- @reported_with: -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/48241 -->
<!-- @extra_labels: browser-fenix -->
**URL**: https://www.bilibili.com/
**Browser / Version**: Firefox Mobile 75.0
**Operating System**: Android
**Tested Another Browser**: Yes
**Problem type**: Something else
**Description**: ่ทณ่ฝฌAPP
**Steps to Reproduce**:
่ฎฟ้ฎไธป้กตๆฒกๆ้ฎ้ข๏ผ็นๅป่ฟไปปๆ่ง้ขๆญๆพๅฐฑไผ่ทณ่ฝฌๅฐAPP้พๆฅ๏ผ่ฏฅAPPๆชๅฎ่ฃ
ไนไธๆณๅฎ่ฃ
๏ผๅบ็ฐไธๆฏๆ็ๅ่ฎฎ๏ผ่ง้ขๆ ๆณๆญฃๅธธๆญๆพ๏ผๅชๅฎ่ฃ
ไบublockๆฉๅฑใๆต่ฏ่ฟๅ
ถไปๆต่งๆ ้ฎ้ขใ
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | priority | see bug description url browser version firefox mobile operating system android tested another browser yes problem type something else description ่ทณ่ฝฌapp steps to reproduce ่ฎฟ้ฎไธป้กตๆฒกๆ้ฎ้ข๏ผ็นๅป่ฟไปปๆ่ง้ขๆญๆพๅฐฑไผ่ทณ่ฝฌๅฐapp้พๆฅ๏ผ่ฏฅappๆชๅฎ่ฃ
ไนไธๆณๅฎ่ฃ
๏ผๅบ็ฐไธๆฏๆ็ๅ่ฎฎ๏ผ่ง้ขๆ ๆณๆญฃๅธธๆญๆพ๏ผๅชๅฎ่ฃ
ไบublockๆฉๅฑใๆต่ฏ่ฟๅ
ถไปๆต่งๆ ้ฎ้ขใ browser configuration none from with โค๏ธ | 1 |
88,035 | 15,800,679,740 | IssuesEvent | 2021-04-03 00:47:21 | DamieFC/linucrash | https://api.github.com/repos/DamieFC/linucrash | opened | CVE-2021-3444 (High) detected in selinuxselinux-pr-20210322 | security vulnerability | ## CVE-2021-3444 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>selinuxselinux-pr-20210322</b></p></summary>
<p>
<p>SELinux kernel repository</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git>https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/DamieFC/linucrash/commit/1f695a51dc2670cad435321513b01d6972683b5b">1f695a51dc2670cad435321513b01d6972683b5b</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>linucrash/kernel/bpf/verifier.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3444>CVE-2021-3444</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3444">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3444</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution: v5.4.101,v5.10.19,v5.11.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-3444 (High) detected in selinuxselinux-pr-20210322 - ## CVE-2021-3444 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>selinuxselinux-pr-20210322</b></p></summary>
<p>
<p>SELinux kernel repository</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git>https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/DamieFC/linucrash/commit/1f695a51dc2670cad435321513b01d6972683b5b">1f695a51dc2670cad435321513b01d6972683b5b</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>linucrash/kernel/bpf/verifier.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3444>CVE-2021-3444</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3444">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3444</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution: v5.4.101,v5.10.19,v5.11.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in selinuxselinux pr cve high severity vulnerability vulnerable library selinuxselinux pr selinux kernel repository library home page a href found in head commit a href found in base branch master vulnerable source files linucrash kernel bpf verifier c vulnerability details the bpf verifier in the linux kernel did not properly handle destination register truncation when the source register was known to be a local attacker with the ability to load bpf programs could use this gain out of bounds reads in kernel memory leading to information disclosure kernel memory and possibly out of bounds writes that could potentially lead to code execution this issue was addressed in the upstream kernel in commit bpf fix truncation handling for dst reg wrt zero and in linux stable kernels and publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
57,033 | 6,536,311,433 | IssuesEvent | 2017-08-31 17:39:05 | w3c/testharness.js | https://api.github.com/repos/w3c/testharness.js | closed | Disable the timeout automatically for manual tests? | testharness.js | Tests that check features that require some initial user gesture are typically semi-manual: they require the user to do something, e.g. click on a button, and the test can then use the test harness to compute and report the result to the test runner automatically.
