Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
1k
labels
stringlengths
4
1.38k
body
stringlengths
1
262k
index
stringclasses
16 values
text_combine
stringlengths
96
262k
label
stringclasses
2 values
text
stringlengths
96
252k
binary_label
int64
0
1
50,886
13,187,940,322
IssuesEvent
2020-08-13 05:05:24
icecube-trac/tix3
https://api.github.com/repos/icecube-trac/tix3
closed
icetray-inspect - on OSX hdfwriter is included as an inspectable project, when it is not built (Trac #1605)
Migrated from Trac defect infrastructure
`hdfwriter` doesn't build for me because I don't have the HDF5 libs installed. `icetray-inspect` still tries to do it's thing though... ```text hdfwriter Error cant load 'hdfwriter': dlopen(/Users/nega/i3/combo/build/lib/icecube/hdfwriter.so, 2): image not found HiveSplitter ``` <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1605">https://code.icecube.wisc.edu/ticket/1605</a>, reported by nega and owned by kjmeagher</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:11:42", "description": "`hdfwriter` doesn't build for me because I don't have the HDF5 libs installed.\n\n`icetray-inspect` still tries to do it's thing though...\n\n{{{\nhdfwriter\nError cant load 'hdfwriter': dlopen(/Users/nega/i3/combo/build/lib/icecube/hdfwriter.so, 2): image not found\nHiveSplitter\n}}}\n", "reporter": "nega", "cc": "", "resolution": "fixed", "_ts": "1550067102580394", "component": "infrastructure", "summary": "icetray-inspect - on OSX hdfwriter is included as an inspectable project, when it is not built", "priority": "major", "keywords": "documentation", "time": "2016-03-28T17:38:03", "milestone": "", "owner": "kjmeagher", "type": "defect" } ``` </p> </details>
1.0
icetray-inspect - on OSX hdfwriter is included as an inspectable project, when it is not built (Trac #1605) - `hdfwriter` doesn't build for me because I don't have the HDF5 libs installed. `icetray-inspect` still tries to do it's thing though... ```text hdfwriter Error cant load 'hdfwriter': dlopen(/Users/nega/i3/combo/build/lib/icecube/hdfwriter.so, 2): image not found HiveSplitter ``` <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1605">https://code.icecube.wisc.edu/ticket/1605</a>, reported by nega and owned by kjmeagher</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:11:42", "description": "`hdfwriter` doesn't build for me because I don't have the HDF5 libs installed.\n\n`icetray-inspect` still tries to do it's thing though...\n\n{{{\nhdfwriter\nError cant load 'hdfwriter': dlopen(/Users/nega/i3/combo/build/lib/icecube/hdfwriter.so, 2): image not found\nHiveSplitter\n}}}\n", "reporter": "nega", "cc": "", "resolution": "fixed", "_ts": "1550067102580394", "component": "infrastructure", "summary": "icetray-inspect - on OSX hdfwriter is included as an inspectable project, when it is not built", "priority": "major", "keywords": "documentation", "time": "2016-03-28T17:38:03", "milestone": "", "owner": "kjmeagher", "type": "defect" } ``` </p> </details>
non_priority
icetray inspect on osx hdfwriter is included as an inspectable project when it is not built trac hdfwriter doesn t build for me because i don t have the libs installed icetray inspect still tries to do it s thing though text hdfwriter error cant load hdfwriter dlopen users nega combo build lib icecube hdfwriter so image not found hivesplitter migrated from json status closed changetime description hdfwriter doesn t build for me because i don t have the libs installed n n icetray inspect still tries to do it s thing though n n nhdfwriter nerror cant load hdfwriter dlopen users nega combo build lib icecube hdfwriter so image not found nhivesplitter n n reporter nega cc resolution fixed ts component infrastructure summary icetray inspect on osx hdfwriter is included as an inspectable project when it is not built priority major keywords documentation time milestone owner kjmeagher type defect
0
798,638
28,291,810,709
IssuesEvent
2023-04-09 09:56:56
AY2223S2-CS2113-T11-2/tp
https://api.github.com/repos/AY2223S2-CS2113-T11-2/tp
closed
[PE-D][Tester C] status and details command not working without internet connection
priority.High severity.High
![image.png](https://raw.githubusercontent.com/darrenangwx/ped/main/files/23fca6f1-5569-422e-9fdc-4e47823cfa03.png) As seen above, if I do not have any internet connection, I am unable to see my status or any module information <!--session: 1680252477820-2dadd4cb-e494-46c6-a48e-457077390957--> <!--Version: Web v3.4.7--> ------------- Labels: `type.FunctionalityBug` `severity.Low` original: darrenangwx/ped#5
1.0
[PE-D][Tester C] status and details command not working without internet connection - ![image.png](https://raw.githubusercontent.com/darrenangwx/ped/main/files/23fca6f1-5569-422e-9fdc-4e47823cfa03.png) As seen above, if I do not have any internet connection, I am unable to see my status or any module information <!--session: 1680252477820-2dadd4cb-e494-46c6-a48e-457077390957--> <!--Version: Web v3.4.7--> ------------- Labels: `type.FunctionalityBug` `severity.Low` original: darrenangwx/ped#5
priority
status and details command not working without internet connection as seen above if i do not have any internet connection i am unable to see my status or any module information labels type functionalitybug severity low original darrenangwx ped
1
94,489
15,962,386,757
IssuesEvent
2021-04-16 01:12:41
RG4421/cbp-theme
https://api.github.com/repos/RG4421/cbp-theme
opened
CVE-2020-15366 (Medium) detected in multiple libraries
security vulnerability
## CVE-2020-15366 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ajv-6.12.0.tgz</b>, <b>ajv-6.10.0.tgz</b>, <b>ajv-4.11.8.tgz</b>, <b>ajv-6.11.0.tgz</b>, <b>ajv-6.5.3.tgz</b>, <b>ajv-5.5.2.tgz</b></p></summary> <p> <details><summary><b>ajv-6.12.0.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.12.0.tgz">https://registry.npmjs.org/ajv/-/ajv-6.12.0.tgz</a></p> <p>Path to dependency file: cbp-theme/ds-ux-guidelines/package.json</p> <p>Path to vulnerable library: cbp-theme/ds-ux-guidelines/node_modules/schema-utils/node_modules/ajv/package.json,cbp-theme/ds-css/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - webpack-4.42.1.tgz (Root Library) - :x: **ajv-6.12.0.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-6.10.0.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.10.0.tgz">https://registry.npmjs.org/ajv/-/ajv-6.10.0.tgz</a></p> <p>Path to dependency file: cbp-theme/cbp-theme/package.json</p> <p>Path to vulnerable library: cbp-theme/cbp-theme/node_modules/har-validator/node_modules/ajv/package.json,cbp-theme/node_modules/har-validator/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - node-sass-4.11.0.tgz (Root Library) - request-2.88.0.tgz - har-validator-5.1.3.tgz - :x: **ajv-6.10.0.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-4.11.8.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz">https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz</a></p> <p>Path to dependency file: cbp-theme/cbp-theme/package.json</p> <p>Path to vulnerable library: cbp-theme/cbp-theme/node_modules/standard/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - standard-10.0.3.tgz (Root Library) - eslint-3.19.0.tgz - table-3.8.3.tgz - :x: **ajv-4.11.8.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-6.11.0.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.11.0.tgz">https://registry.npmjs.org/ajv/-/ajv-6.11.0.tgz</a></p> <p>Path to dependency file: cbp-theme/ds-ux-guidelines/package.json</p> <p>Path to vulnerable library: cbp-theme/ds-ux-guidelines/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - gatsby-2.20.10.tgz (Root Library) - eslint-6.8.0.tgz - :x: **ajv-6.11.0.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-6.5.3.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.5.3.tgz">https://registry.npmjs.org/ajv/-/ajv-6.5.3.tgz</a></p> <p>Path to dependency file: cbp-theme/package.json</p> <p>Path to vulnerable library: cbp-theme/node_modules/serve/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - serve-11.2.0.tgz (Root Library) - :x: **ajv-6.5.3.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-5.5.2.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz">https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz</a></p> <p>Path to dependency file: cbp-theme/cbp-theme/package.json</p> <p>Path to vulnerable library: cbp-theme/cbp-theme/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - eslint-4.19.1.tgz (Root Library) - :x: **ajv-5.5.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.) <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366>CVE-2020-15366</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/ajv-validator/ajv/releases/tag/v6.12.3">https://github.com/ajv-validator/ajv/releases/tag/v6.12.3</a></p> <p>Release Date: 2020-07-15</p> <p>Fix Resolution: ajv - 6.12.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"6.12.0","packageFilePaths":["/ds-ux-guidelines/package.json","/ds-css/package.json"],"isTransitiveDependency":true,"dependencyTree":"webpack:4.42.1;ajv:6.12.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"},{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"6.10.0","packageFilePaths":["/cbp-theme/package.json","/package.json"],"isTransitiveDependency":true,"dependencyTree":"node-sass:4.11.0;request:2.88.0;har-validator:5.1.3;ajv:6.10.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"},{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"4.11.8","packageFilePaths":["/cbp-theme/package.json"],"isTransitiveDependency":true,"dependencyTree":"standard:10.0.3;eslint:3.19.0;table:3.8.3;ajv:4.11.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"},{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"6.11.0","packageFilePaths":["/ds-ux-guidelines/package.json"],"isTransitiveDependency":true,"dependencyTree":"gatsby:2.20.10;eslint:6.8.0;ajv:6.11.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"},{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"6.5.