It's hard to predict how long the user is going to need to read and follow the instructions, and these tests disable the harness timeout with a call to `setup({explicit_timeout: true});`.
It's easy to forget that this call is needed though. How about disabling the timeout automatically for tests that end with `-manual.html`? Or are there manual tests that need the timeout?
I'd be happy to prepare a pull request if that sounds like a good idea (and an update to the documentation to mention that case).
| 1.0 | Disable the timeout automatically for manual tests? - Tests that check features that require some initial user gesture are typically semi-manual: they require the user to do something, e.g. click on a button, and the test can then use the test harness to compute and report the result to the test runner automatically.
It's hard to predict how long the user is going to need to read and follow the instructions, and these tests disable the harness timeout with a call to `setup({explicit_timeout: true});`.
It's easy to forget that this call is needed though. How about disabling the timeout automatically for tests that end with `-manual.html`? Or are there manual tests that need the timeout?
I'd be happy to prepare a pull request if that sounds like a good idea (and an update to the documentation to mention that case).
| non_priority | disable the timeout automatically for manual tests tests that check features that require some initial user gesture are typically semi manual they require the user to do something e g click on a button and the test can then use the test harness to compute and report the result to the test runner automatically it s hard to predict how long the user is going to need to read and follow the instructions and these tests disable the harness timeout with a call to setup explicit timeout true it s easy to forget that this call is needed though how about disabling the timeout automatically for tests that end with manual html or are there manual tests that need the timeout i d be happy to prepare a pull request if that sounds like a good idea and an update to the documentation to mention that case | 0 |
822,459 | 30,873,259,596 | IssuesEvent | 2023-08-03 12:48:30 | awslabs/aws-dataall | https://api.github.com/repos/awslabs/aws-dataall | closed | Additional encryption in SNS topics in transit | type: enhancement priority: low status: not-picked-yet | **Is your idea related to a problem? Please describe.**
I would like a review on the SNS in transit encryption settings and ensure SNS- Enforce encryption of data in transit
| 1.0 | Additional encryption in SNS topics in transit - **Is your idea related to a problem? Please describe.**
I would like a review on the SNS in transit encryption settings and ensure SNS- Enforce encryption of data in transit
| priority | additional encryption in sns topics in transit is your idea related to a problem please describe i would like a review on the sns in transit encryption settings and ensure sns enforce encryption of data in transit | 1 |
45,368 | 12,745,614,279 | IssuesEvent | 2020-06-26 14:32:54 | department-of-veterans-affairs/va.gov-cms | https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms | opened | Minor: Links to forms are not scanned by node link report | Defect | **Describe the defect**
Form db data pointing to a non-existent form is not caught by the node link report due to our magic of putting this in an alternate view mode. It bypasses the node link report scanning completely.
The link in the screenshot should show up as broken.

This is a minor problem right now, BUT when these pages are published and if the forms data pointed to a bad page, the content release link checker will fail without any editor being aware of it.
I am not clear yet on where to resolve this but my hunch is the solution has to reside in our code and can not be extrapolated into the node_link_report module.
**To Reproduce**
Steps to reproduce the behavior:
1. Create a test va_form
2. Enter a bad link in the "Link to form" field and save the node
3. Notice the broken link is not revealed by the node link report.
**Expected behavior**
A clear and concise description of what you expected to happen.
**Screenshots**
If applicable, add screenshots to help explain your problem.
**Desktop (please complete the following information if relevant, or delete):**
- OS: [e.g. iOS]
- Browser [e.g. chrome, safari]
- Version [e.g. 22]
**Additional context**
Add any other context about the problem here.
## Labels
(You can delete this section once it's complete)
- [x] Issue type (red) (defaults to "Defect")
- [ ] CMS subsystem (green)
- [ ] CMS practice area (blue)
- [x] CMS objective (orange) (not needed for bug tickets)
- [ ] CMS-supported product (black)
| 1.0 | Minor: Links to forms are not scanned by node link report - **Describe the defect**
Form db data pointing to a non-existent form is not caught by the node link report due to our magic of putting this in an alternate view mode. It bypasses the node link report scanning completely.
The link in the screenshot should show up as broken.

This is a minor problem right now, BUT when these pages are published and if the forms data pointed to a bad page, the content release link checker will fail without any editor being aware of it.
I am not clear yet on where to resolve this but my hunch is the solution has to reside in our code and can not be extrapolated into the node_link_report module.
**To Reproduce**
Steps to reproduce the behavior:
1. Create a test va_form
2. Enter a bad link in the "Link to form" field and save the node
3. Notice the broken link is not revealed by the node link report.
**Expected behavior**
A clear and concise description of what you expected to happen.
**Screenshots**
If applicable, add screenshots to help explain your problem.
**Desktop (please complete the following information if relevant, or delete):**
- OS: [e.g. iOS]
- Browser [e.g. chrome, safari]
- Version [e.g. 22]
**Additional context**
Add any other context about the problem here.
## Labels
(You can delete this section once it's complete)
- [x] Issue type (red) (defaults to "Defect")
- [ ] CMS subsystem (green)
- [ ] CMS practice area (blue)
- [x] CMS objective (orange) (not needed for bug tickets)
- [ ] CMS-supported product (black)
| non_priority | minor links to forms are not scanned by node link report describe the defect form db data pointing to a non existent form is not caught by the node link report due to our magic of putting this in an alternate view mode it bypasses the node link report scanning completely the link in the screenshot should show up as broken this is a minor problem right now but when these pages are published and if the forms data pointed to a bad page the content release link checker will fail without any editor being aware of it i am not clear yet on where to resolve this but my hunch is the solution has to reside in our code and can not be extrapolated into the node link report module to reproduce steps to reproduce the behavior create a test va form enter a bad link in the link to form field and save the node notice the broken link is not revealed by the node link report expected behavior a clear and concise description of what you expected to happen screenshots if applicable add screenshots to help explain your problem desktop please complete the following information if relevant or delete os browser version additional context add any other context about the problem here labels you can delete this section once it s complete issue type red defaults to defect cms subsystem green cms practice area blue cms objective orange not needed for bug tickets cms supported product black | 0 |
145,362 | 13,148,924,526 | IssuesEvent | 2020-08-09 01:10:40 | depromeet/miracle-backend | https://api.github.com/repos/depromeet/miracle-backend | closed | ์ค์ผ์ฅด | documentation enhancement | * ์ค์ผ์ฅด์์ ์นดํ
๊ณ ๋ฆฌ๋ = (๋
์, ์ด๋, ๋ช
์, ํ์ธ์ค ํ๊ฐ)
* ๊ณผ๊ฑฐ์ ์ค์ผ์ฅด์ ๋ณด์ฌ์ค ํ์๋ ์์ (์ค๋๋ถํฐ 7์ผ๊ฐ์ ์ค์ผ์ฅด์ ๋ณด์ฌ์ค ์์ )
* ์ผ ๋จ์๋ก ์ค์ผ์ฅด ์ ๋ณด๋ฅผ ์์ฒญํ๋ ๋ฐฉ์์ผ๋ก ๊ฒฐ์ ๋์์ต๋๋ค. (2020-08-07์ ๋ชจ๋ ์ค์ผ์ฅด)
* ์ค์ผ์ฅด์ ๋ฑ๋กํ ์ ์์ผ๋ฉฐ, ํธ์งํ ์ ๋ ์์ต๋๋ค
* ์ค์ผ์ฅด ์๊ฐ์ด ์ค๋ณต๋์ง ์๋๋ก ์๋ฒ์์ ์ฒ๋ฆฌํ๊ธฐ๋ก ํ์์ต๋๋ค.
(08:00 - 08:20 ๋
์๊ฐ ์์๋, 08:10 - 08:30) ์ด๋์ ์ถ๊ฐํ๋ คํ๋ฉด Exception) | 1.0 | ์ค์ผ์ฅด - * ์ค์ผ์ฅด์์ ์นดํ
๊ณ ๋ฆฌ๋ = (๋
์, ์ด๋, ๋ช
์, ํ์ธ์ค ํ๊ฐ)
* ๊ณผ๊ฑฐ์ ์ค์ผ์ฅด์ ๋ณด์ฌ์ค ํ์๋ ์์ (์ค๋๋ถํฐ 7์ผ๊ฐ์ ์ค์ผ์ฅด์ ๋ณด์ฌ์ค ์์ )
* ์ผ ๋จ์๋ก ์ค์ผ์ฅด ์ ๋ณด๋ฅผ ์์ฒญํ๋ ๋ฐฉ์์ผ๋ก ๊ฒฐ์ ๋์์ต๋๋ค. (2020-08-07์ ๋ชจ๋ ์ค์ผ์ฅด)
* ์ค์ผ์ฅด์ ๋ฑ๋กํ ์ ์์ผ๋ฉฐ, ํธ์งํ ์ ๋ ์์ต๋๋ค
* ์ค์ผ์ฅด ์๊ฐ์ด ์ค๋ณต๋์ง ์๋๋ก ์๋ฒ์์ ์ฒ๋ฆฌํ๊ธฐ๋ก ํ์์ต๋๋ค.