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"serve:11.2.0;ajv:6.5.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"},{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"5.5.2","packageFilePaths":["/cbp-theme/package.json"],"isTransitiveDependency":true,"dependencyTree":"eslint:4.19.1;ajv:5.5.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-15366","vulnerabilityDetails":"An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366","cvss3Severity":"medium","cvss3Score":"5.6","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-15366 (Medium) detected in multiple libraries - ## CVE-2020-15366 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ajv-6.12.0.tgz</b>, <b>ajv-6.10.0.tgz</b>, <b>ajv-4.11.8.tgz</b>, <b>ajv-6.11.0.tgz</b>, <b>ajv-6.5.3.tgz</b>, <b>ajv-5.5.2.tgz</b></p></summary> <p> <details><summary><b>ajv-6.12.0.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.12.0.tgz">https://registry.npmjs.org/ajv/-/ajv-6.12.0.tgz</a></p> <p>Path to dependency file: cbp-theme/ds-ux-guidelines/package.json</p> <p>Path to vulnerable library: cbp-theme/ds-ux-guidelines/node_modules/schema-utils/node_modules/ajv/package.json,cbp-theme/ds-css/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - webpack-4.42.1.tgz (Root Library) - :x: **ajv-6.12.0.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-6.10.0.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.10.0.tgz">https://registry.npmjs.org/ajv/-/ajv-6.10.0.tgz</a></p> <p>Path to dependency file: cbp-theme/cbp-theme/package.json</p> <p>Path to vulnerable library: cbp-theme/cbp-theme/node_modules/har-validator/node_modules/ajv/package.json,cbp-theme/node_modules/har-validator/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - node-sass-4.11.0.tgz (Root Library) - request-2.88.0.tgz - har-validator-5.1.3.tgz - :x: **ajv-6.10.0.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-4.11.8.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz">https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz</a></p> <p>Path to dependency file: cbp-theme/cbp-theme/package.json</p> <p>Path to vulnerable library: cbp-theme/cbp-theme/node_modules/standard/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - standard-10.0.3.tgz (Root Library) - eslint-3.19.0.tgz - table-3.8.3.tgz - :x: **ajv-4.11.8.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-6.11.0.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.11.0.tgz">https://registry.npmjs.org/ajv/-/ajv-6.11.0.tgz</a></p> <p>Path to dependency file: cbp-theme/ds-ux-guidelines/package.json</p> <p>Path to vulnerable library: cbp-theme/ds-ux-guidelines/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - gatsby-2.20.10.tgz (Root Library) - eslint-6.8.0.tgz - :x: **ajv-6.11.0.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-6.5.3.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.5.3.tgz">https://registry.npmjs.org/ajv/-/ajv-6.5.3.tgz</a></p> <p>Path to dependency file: cbp-theme/package.json</p> <p>Path to vulnerable library: cbp-theme/node_modules/serve/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - serve-11.2.0.tgz (Root Library) - :x: **ajv-6.5.3.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-5.5.2.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz">https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz</a></p> <p>Path to dependency file: cbp-theme/cbp-theme/package.json</p> <p>Path to vulnerable library: cbp-theme/cbp-theme/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - eslint-4.19.1.tgz (Root Library) - :x: **ajv-5.5.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.) <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366>CVE-2020-15366</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/ajv-validator/ajv/releases/tag/v6.12.3">https://github.com/ajv-validator/ajv/releases/tag/v6.12.3</a></p> <p>Release Date: 2020-07-15</p> <p>Fix Resolution: ajv - 6.12.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"6.12.0","packageFilePaths":["/ds-ux-guidelines/package.json","/ds-css/package.json"],"isTransitiveDependency":true,"dependencyTree":"webpack:4.42.1;ajv:6.12.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"},{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"6.10.0","packageFilePaths":["/cbp-theme/package.json","/package.json"],"isTransitiveDependency":true,"dependencyTree":"node-sass:4.11.0;request:2.88.0;har-validator:5.1.3;ajv:6.10.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"},{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"4.11.8","packageFilePaths":["/cbp-theme/package.json"],"isTransitiveDependency":true,"dependencyTree":"standard:10.0.3;eslint:3.19.0;table:3.8.3;ajv:4.11.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"},{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"6.11.0","packageFilePaths":["/ds-ux-guidelines/package.json"],"isTransitiveDependency":true,"dependencyTree":"gatsby:2.20.10;eslint:6.8.0;ajv:6.11.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"},{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"6.5.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"serve:11.2.0;ajv:6.5.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"},{"packageType":"javascript/Node.js","packageName":"ajv","packageVersion":"5.5.2","packageFilePaths":["/cbp-theme/package.json"],"isTransitiveDependency":true,"dependencyTree":"eslint:4.19.1;ajv:5.5.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"ajv - 6.12.3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-15366","vulnerabilityDetails":"An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366","cvss3Severity":"medium","cvss3Score":"5.6","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries ajv tgz ajv tgz ajv tgz ajv tgz ajv tgz ajv tgz ajv tgz another json schema validator library home page a href path to dependency file cbp theme ds ux guidelines package json path to vulnerable library cbp theme ds ux guidelines node modules schema utils node modules ajv package json cbp theme ds css node modules ajv package json dependency hierarchy webpack tgz root library x ajv tgz vulnerable library ajv tgz another json schema validator library home page a href path to dependency file cbp theme cbp theme package json path to vulnerable library cbp theme cbp theme node modules har validator node modules ajv package json cbp theme node modules har validator node modules ajv package json dependency hierarchy node sass tgz root library request tgz har validator tgz x ajv tgz vulnerable library ajv tgz another json schema validator library home page a href path to dependency file cbp theme cbp theme package json path to vulnerable library cbp theme cbp theme node modules standard node modules ajv package json dependency hierarchy standard tgz root library eslint tgz table tgz x ajv tgz vulnerable library ajv tgz another json schema validator library home page a href path to dependency file cbp theme ds ux guidelines package json path to vulnerable library cbp theme ds ux guidelines node modules ajv package json dependency hierarchy gatsby tgz root library eslint tgz x ajv tgz vulnerable library ajv tgz another json schema validator library home page a href path to dependency file cbp theme package json path to vulnerable library cbp theme node modules serve node modules ajv package json dependency hierarchy serve tgz root library x ajv tgz vulnerable library ajv tgz another json schema validator library home page a href path to dependency file cbp theme cbp theme package json path to vulnerable library cbp theme cbp theme node modules ajv package json dependency hierarchy eslint tgz root library x ajv tgz vulnerable library found in base branch master vulnerability details an issue was discovered in ajv validate in ajv aka another json schema validator a carefully crafted json schema could be provided that allows execution of other code by prototype pollution while untrusted schemas are recommended against the worst case of an untrusted schema should be a denial of service not execution of code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ajv isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree webpack ajv isminimumfixversionavailable true minimumfixversion ajv packagetype javascript node js packagename ajv packageversion packagefilepaths istransitivedependency true dependencytree node sass request har validator ajv isminimumfixversionavailable true minimumfixversion ajv packagetype javascript node js packagename ajv packageversion packagefilepaths istransitivedependency true dependencytree standard eslint table ajv isminimumfixversionavailable true minimumfixversion ajv packagetype javascript node js packagename ajv packageversion packagefilepaths istransitivedependency true dependencytree gatsby eslint ajv isminimumfixversionavailable true minimumfixversion ajv packagetype javascript node js packagename ajv packageversion packagefilepaths istransitivedependency true dependencytree serve ajv isminimumfixversionavailable true minimumfixversion ajv packagetype javascript node js packagename ajv packageversion packagefilepaths istransitivedependency true dependencytree eslint ajv isminimumfixversionavailable true minimumfixversion ajv basebranches vulnerabilityidentifier cve vulnerabilitydetails an issue was discovered in ajv validate in ajv aka another json schema validator a carefully crafted json schema could be provided that allows execution of other code by prototype pollution while untrusted schemas are recommended against the worst case of an untrusted schema should be a denial of service not execution of code vulnerabilityurl
0
549,934
16,101,985,604
IssuesEvent
2021-04-27 10:27:58
snowplow/snowplow-android-tracker
https://api.github.com/repos/snowplow/snowplow-android-tracker
closed
Fix OkHttpClient sslSocketFactory always overriden
priority:medium status:completed type:enhancement
`Emitter.Builder` allows passing a custom `OkHttpClient` while building an `Emitter`. However, that client's `sslSocketFactory` is always being overriden [here](https://github.com/snowplow/snowplow-android-tracker/blob/master/snowplow-tracker/src/main/java/com/snowplowanalytics/snowplow/tracker/OkHttpNetworkConnection.java#L167). This prevents enabling certificate pinning or adding some custom certificates to `OkHttpClient` instances. I think Snowplow SDK should not override anything in user provided `OkHttpClient` instance to not break user's OkHttp configuration. Is it possible to modify that part so that it looks like something similar to following? ```java if (builder.client == null) { client = new OkHttpClient.Builder() .sslSocketFactory(tlsArguments.getSslSocketFactory(), tlsArguments.getTrustManager()) .connectTimeout(15, TimeUnit.SECONDS) .readTimeout(15, TimeUnit.SECONDS) .build(); } else { client = builder.client; } ```
1.0
Fix OkHttpClient sslSocketFactory always overriden - `Emitter.Builder` allows passing a custom `OkHttpClient` while building an `Emitter`. However, that client's `sslSocketFactory` is always being overriden [here](https://github.com/snowplow/snowplow-android-tracker/blob/master/snowplow-tracker/src/main/java/com/snowplowanalytics/snowplow/tracker/OkHttpNetworkConnection.java#L167). This prevents enabling certificate pinning or adding some custom certificates to `OkHttpClient` instances. I think Snowplow SDK should not override anything in user provided `OkHttpClient` instance to not break user's OkHttp configuration. Is it possible to modify that part so that it looks like something similar to following? ```java if (builder.client == null) { client = new OkHttpClient.Builder() .sslSocketFactory(tlsArguments.getSslSocketFactory(), tlsArguments.getTrustManager()) .connectTimeout(15, TimeUnit.SECONDS) .readTimeout(15, TimeUnit.SECONDS) .build(); } else { client = builder.client; } ```
priority
fix okhttpclient sslsocketfactory always overriden emitter builder allows passing a custom okhttpclient while building an emitter however that client s sslsocketfactory is always being overriden this prevents enabling certificate pinning or adding some custom certificates to okhttpclient instances i think snowplow sdk should not override anything in user provided okhttpclient instance to not break user s okhttp configuration is it possible to modify that part so that it looks like something similar to following java if builder client null client new okhttpclient builder sslsocketfactory tlsarguments getsslsocketfactory tlsarguments gettrustmanager connecttimeout timeunit seconds readtimeout timeunit seconds build else client builder client
1
24,425
2,667,563,509
IssuesEvent
2015-03-22 18:40:51
warneboldt/frasernw
https://api.github.com/repos/warneboldt/frasernw
opened
Implement "accepting limited new referrals" for clinics
Medium Priority
The "orange check" from specialists should also work for clinics
1.0
Implement "accepting limited new referrals" for clinics - The "orange check" from specialists should also work for clinics
priority
implement accepting limited new referrals for clinics the orange check from specialists should also work for clinics
1
264,397
8,309,505,947
IssuesEvent
2018-09-24 07:00:13
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
times.hinet.net - “Like/Share” button labels are misaligned
Re-triaged browser-firefox-mobile priority-important severity-minor
<!-- @browser: Firefox Mobile Nightly 58.0a1 (2017-10-10) --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:56.0) Gecko/20100101 Firefox/56.0 --> <!-- @reported_with: web --> **URL**: https://times.hinet.net/mobile/topic/20770626 **Browser / Version**: Firefox Mobile Nightly 58.0a1 (2017-10-10) **Operating System**: Huawei P10 (Android 7.0) - Resolution 1080 x 1920 pixels (~432 ppi pixel density) **Tested Another Browser**: Yes **Problem type**: Design is broken **Description**: “Like/Share” button labels are misaligned **Steps to Reproduce**: 1. Navigate https://times.hinet.net/mobile/topic/20770626. 2. Scroll the page to the end of the article. 3. Observe “Like/Share” buttons. **Expected Behavior:** Labels are centered. **Actual Behavior:** Labels are misaligned. **Note:** 1. Reproducible on Firefox 56.0 Release (Mobile). 2. Not reproducible on Chrome (Mobile) 61.0.3163.98. 3. Screenshot attached. **Watchers:** @softvision-sergiulogigan @softvision-oana-arbuzov sv; country: tw [![Screenshot Description](https://webcompat.com/uploads/2017/10/0422c31d-ae39-4813-8de5-e5b32b0dca21-thumb.jpeg)](https://webcompat.com/uploads/2017/10/0422c31d-ae39-4813-8de5-e5b32b0dca21.jpeg) _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
times.hinet.net - “Like/Share” button labels are misaligned - <!-- @browser: Firefox Mobile Nightly 58.0a1 (2017-10-10) --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:56.0) Gecko/20100101 Firefox/56.0 --> <!-- @reported_with: web --> **URL**: https://times.hinet.net/mobile/topic/20770626 **Browser / Version**: Firefox Mobile Nightly 58.0a1 (2017-10-10) **Operating System**: Huawei P10 (Android 7.0) - Resolution 1080 x 1920 pixels (~432 ppi pixel density) **Tested Another Browser**: Yes **Problem type**: Design is broken **Description**: “Like/Share” button labels are misaligned **Steps to Reproduce**: 1. Navigate https://times.hinet.net/mobile/topic/20770626. 2. Scroll the page to the end of the article. 3. Observe “Like/Share” buttons. **Expected Behavior:** Labels are centered. **Actual Behavior:** Labels are misaligned. **Note:** 1. Reproducible on Firefox 56.0 Release (Mobile). 2. Not reproducible on Chrome (Mobile) 61.0.3163.98. 3. Screenshot attached. **Watchers:** @softvision-sergiulogigan @softvision-oana-arbuzov sv; country: tw [![Screenshot Description](https://webcompat.com/uploads/2017/10/0422c31d-ae39-4813-8de5-e5b32b0dca21-thumb.jpeg)](https://webcompat.com/uploads/2017/10/0422c31d-ae39-4813-8de5-e5b32b0dca21.jpeg) _From [webcompat.com](https://webcompat.com/) with ❤️_
priority
times hinet net “like share” button labels are misaligned url browser version firefox mobile nightly operating system huawei android resolution x pixels ppi pixel density tested another browser yes problem type design is broken description “like share” button labels are misaligned steps to reproduce navigate scroll the page to the end of the article observe “like share” buttons expected behavior labels are centered actual behavior labels are misaligned note reproducible on firefox release mobile not reproducible on chrome mobile screenshot attached watchers softvision sergiulogigan softvision oana arbuzov sv country tw from with ❤️
1
384,765
11,402,921,050
IssuesEvent
2020-01-31 05:18:46
teambit/bit
https://api.github.com/repos/teambit/bit
closed
Bit not tagging component
area/tag priority/critical type/bug
### Bit isnt tagging component I've imported a bit component to another bit component and when i try to tag it returns an error, i've tried to remove the "duplicated" component from root `package.json` and from component `package.json` as the node_modules of both but the bit cli keep returning the same error, when i remove the call of "duplicated component" it works properly. ### Code **./src/components/button.tsx** ``` typescript import Icon from '@bit/brainnit.components.icon'; // Icon is the "duplicated" component import { faSpinner as spinnerIcon } from '@fortawesome/pro-light-svg-icons'; import React, { FC } from 'react'; import { Box } from 'reflexbox/styled-components'; import ButtonWrapper from './ButtonWrapper'; import { IButtonProps } from './types'; const Button: FC<IButtonProps> = ({ children, icon, isLoading, ...props }) => ( <ButtonWrapper isLoading={isLoading} {...props}> {icon} <Box display="inline-block" ml={icon ? 2 : 0}> {isLoading ? <Icon icon={spinnerIcon} pulse={true} /> : children} </Box> </ButtonWrapper> ); export default Button; ``` **./package.json** ``` typescript ... "dependencies": { "@apollo/react-hooks": "^3.1.3", "@bit/brainnit.components.avatar": "0.0.1", "@bit/brainnit.components.badge": "0.0.1", "@bit/brainnit.components.box": "0.0.2", "@bit/brainnit.components.button": "file:./src/components/button", "@bit/brainnit.components.card": "0.0.6", "@bit/brainnit.components.container": "0.0.1", "@bit/brainnit.components.drawer": "0.0.3", "@bit/brainnit.components.empty-state": "0.0.4", "@bit/brainnit.components.global-style": "0.0.2", "@bit/brainnit.components.icon": "0.0.9", "@bit/brainnit.components.label": "0.0.2", "@bit/brainnit.components.navbar": "0.0.2", "@bit/brainnit.components.placeholder": "0.0.4", "@bit/brainnit.components.progress-bar": "0.0.2", "@bit/brainnit.components.tag": "^0.0.1", "@bit/brainnit.components.text": "0.0.3", "@bit/brainnit.components.theme": "0.0.10", "@fortawesome/fontawesome-svg-core": "^1.2.26", "@fortawesome/free-solid-svg-icons": "^5.12.0", "@fortawesome/pro-light-svg-icons": "^5.12.0", "@fortawesome/react-fontawesome": "^0.1.8", "@styled-system/css": "^5.1.4", "apollo-boost": "^0.4.7", "dayjs": "^1.8.18", "graphql": "^14.5.8", "humanize-duration": "^3.21.0", "react": "^16.12.0", "react-dom": "^16.12.0", "react-hotkeys-hook": "^1.5.4", "react-router-dom": "^5.1.2", "react-scripts": "3.3.0", "reflexbox": "^4.0.6", "styled-components": "^4.4.1", "styled-system": "^5.1.4", "typescript": "3.7.2" }, ... ``` ### Steps to Reproduce 1. Import [Button component](https://bit.dev/brainnit/components/button) 2. Invoke Icon component on Button component code 3. Run `bit add src/components/button --id button; bit tag button` ### Expected Behavior Bit tag the component ### Screenshots, exceptions and logs If applicable, add screenshots, exceptions, and logs to help explain your problem. ![image](https://user-images.githubusercontent.com/18194524/73209234-9b66f500-4126-11ea-94a6-ed021f216a16.png) ### Specifications - Bit version: 14.7.2 - Node version: v10.16.3 - npm / yarn version: 1.21.1 - Platform: Windows 10 - Bit compiler (include version): bit.envs/compilers/typescript@3.0.35 - Bit tester (include version): bit.envs/testers/jest@22.4.3 ### Additional context Add any other context about the problem here.