(08:00 - 08:20 ๋
์๊ฐ ์์๋, 08:10 - 08:30) ์ด๋์ ์ถ๊ฐํ๋ คํ๋ฉด Exception) | non_priority | ์ค์ผ์ฅด ์ค์ผ์ฅด์์ ์นดํ
๊ณ ๋ฆฌ๋ ๋
์ ์ด๋ ๋ช
์ ํ์ธ์ค ํ๊ฐ ๊ณผ๊ฑฐ์ ์ค์ผ์ฅด์ ๋ณด์ฌ์ค ํ์๋ ์์ ์ค๋๋ถํฐ ์ค์ผ์ฅด์ ๋ณด์ฌ์ค ์์ ์ผ ๋จ์๋ก ์ค์ผ์ฅด ์ ๋ณด๋ฅผ ์์ฒญํ๋ ๋ฐฉ์์ผ๋ก ๊ฒฐ์ ๋์์ต๋๋ค ๋ชจ๋ ์ค์ผ์ฅด ์ค์ผ์ฅด์ ๋ฑ๋กํ ์ ์์ผ๋ฉฐ ํธ์งํ ์ ๋ ์์ต๋๋ค ์ค์ผ์ฅด ์๊ฐ์ด ์ค๋ณต๋์ง ์๋๋ก ์๋ฒ์์ ์ฒ๋ฆฌํ๊ธฐ๋ก ํ์์ต๋๋ค ๋
์๊ฐ ์์๋ ์ด๋์ ์ถ๊ฐํ๋ คํ๋ฉด exception | 0 |
450,924 | 13,021,540,583 | IssuesEvent | 2020-07-27 06:35:10 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | staticweb.bankofamerica.com - site is not usable | browser-firefox-mobile engine-gecko ml-needsdiagnosis-false priority-important | <!-- @browser: Firefox Mobile 78.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:78.0) Gecko/78.0 Firefox/78.0 -->
<!-- @reported_with: unknown -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/55919 -->
**URL**: https://staticweb.bankofamerica.com/cavmwebbactouch/common/index.html
**Browser / Version**: Firefox Mobile 78.0
**Operating System**: Android
**Tested Another Browser**: Yes Other
**Problem type**: Site is not usable
**Description**: Page not loading correctly
**Steps to Reproduce**:
Frame hanging in desktop mode.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | 1.0 | staticweb.bankofamerica.com - site is not usable - <!-- @browser: Firefox Mobile 78.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:78.0) Gecko/78.0 Firefox/78.0 -->
<!-- @reported_with: unknown -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/55919 -->
**URL**: https://staticweb.bankofamerica.com/cavmwebbactouch/common/index.html
**Browser / Version**: Firefox Mobile 78.0
**Operating System**: Android
**Tested Another Browser**: Yes Other
**Problem type**: Site is not usable
**Description**: Page not loading correctly
**Steps to Reproduce**:
Frame hanging in desktop mode.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | priority | staticweb bankofamerica com site is not usable url browser version firefox mobile operating system android tested another browser yes other problem type site is not usable description page not loading correctly steps to reproduce frame hanging in desktop mode browser configuration none from with โค๏ธ | 1 |
24,550 | 2,668,933,123 | IssuesEvent | 2015-03-23 12:38:39 | CarlosPlusPlus/ghanban | https://api.github.com/repos/CarlosPlusPlus/ghanban | closed | Update README with Project Specifics | priority: low size: 1 type: feature | Would be great to update original README.rdoc => README.md with relevant information. | 1.0 | Update README with Project Specifics - Would be great to update original README.rdoc => README.md with relevant information. | priority | update readme with project specifics would be great to update original readme rdoc readme md with relevant information | 1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.