1.0
Bit not tagging component - ### Bit isnt tagging component I've imported a bit component to another bit component and when i try to tag it returns an error, i've tried to remove the "duplicated" component from root `package.json` and from component `package.json` as the node_modules of both but the bit cli keep returning the same error, when i remove the call of "duplicated component" it works properly. ### Code **./src/components/button.tsx** ``` typescript import Icon from '@bit/brainnit.components.icon'; // Icon is the "duplicated" component import { faSpinner as spinnerIcon } from '@fortawesome/pro-light-svg-icons'; import React, { FC } from 'react'; import { Box } from 'reflexbox/styled-components'; import ButtonWrapper from './ButtonWrapper'; import { IButtonProps } from './types'; const Button: FC<IButtonProps> = ({ children, icon, isLoading, ...props }) => ( <ButtonWrapper isLoading={isLoading} {...props}> {icon} <Box display="inline-block" ml={icon ? 2 : 0}> {isLoading ? <Icon icon={spinnerIcon} pulse={true} /> : children} </Box> </ButtonWrapper> ); export default Button; ``` **./package.json** ``` typescript ... "dependencies": { "@apollo/react-hooks": "^3.1.3", "@bit/brainnit.components.avatar": "0.0.1", "@bit/brainnit.components.badge": "0.0.1", "@bit/brainnit.components.box": "0.0.2", "@bit/brainnit.components.button": "file:./src/components/button", "@bit/brainnit.components.card": "0.0.6", "@bit/brainnit.components.container": "0.0.1", "@bit/brainnit.components.drawer": "0.0.3", "@bit/brainnit.components.empty-state": "0.0.4", "@bit/brainnit.components.global-style": "0.0.2", "@bit/brainnit.components.icon": "0.0.9", "@bit/brainnit.components.label": "0.0.2", "@bit/brainnit.components.navbar": "0.0.2", "@bit/brainnit.components.placeholder": "0.0.4", "@bit/brainnit.components.progress-bar": "0.0.2", "@bit/brainnit.components.tag": "^0.0.1", "@bit/brainnit.components.text": "0.0.3", "@bit/brainnit.components.theme": "0.0.10", "@fortawesome/fontawesome-svg-core": "^1.2.26", "@fortawesome/free-solid-svg-icons": "^5.12.0", "@fortawesome/pro-light-svg-icons": "^5.12.0", "@fortawesome/react-fontawesome": "^0.1.8", "@styled-system/css": "^5.1.4", "apollo-boost": "^0.4.7", "dayjs": "^1.8.18", "graphql": "^14.5.8", "humanize-duration": "^3.21.0", "react": "^16.12.0", "react-dom": "^16.12.0", "react-hotkeys-hook": "^1.5.4", "react-router-dom": "^5.1.2", "react-scripts": "3.3.0", "reflexbox": "^4.0.6", "styled-components": "^4.4.1", "styled-system": "^5.1.4", "typescript": "3.7.2" }, ... ``` ### Steps to Reproduce 1. Import [Button component](https://bit.dev/brainnit/components/button) 2. Invoke Icon component on Button component code 3. Run `bit add src/components/button --id button; bit tag button` ### Expected Behavior Bit tag the component ### Screenshots, exceptions and logs If applicable, add screenshots, exceptions, and logs to help explain your problem. ![image](https://user-images.githubusercontent.com/18194524/73209234-9b66f500-4126-11ea-94a6-ed021f216a16.png) ### Specifications - Bit version: 14.7.2 - Node version: v10.16.3 - npm / yarn version: 1.21.1 - Platform: Windows 10 - Bit compiler (include version): bit.envs/compilers/typescript@3.0.35 - Bit tester (include version): bit.envs/testers/jest@22.4.3 ### Additional context Add any other context about the problem here.
priority
bit not tagging component bit isnt tagging component i ve imported a bit component to another bit component and when i try to tag it returns an error i ve tried to remove the duplicated component from root package json and from component package json as the node modules of both but the bit cli keep returning the same error when i remove the call of duplicated component it works properly code src components button tsx typescript import icon from bit brainnit components icon icon is the duplicated component import faspinner as spinnericon from fortawesome pro light svg icons import react fc from react import box from reflexbox styled components import buttonwrapper from buttonwrapper import ibuttonprops from types const button fc children icon isloading props icon isloading children export default button package json typescript dependencies apollo react hooks bit brainnit components avatar bit brainnit components badge bit brainnit components box bit brainnit components button file src components button bit brainnit components card bit brainnit components container bit brainnit components drawer bit brainnit components empty state bit brainnit components global style bit brainnit components icon bit brainnit components label bit brainnit components navbar bit brainnit components placeholder bit brainnit components progress bar bit brainnit components tag bit brainnit components text bit brainnit components theme fortawesome fontawesome svg core fortawesome free solid svg icons fortawesome pro light svg icons fortawesome react fontawesome styled system css apollo boost dayjs graphql humanize duration react react dom react hotkeys hook react router dom react scripts reflexbox styled components styled system typescript steps to reproduce import invoke icon component on button component code run bit add src components button id button bit tag button expected behavior bit tag the component screenshots exceptions and logs if applicable add screenshots exceptions and logs to help explain your problem specifications bit version node version npm yarn version platform windows bit compiler include version bit envs compilers typescript bit tester include version bit envs testers jest additional context add any other context about the problem here
1
784,688
27,582,186,922
IssuesEvent
2023-03-08 16:56:22
pharmaR/riskassessment
https://api.github.com/repos/pharmaR/riskassessment
closed
CRAN logs website down
bug Priority: [1] Urgent
To populate the community usage metrics in the application, we are running the function `cranlogs::cran_downloads()`. It pulls the download information from [here](http://cranlogs.r-pkg.org/downloads/daily/). I personally have experienced this webpage being down several times in the past week. This results in no data being pulled in. I think it would be nice to alert the user (or completely disable package upload) if needed websites are returning 404 errors.
1.0
CRAN logs website down - To populate the community usage metrics in the application, we are running the function `cranlogs::cran_downloads()`. It pulls the download information from [here](http://cranlogs.r-pkg.org/downloads/daily/). I personally have experienced this webpage being down several times in the past week. This results in no data being pulled in. I think it would be nice to alert the user (or completely disable package upload) if needed websites are returning 404 errors.
priority
cran logs website down to populate the community usage metrics in the application we are running the function cranlogs cran downloads it pulls the download information from i personally have experienced this webpage being down several times in the past week this results in no data being pulled in i think it would be nice to alert the user or completely disable package upload if needed websites are returning errors
1
192,641
22,215,982,876
IssuesEvent
2022-06-08 01:43:43
praneethpanasala/linux
https://api.github.com/repos/praneethpanasala/linux
reopened
CVE-2020-25671 (High) detected in linuxlinux-4.19.6
security vulnerability
## CVE-2020-25671 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/nfc/llcp_sock.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/nfc/llcp_sock.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations. <p>Publish Date: 2021-05-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25671>CVE-2020-25671</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">https://nvd.nist.gov/vuln/detail/CVE-2020-25671</a></p> <p>Release Date: 2021-05-26</p> <p>Fix Resolution: linux-libc-headers - 5.13;linux-yocto - 4.8.26+gitAUTOINC+1c60e003c7_27efc3ba68,5.4.20+gitAUTOINC+c11911d4d1_f4d7dbafb1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-25671 (High) detected in linuxlinux-4.19.6 - ## CVE-2020-25671 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/nfc/llcp_sock.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/nfc/llcp_sock.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations. <p>Publish Date: 2021-05-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25671>CVE-2020-25671</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">https://nvd.nist.gov/vuln/detail/CVE-2020-25671</a></p> <p>Release Date: 2021-05-26</p> <p>Fix Resolution: linux-libc-headers - 5.13;linux-yocto - 4.8.26+gitAUTOINC+1c60e003c7_27efc3ba68,5.4.20+gitAUTOINC+c11911d4d1_f4d7dbafb1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux apache software foundation asf library home page a href found in head commit a href found in base branch master vulnerable source files net nfc llcp sock c net nfc llcp sock c vulnerability details a vulnerability was found in linux kernel where a refcount leak in llcp sock connect causing use after free which might lead to privilege escalations publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution linux libc headers linux yocto gitautoinc gitautoinc step up your open source security game with whitesource
0
72,660
9,603,760,025
IssuesEvent
2019-05-10 17:59:10
WebAudio/web-audio-api
https://api.github.com/repos/WebAudio/web-audio-api
opened
AudioBuffer interface comments
Editorial/Documentation
The intro paragraph for [AudioBuffer](https://webaudio.github.io/web-audio-api/#AudioBuffer) says > memory-resident audio asset (for one-shot sounds and other short > audio clips). I don't think we say anything about one-shot sounds or short audio clips. We're only constrained by how much memory you want to use.
1.0
AudioBuffer interface comments - The intro paragraph for [AudioBuffer](https://webaudio.github.io/web-audio-api/#AudioBuffer) says > memory-resident audio asset (for one-shot sounds and other short > audio clips). I don't think we say anything about one-shot sounds or short audio clips. We're only constrained by how much memory you want to use.
non_priority
audiobuffer interface comments the intro paragraph for says memory resident audio asset for one shot sounds and other short audio clips i don t think we say anything about one shot sounds or short audio clips we re only constrained by how much memory you want to use
0
294,247
22,143,171,380
IssuesEvent
2022-06-03 09:05:45
Avaiga/taipy-doc
https://api.github.com/repos/Avaiga/taipy-doc
closed
Documentation - The code font size should be larger
enhancement documentation
**Description** For accessibility purpose, the font size of the code extracts should be determined in (1)em and have a minimum fallback size of 16px. **Acceptance Criteria** - [ ] Ensure new code is unit tested, and check code coverage is at least 90% - [ ] Propagate any change on the demos and run all of them to ensure there is no breaking change - [ ] Ensure any change is well documented
1.0
Documentation - The code font size should be larger - **Description** For accessibility purpose, the font size of the code extracts should be determined in (1)em and have a minimum fallback size of 16px. **Acceptance Criteria** - [ ] Ensure new code is unit tested, and check code coverage is at least 90% - [ ] Propagate any change on the demos and run all of them to ensure there is no breaking change - [ ] Ensure any change is well documented
non_priority
documentation the code font size should be larger description for accessibility purpose the font size of the code extracts should be determined in em and have a minimum fallback size of acceptance criteria ensure new code is unit tested and check code coverage is at least propagate any change on the demos and run all of them to ensure there is no breaking change ensure any change is well documented
0
219,488
7,342,864,374
IssuesEvent
2018-03-07 09:28:09
rogerthat-platform/rogerthat-backend
https://api.github.com/repos/rogerthat-platform/rogerthat-backend
opened
Exceeded memory limit during log_analysis
priority_major type_bug
``` Queue: default deferred.run(rogerthat.bizz.log_analysis._analyze, 1520413501L, 1520414100) Summarize: updating 209 news items ``` Exceeded soft private memory limit of 256 MB with 268 MB after servicing 2610 requests total
1.0
Exceeded memory limit during log_analysis - ``` Queue: default deferred.run(rogerthat.bizz.log_analysis._analyze, 1520413501L, 1520414100) Summarize: updating 209 news items ``` Exceeded soft private memory limit of 256 MB with 268 MB after servicing 2610 requests total
priority
exceeded memory limit during log analysis queue default deferred run rogerthat bizz log analysis analyze summarize updating news items exceeded soft private memory limit of mb with mb after servicing requests total
1
269,137
28,960,012,238
IssuesEvent
2023-05-10 01:08:09
OTTIN-T/Cours-JS---CDA
https://api.github.com/repos/OTTIN-T/Cours-JS---CDA
opened
CVE-2023-31125 (Medium) detected in engine.io-6.1.3.tgz, engine.io-6.1.0.tgz
Mend: dependency security vulnerability
## CVE-2023-31125 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>engine.io-6.1.3.tgz</b>, <b>engine.io-6.1.0.tgz</b></p></summary> <p> <details><summary><b>engine.io-6.1.3.tgz</b></p></summary> <p>The realtime engine behind Socket.IO. Provides the foundation of a bidirectional connection between client and server</p> <p>Library home page: <a href="https://registry.npmjs.org/engine.io/-/engine.io-6.1.3.tgz">https://registry.npmjs.org/engine.io/-/engine.io-6.1.3.tgz</a></p> <p>Path to dependency file: /Angular/market/package.json</p> <p>Path to vulnerable library: /Angular/market/node_modules/engine.io/package.json,/Angular/forms/node_modules/engine.io/package.json,/Angular/m2i/node_modules/engine.io/package.json,/Angular/weather/node_modules/engine.io/package.json,/Angular/http/node_modules/engine.io/package.json,/Angular/blog/node_modules/engine.io/package.json,/Angular/colony/node_modules/engine.io/package.json</p> <p> Dependency Hierarchy: - karma-6.3.17.tgz (Root Library) - socket.io-4.4.1.tgz - :x: **engine.io-6.1.3.tgz** (Vulnerable Library) </details> <details><summary><b>engine.io-6.1.0.tgz</b></p></summary> <p>The realtime engine behind Socket.IO. Provides the foundation of a bidirectional connection between client and server</p> <p>Library home page: <a href="https://registry.npmjs.org/engine.io/-/engine.io-6.1.0.tgz">https://registry.npmjs.org/engine.io/-/engine.io-6.1.0.tgz</a></p> <p>Path to dependency file: /Angular/jswt/package.json</p> <p>Path to vulnerable library: /Angular/jswt/node_modules/engine.io/package.json</p> <p> Dependency Hierarchy: - karma-6.3.9.tgz (Root Library) - socket.io-4.4.0.tgz - :x: **engine.io-6.1.0.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. An uncaught exception vulnerability was introduced in version 5.1.0 and included in version 4.1.0 of the `socket.io` parent package. Older versions are not impacted. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package, including those who use depending packages like `socket.io`. This issue was fixed in version 6.4.2 of Engine.IO. There is no known workaround except upgrading to a safe version. <p>Publish Date: 2023-05-08 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-31125>CVE-2023-31125</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2023-31125">https://www.cve.org/CVERecord?id=CVE-2023-31125</a></p> <p>Release Date: 2023-05-08</p> <p>Fix Resolution: engine.io - 6.4.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2023-31125 (Medium) detected in engine.io-6.1.3.tgz, engine.io-6.1.0.tgz - ## CVE-2023-31125 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>engine.io-6.1.3.tgz</b>, <b>engine.io-6.1.0.tgz</b></p></summary> <p> <details><summary><b>engine.io-6.1.3.tgz</b></p></summary> <p>The realtime engine behind Socket.IO. Provides the foundation of a bidirectional connection between client and server</p> <p>Library home page: <a href="https://registry.npmjs.org/engine.io/-/engine.io-6.1.3.tgz">https://registry.npmjs.org/engine.io/-/engine.io-6.1.3.tgz</a></p> <p>Path to dependency file: /Angular/market/package.json</p> <p>Path to vulnerable library: /Angular/market/node_modules/engine.io/package.json,/Angular/forms/node_modules/engine.io/package.json,/Angular/m2i/node_modules/engine.io/package.json,/Angular/weather/node_modules/engine.io/package.json,/Angular/http/node_modules/engine.io/package.json,/Angular/blog/node_modules/engine.io/package.json,/Angular/colony/node_modules/engine.io/package.json</p> <p> Dependency Hierarchy: - karma-6.3.17.tgz (Root Library) - socket.io-4.4.1.tgz - :x: **engine.io-6.1.3.tgz** (Vulnerable Library) </details> <details><summary><b>engine.io-6.1.0.tgz</b></p></summary> <p>The realtime engine behind Socket.IO. Provides the foundation of a bidirectional connection between client and server</p> <p>Library home page: <a href="https://registry.npmjs.org/engine.io/-/engine.io-6.1.0.tgz">https://registry.npmjs.org/engine.io/-/engine.io-6.1.0.tgz</a></p> <p>Path to dependency file: /Angular/jswt/package.json</p> <p>Path to vulnerable library: /Angular/jswt/node_modules/engine.io/package.json</p> <p> Dependency Hierarchy: - karma-6.3.9.tgz (Root Library) - socket.io-4.4.0.tgz - :x: **engine.io-6.1.0.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. An uncaught exception vulnerability was introduced in version 5.1.0 and included in version 4.1.0 of the `socket.io` parent package. Older versions are not impacted. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package, including those who use depending packages like `socket.io`. This issue was fixed in version 6.4.2 of Engine.IO. There is no known workaround except upgrading to a safe version. <p>Publish Date: 2023-05-08 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-31125>CVE-2023-31125</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2023-31125">https://www.cve.org/CVERecord?id=CVE-2023-31125</a></p> <p>Release Date: 2023-05-08</p> <p>Fix Resolution: engine.io - 6.4.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in engine io tgz engine io tgz cve medium severity vulnerability vulnerable libraries engine io tgz engine io tgz engine io tgz the realtime engine behind socket io provides the foundation of a bidirectional connection between client and server library home page a href path to dependency file angular market package json path to vulnerable library angular market node modules engine io package json angular forms node modules engine io package json angular node modules engine io package json angular weather node modules engine io package json angular http node modules engine io package json angular blog node modules engine io package json angular colony node modules engine io package json dependency hierarchy karma tgz root library socket io tgz x engine io tgz vulnerable library engine io tgz the realtime engine behind socket io provides the foundation of a bidirectional connection between client and server library home page a href path to dependency file angular jswt package json path to vulnerable library angular jswt node modules engine io package json dependency hierarchy karma tgz root library socket io tgz x engine io tgz vulnerable library found in base branch main vulnerability details engine io is the implementation of transport based cross browser cross device bi directional communication layer for socket io an uncaught exception vulnerability was introduced in version and included in version of the socket io parent package older versions are not impacted a specially crafted http request can trigger an uncaught exception on the engine io server thus killing the node js process this impacts all the users of the engine io package including those who use depending packages like socket io this issue was fixed in version of engine io there is no known workaround except upgrading to a safe version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution engine io step up your open source security game with mend
0
55,862
3,075,071,685
IssuesEvent
2015-08-20 11:27:32
pavel-pimenov/flylinkdc-r5xx
https://api.github.com/repos/pavel-pimenov/flylinkdc-r5xx
closed
Мелкие хотелки для интерфейса.
bug imported invalid Priority-Medium
_From [shkiper911@list.ru](https://code.google.com/u/shkiper911@list.ru/) on February 06, 2011 20:47:35_ Мееееелкие хотелки, поставьте приоритет Ultra Low: -Копирование информации из лога, правой кнопкой мыши. -Лишний пункт "показать как текст" на папках, в списках файлов юзеров. И вообще эту функцию следует отключить на файлах больше 1-2 МБ, т.к. это явно не текстовый файл, а программа виснет намертво. -Во вкладке списка файлов можно было бы добавить пункт, "обновить список" или "перекачать список", иногда кто-то хочет поделиться с тобой какими-либо файлами, а потом оказывается что он их ещё не прохешировал. Он хеширует, а тебе приходиться снова искать его имя чтобы перекачать список файлов. -Многие пользователи уже привыкли, что во всех программах нажимая на панель управления правой кнопкой, можно сразу войти в меню редактирования состава кнопок, а у вас этого нет. Замечал такое за собой и за другом. r500 b74 _Original issue: http://code.google.com/p/flylinkdc/issues/detail?id=343_
1.0
Мелкие хотелки для интерфейса. - _From [shkiper911@list.ru](https://code.google.com/u/shkiper911@list.ru/) on February 06, 2011 20:47:35_ Мееееелкие хотелки, поставьте приоритет Ultra Low: -Копирование информации из лога, правой кнопкой мыши. -Лишний пункт "показать как текст" на папках, в списках файлов юзеров. И вообще эту функцию следует отключить на файлах больше 1-2 МБ, т.к. это явно не текстовый файл, а программа виснет намертво. -Во вкладке списка файлов можно было бы добавить пункт, "обновить список" или "перекачать список", иногда кто-то хочет поделиться с тобой какими-либо файлами, а потом оказывается что он их ещё не прохешировал. Он хеширует, а тебе приходиться снова искать его имя чтобы перекачать список файлов. -Многие пользователи уже привыкли, что во всех программах нажимая на панель управления правой кнопкой, можно сразу войти в меню редактирования состава кнопок, а у вас этого нет. Замечал такое за собой и за другом. r500 b74 _Original issue: http://code.google.com/p/flylinkdc/issues/detail?id=343_
priority
мелкие хотелки для интерфейса from on february мееееелкие хотелки поставьте приоритет ultra low копирование информации из лога правой кнопкой мыши лишний пункт показать как текст на папках в списках файлов юзеров и вообще эту функцию следует отключить на файлах больше мб т к это явно не текстовый файл а программа виснет намертво во вкладке списка файлов можно было бы добавить пункт обновить список или перекачать список иногда кто то хочет поделиться с тобой какими либо файлами а потом оказывается что он их ещё не прохешировал он хеширует а тебе приходиться снова искать его имя чтобы перекачать список файлов многие пользователи уже привыкли что во всех программах нажимая на панель управления правой кнопкой можно сразу войти в меню редактирования состава кнопок а у вас этого нет замечал такое за собой и за другом original issue
1
405,327
11,871,636,980
IssuesEvent
2020-03-26 14:41:00
tranquilitybase-io/tb-gcp
https://api.github.com/repos/tranquilitybase-io/tb-gcp
opened
Optional deployment of Vault
priority:medium
Split of #138 - part 1. Vault will be optional deployment in LZ. Refactor the code is required. New folder _tb-gcp/tb-gcp-tr/options/secrets_ will be created with the following contents: - main.tf - Create k8s Secrets cluster --> state with prefix /secrets - other required files by the Secrets cluster - vault folder - main.tf – Deploy vault inside K8S security cluster --> state with prefix /secrets/vault - other required modules by Vault only - option2 (eventually) - main.tf – Deploy secrets 2nd option --> state with prefix /secrets/option2 - option3 (eventually) - main.tf – Deploy secrets 3rd option --> state with prefix /secrets/option3
1.0
Optional deployment of Vault - Split of #138 - part 1. Vault will be optional deployment in LZ. Refactor the code is required. New folder _tb-gcp/tb-gcp-tr/options/secrets_ will be created with the following contents: - main.tf - Create k8s Secrets cluster --> state with prefix /secrets - other required files by the Secrets cluster - vault folder - main.tf – Deploy vault inside K8S security cluster --> state with prefix /secrets/vault - other required modules by Vault only - option2 (eventually) - main.tf – Deploy secrets 2nd option --> state with prefix /secrets/option2 - option3 (eventually) - main.tf – Deploy secrets 3rd option --> state with prefix /secrets/option3
priority
optional deployment of vault split of part vault will be optional deployment in lz refactor the code is required new folder tb gcp tb gcp tr options secrets will be created with the following contents main tf create secrets cluster state with prefix secrets other required files by the secrets cluster vault folder main tf – deploy vault inside security cluster state with prefix secrets vault other required modules by vault only eventually main tf – deploy secrets option state with prefix secrets eventually main tf – deploy secrets option state with prefix secrets
1
3,830
6,802,428,831
IssuesEvent
2017-11-02 20:10:30
gratipay/inside.gratipay.com
https://api.github.com/repos/gratipay/inside.gratipay.com
closed
Limit Gratipay's copyright license in Terms of Service (TOS)
Governance & Process
Reticketed from https://github.com/gratipay/inside.gratipay.com/issues/204#issuecomment-102103817 > - Personally, I find using CC0 for Gratipay.com in §6.1 as a really nice touch and a fresh approach. I take it you do understand the implications of this, though. > - Staying on the topic of copyright, in §7.1 the copyright license that Participant grants to Gratipay is relatively broad to what Gratipay actiually needs at the time. While §7.2 clarifies what this license permits Gratipay to do, I would welcome a provision where it explicitly stated for which purposes Gratipay may use it.
1.0
Limit Gratipay's copyright license in Terms of Service (TOS) - Reticketed from https://github.com/gratipay/inside.gratipay.com/issues/204#issuecomment-102103817 > - Personally, I find using CC0 for Gratipay.com in §6.1 as a really nice touch and a fresh approach. I take it you do understand the implications of this, though. > - Staying on the topic of copyright, in §7.1 the copyright license that Participant grants to Gratipay is relatively broad to what Gratipay actiually needs at the time. While §7.2 clarifies what this license permits Gratipay to do, I would welcome a provision where it explicitly stated for which purposes Gratipay may use it.
non_priority
limit gratipay s copyright license in terms of service tos reticketed from personally i find using for gratipay com in § as a really nice touch and a fresh approach i take it you do understand the implications of this though staying on the topic of copyright in § the copyright license that participant grants to gratipay is relatively broad to what gratipay actiually needs at the time while § clarifies what this license permits gratipay to do i would welcome a provision where it explicitly stated for which purposes gratipay may use it
0
234,139
25,806,007,208
IssuesEvent
2022-12-11 12:17:03
SmartBear/readyapi-swagger-assertion-plugin
https://api.github.com/repos/SmartBear/readyapi-swagger-assertion-plugin
closed
CVE-2021-39153 (High) detected in xstream-1.3.1.jar - autoclosed
security vulnerability
## CVE-2021-39153 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.3.1.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/thoughtworks/xstream/1.3.1/xstream-1.3.1.jar</p> <p> Dependency Hierarchy: - ready-api-soapui-pro-1.7.0.jar (Root Library) - ready-api-soapui-1.7.0.jar - :x: **xstream-1.3.1.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39153>CVE-2021-39153</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.18</p> </p> </details> <p></p>
True
CVE-2021-39153 (High) detected in xstream-1.3.1.jar - autoclosed - ## CVE-2021-39153 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.3.1.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/thoughtworks/xstream/1.3.1/xstream-1.3.1.jar</p> <p> Dependency Hierarchy: - ready-api-soapui-pro-1.7.0.jar (Root Library) - ready-api-soapui-1.7.0.jar - :x: **xstream-1.3.1.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39153>CVE-2021-39153</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.18</p> </p> </details> <p></p>
non_priority
cve high detected in xstream jar autoclosed cve high severity vulnerability vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository thoughtworks xstream xstream jar dependency hierarchy ready api soapui pro jar root library ready api soapui jar x xstream jar vulnerable library found in base branch master vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream if using the version out of the box with java runtime version to or with javafx installed no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com thoughtworks xstream xstream
0
632,518
20,199,353,263
IssuesEvent
2022-02-11 13:49:43
googleapis/nodejs-firestore
https://api.github.com/repos/googleapis/nodejs-firestore
opened
[TypeScript] set function as parametrized
priority: p3 type: feature request
Thanks for stopping by to let us know something could be better! **PLEASE READ**: If you have a support contract with Google, please create an issue in the [support console](https://cloud.google.com/support/) instead of filing on GitHub. This will ensure a timely response. **Is your feature request related to a problem? Please describe.** When I run the following code ``` const query = await admin .firestore() .collection("shops") .where("name", "==", context.params.name) .get(); if (!query.empty) { const snapshot = query.docs[0]; const shop = snapshot.data(); .... } ``` My `shop`'s type is `DocumentData` where I would like my collection to returns `Shop` objects. **Describe the solution you'd like** Being able to set type in collection : ``` const query = await admin .firestore() .collection<Shop>("shops") .where("name", "==", context.params.name) .get(); ``` **Describe alternatives you've considered** Cast object ``` type Shope = { name: string; } const shop = snapshot.data() as Shop; ``` I will make a PR for this
1.0
[TypeScript] set function as parametrized - Thanks for stopping by to let us know something could be better! **PLEASE READ**: If you have a support contract with Google, please create an issue in the [support console](https://cloud.google.com/support/) instead of filing on GitHub. This will ensure a timely response. **Is your feature request related to a problem? Please describe.** When I run the following code ``` const query = await admin .firestore() .collection("shops") .where("name", "==", context.params.name) .get(); if (!query.empty) { const snapshot = query.docs[0]; const shop = snapshot.data(); .... } ``` My `shop`'s type is `DocumentData` where I would like my collection to returns `Shop` objects. **Describe the solution you'd like** Being able to set type in collection : ``` const query = await admin .firestore() .collection<Shop>("shops") .where("name", "==", context.params.name) .get(); ``` **Describe alternatives you've considered** Cast object ``` type Shope = { name: string; } const shop = snapshot.data() as Shop; ``` I will make a PR for this
priority
set function as parametrized thanks for stopping by to let us know something could be better please read if you have a support contract with google please create an issue in the instead of filing on github this will ensure a timely response is your feature request related to a problem please describe when i run the following code const query await admin firestore collection shops where name context params name get if query empty const snapshot query docs const shop snapshot data my shop s type is documentdata where i would like my collection to returns shop objects describe the solution you d like being able to set type in collection const query await admin firestore collection shops where name context params name get describe alternatives you ve considered cast object type shope name string const shop snapshot data as shop i will make a pr for this
1
32,769
15,612,640,344
IssuesEvent
2021-03-19 15:31:58
openzfs/zfs
https://api.github.com/repos/openzfs/zfs
closed
When native encryption is enabled, sync writes are slow.
Component: Encryption Status: Stale Type: Performance
### System information <!-- add version after "|" character --> Type | Version/Name --- | --- Distribution Name | Gentoo Linux Distribution Version | amd64 (stable) 17.1/no-multilib Linux Kernel | 4.19.72-gentoo Architecture | x86_64 ZFS Version | 8.2 SPL Version | N/A ### Describe the problem you're observing When native encryption is enabled, sync writes are slow. ### Describe how to reproduce the problem Prepare test environment in the following way (assuming that tmpfs is mounted to /tmp): ``` dd if=/dev/zero of=/tmp/disk bs=1G count=4 dd if=/dev/zero of=/tmp/log bs=1G count=4 ``` For no-encyption tests create the pool in the following way: ``` zpool create -m /tmp/storage -O compression=off -O logbias=latency test /tmp/disk log /tmp/log ``` For encryption tests create the pool in the following way: ``` zpool create -m /tmp/storage -O compression=off -O encryption=aes-256-gcm -O keyformat=raw -O keylocation=file:///tmp/test.key -O logbias=latency test /tmp/disk log /tmp/log ``` Perform async tests in the following way: ``` dd if=/dev/zero of=/tmp/storage/zero bs=10M count=350 ``` Perform sync tests in the following way: ``` dd if=/dev/zero of=/tmp/storage/zero bs=10M count=350 oflag=sync ``` Results of the tests on my machine are summarized in the table below: x | async | sync --- | --- | --- no encryption| 1.7 GB/s| 1.2 GB/s encryption | 819 MB/s | 117 MB/s My machine is a Xeon 4208 (8x 2.1GHz, AES-NI, AVX2, AVX512f, AVX512dq, AVX512cd, AVX512bw, AVX512vl). It happens that async encryption performance above is roughly the same as async encryption/no-encryption performance of zpool build on actual HDDs (see https://github.com/zfsonlinux/zfs/issues/9375) thus I don't observe encryption slowdown on async write operations. The encryption/sync slowdown reported above is somewhat concerning. I understand that native encryption is a new feature and not all performance optimizations are in place yet (are we using aes-ni?). I will let you triage this issue as a bug/feature request depending on your preferences. ### Include any warning/errors/backtraces from the system logs None
True
When native encryption is enabled, sync writes are slow. - ### System information <!-- add version after "|" character --> Type | Version/Name --- | --- Distribution Name | Gentoo Linux Distribution Version | amd64 (stable) 17.1/no-multilib Linux Kernel | 4.19.72-gentoo Architecture | x86_64 ZFS Version | 8.2 SPL Version | N/A ### Describe the problem you're observing When native encryption is enabled, sync writes are slow. ### Describe how to reproduce the problem Prepare test environment in the following way (assuming that tmpfs is mounted to /tmp): ``` dd if=/dev/zero of=/tmp/disk bs=1G count=4 dd if=/dev/zero of=/tmp/log bs=1G count=4 ``` For no-encyption tests create the pool in the following way: ``` zpool create -m /tmp/storage -O compression=off -O logbias=latency test /tmp/disk log /tmp/log ``` For encryption tests create the pool in the following way: ``` zpool create -m /tmp/storage -O compression=off -O encryption=aes-256-gcm -O keyformat=raw -O keylocation=file:///tmp/test.key -O logbias=latency test /tmp/disk log /tmp/log ``` Perform async tests in the following way: ``` dd if=/dev/zero of=/tmp/storage/zero bs=10M count=350 ``` Perform sync tests in the following way: ``` dd if=/dev/zero of=/tmp/storage/zero bs=10M count=350 oflag=sync ``` Results of the tests on my machine are summarized in the table below: x | async | sync --- | --- | --- no encryption| 1.7 GB/s| 1.2 GB/s encryption | 819 MB/s | 117 MB/s My machine is a Xeon 4208 (8x 2.1GHz, AES-NI, AVX2, AVX512f, AVX512dq, AVX512cd, AVX512bw, AVX512vl). It happens that async encryption performance above is roughly the same as async encryption/no-encryption performance of zpool build on actual HDDs (see https://github.com/zfsonlinux/zfs/issues/9375) thus I don't observe encryption slowdown on async write operations. The encryption/sync slowdown reported above is somewhat concerning. I understand that native encryption is a new feature and not all performance optimizations are in place yet (are we using aes-ni?). I will let you triage this issue as a bug/feature request depending on your preferences. ### Include any warning/errors/backtraces from the system logs None
non_priority
when native encryption is enabled sync writes are slow system information type version name distribution name gentoo linux distribution version stable no multilib linux kernel gentoo architecture zfs version spl version n a describe the problem you re observing when native encryption is enabled sync writes are slow describe how to reproduce the problem prepare test environment in the following way assuming that tmpfs is mounted to tmp dd if dev zero of tmp disk bs count dd if dev zero of tmp log bs count for no encyption tests create the pool in the following way zpool create m tmp storage o compression off o logbias latency test tmp disk log tmp log for encryption tests create the pool in the following way zpool create m tmp storage o compression off o encryption aes gcm o keyformat raw o keylocation file tmp test key o logbias latency test tmp disk log tmp log perform async tests in the following way dd if dev zero of tmp storage zero bs count perform sync tests in the following way dd if dev zero of tmp storage zero bs count oflag sync results of the tests on my machine are summarized in the table below x async sync no encryption gb s gb s encryption mb s mb s my machine is a xeon aes ni it happens that async encryption performance above is roughly the same as async encryption no encryption performance of zpool build on actual hdds see thus i don t observe encryption slowdown on async write operations the encryption sync slowdown reported above is somewhat concerning i understand that native encryption is a new feature and not all performance optimizations are in place yet are we using aes ni i will let you triage this issue as a bug feature request depending on your preferences include any warning errors backtraces from the system logs none
0
636,075
20,574,364,819
IssuesEvent
2022-03-04 01:49:13
ArctosDB/arctos
https://api.github.com/repos/ArctosDB/arctos
closed
Feature Request - component loader documention (or ??)
Priority-Critical (Arctos is broken) Enhancement Help wanted Component Loader
**Is your feature request related to a problem? Please describe.** The component loader is throttled in such a way that loading and post-load processing should not become disruptive, which means things can take some time - occasionally days - to process. **Describe what you're trying to accomplish** Minimally, users should have clear expectations. **Describe the solution you'd like** 1. New loader version with better documentation and a link to the status page in the header 2. ?? I'm very open to ideas **Describe alternatives you've considered** 1. Hope users find the status page. 2. Hope someone pops in with a clever and realistic idea regarding how this process should work
1.0
Feature Request - component loader documention (or ??) - **Is your feature request related to a problem? Please describe.** The component loader is throttled in such a way that loading and post-load processing should not become disruptive, which means things can take some time - occasionally days - to process. **Describe what you're trying to accomplish** Minimally, users should have clear expectations. **Describe the solution you'd like** 1. New loader version with better documentation and a link to the status page in the header 2. ?? I'm very open to ideas **Describe alternatives you've considered** 1. Hope users find the status page. 2. Hope someone pops in with a clever and realistic idea regarding how this process should work
priority
feature request component loader documention or is your feature request related to a problem please describe the component loader is throttled in such a way that loading and post load processing should not become disruptive which means things can take some time occasionally days to process describe what you re trying to accomplish minimally users should have clear expectations describe the solution you d like new loader version with better documentation and a link to the status page in the header i m very open to ideas describe alternatives you ve considered hope users find the status page hope someone pops in with a clever and realistic idea regarding how this process should work
1
3,334
6,301,696,541
IssuesEvent
2017-07-21 08:52:26
mozilla/addons-server
https://api.github.com/repos/mozilla/addons-server
closed
Dictionary add-ons should not have strict compatibility
project: firefox 57 compatibility state: pull request ready
#5825 revealed that dictionaries have strict compatibility and have been working because of the bulk compatibility updates we run for all add-ons. Since we don't plan to do bulk compatibility updates past 56, we need an alternative way to keep them working. Dictionaries should be compatible with all versions of Firefox (for desktop), Thunderbird, and SeaMonkey. Firefox for Android is the only application that isn't supported. This may change in the future if we move them to WebExtensions, but for now there's no reason to restrict their compatibility.
True
Dictionary add-ons should not have strict compatibility - #5825 revealed that dictionaries have strict compatibility and have been working because of the bulk compatibility updates we run for all add-ons. Since we don't plan to do bulk compatibility updates past 56, we need an alternative way to keep them working. Dictionaries should be compatible with all versions of Firefox (for desktop), Thunderbird, and SeaMonkey. Firefox for Android is the only application that isn't supported. This may change in the future if we move them to WebExtensions, but for now there's no reason to restrict their compatibility.
non_priority
dictionary add ons should not have strict compatibility revealed that dictionaries have strict compatibility and have been working because of the bulk compatibility updates we run for all add ons since we don t plan to do bulk compatibility updates past we need an alternative way to keep them working dictionaries should be compatible with all versions of firefox for desktop thunderbird and seamonkey firefox for android is the only application that isn t supported this may change in the future if we move them to webextensions but for now there s no reason to restrict their compatibility
0
65,181
7,860,475,213
IssuesEvent
2018-06-21 20:06:33
archesproject/arches
https://api.github.com/repos/archesproject/arches
closed
Graph Manager, New Resource Editor: Instance tree should highlight all nodes in the path to currently selected node
Roadmap: Graph Designer Update - Task 2 (Graph)
As a data editor or graph designer, I would like to the tree widget to highlight the path from the root node to the node that I'm currently working with so that I can more easily see the context of the node or widget that I'm working with. ![screen shot 2018-05-30 at 12 09 02 pm](https://user-images.githubusercontent.com/823773/40742099-4988879c-6402-11e8-93c9-6724cb25ab43.png)
1.0
Graph Manager, New Resource Editor: Instance tree should highlight all nodes in the path to currently selected node - As a data editor or graph designer, I would like to the tree widget to highlight the path from the root node to the node that I'm currently working with so that I can more easily see the context of the node or widget that I'm working with. ![screen shot 2018-05-30 at 12 09 02 pm](https://user-images.githubusercontent.com/823773/40742099-4988879c-6402-11e8-93c9-6724cb25ab43.png)
non_priority
graph manager new resource editor instance tree should highlight all nodes in the path to currently selected node as a data editor or graph designer i would like to the tree widget to highlight the path from the root node to the node that i m currently working with so that i can more easily see the context of the node or widget that i m working with
0
137,094
5,293,800,177
IssuesEvent
2017-02-09 08:53:19
mantidproject/mantid
https://api.github.com/repos/mantidproject/mantid
closed
Bug when reducing multiperiod transmission data
Component: SANS Misc: Bug Priority: High
Diego found a bug when trying to reduce in the ISIS SANS GUI with multiperiod transmission data. Basically it does not work, because the method is `move2next` has never been implemented. This bug appears to have been there for 4 years or so. The output is: ![multiperiod](https://cloud.githubusercontent.com/assets/8955784/22593294/b5dc085a-ea15-11e6-83c4-c753e42f65c2.png) Fixing this is easy. The correct method is `move2ws`. Nevertheless th reduction falls over with the data set that diego has provided, because the transmission monitor did not collect any data, hence it is not really the code's fault that this does not work. Nevertheless it might be usefull to provide a better warning message in order to let the user know that potentially the transmission monitor is faulty. ![single period](https://cloud.githubusercontent.com/assets/8955784/22593372/074f3086-ea16-11e6-8f10-8f2bb27e34d5.png)
1.0
Bug when reducing multiperiod transmission data - Diego found a bug when trying to reduce in the ISIS SANS GUI with multiperiod transmission data. Basically it does not work, because the method is `move2next` has never been implemented. This bug appears to have been there for 4 years or so. The output is: ![multiperiod](https://cloud.githubusercontent.com/assets/8955784/22593294/b5dc085a-ea15-11e6-83c4-c753e42f65c2.png) Fixing this is easy. The correct method is `move2ws`. Nevertheless th reduction falls over with the data set that diego has provided, because the transmission monitor did not collect any data, hence it is not really the code's fault that this does not work. Nevertheless it might be usefull to provide a better warning message in order to let the user know that potentially the transmission monitor is faulty. ![single period](https://cloud.githubusercontent.com/assets/8955784/22593372/074f3086-ea16-11e6-8f10-8f2bb27e34d5.png)
priority
bug when reducing multiperiod transmission data diego found a bug when trying to reduce in the isis sans gui with multiperiod transmission data basically it does not work because the method is has never been implemented this bug appears to have been there for years or so the output is fixing this is easy the correct method is nevertheless th reduction falls over with the data set that diego has provided because the transmission monitor did not collect any data hence it is not really the code s fault that this does not work nevertheless it might be usefull to provide a better warning message in order to let the user know that potentially the transmission monitor is faulty
1
746,344
26,026,735,852
IssuesEvent
2022-12-21 16:59:14
rokwire/illinois-app
https://api.github.com/repos/rokwire/illinois-app
closed
[BUG] Wellness Ring - Random characters input in Quantity field is accepted
Type: Bug Priority: High
**Describe the bug** Inputting random characters in the Quantity field in the "Create Wellness Ring" screen is successfully creating a Ring. **To Reproduce** Steps to reproduce the behavior: 1. Install the Illinois app 2. Log in as a University student 3. Navigate to Wellness and create a new ring 4. Enter a random character in the quantity input field and tap Create button Actual Result A wellness ring is successfully created **Expected behavior** A message should display to the user to provide the correct input. **Screenshots** ![Wellness quantity](https://user-images.githubusercontent.com/26231179/179838655-012b0502-d826-462e-896f-e1d3f700cb9d.png) ![quantity wellness 1](https://user-images.githubusercontent.com/26231179/179838676-968e462e-4399-4065-96b9-12c4e3f17196.png) **Smartphone (please complete the following information):** - Device: [e.g. iPhone and Android] - Version [e.g. 4.0.55]
1.0
[BUG] Wellness Ring - Random characters input in Quantity field is accepted - **Describe the bug** Inputting random characters in the Quantity field in the "Create Wellness Ring" screen is successfully creating a Ring. **To Reproduce** Steps to reproduce the behavior: 1. Install the Illinois app 2. Log in as a University student 3. Navigate to Wellness and create a new ring 4. Enter a random character in the quantity input field and tap Create button Actual Result A wellness ring is successfully created **Expected behavior** A message should display to the user to provide the correct input. **Screenshots** ![Wellness quantity](https://user-images.githubusercontent.com/26231179/179838655-012b0502-d826-462e-896f-e1d3f700cb9d.png) ![quantity wellness 1](https://user-images.githubusercontent.com/26231179/179838676-968e462e-4399-4065-96b9-12c4e3f17196.png) **Smartphone (please complete the following information):** - Device: [e.g. iPhone and Android] - Version [e.g. 4.0.55]
priority
wellness ring random characters input in quantity field is accepted describe the bug inputting random characters in the quantity field in the create wellness ring screen is successfully creating a ring to reproduce steps to reproduce the behavior install the illinois app log in as a university student navigate to wellness and create a new ring enter a random character in the quantity input field and tap create button actual result a wellness ring is successfully created expected behavior a message should display to the user to provide the correct input screenshots smartphone please complete the following information device version
1
5,812
13,186,630,492
IssuesEvent
2020-08-13 00:48:21
Azure/azure-sdk
https://api.github.com/repos/Azure/azure-sdk
opened
Change Request: nit on logging for .NET guidelines
architecture
In the [Logging section](https://github.com/Azure/azure-sdk/blob/master/docs/dotnet/introduction.md#logging) of .NET guidelines, the following line > {% include requirement/MUST id="dotnet-logging-follow-guidelines" %} follow the logging section of the Azure SDK General Guidelines if logging directly (as opposed to through the HttpPipeline). links to the .NET implementation guidelines rather than the Azure SDK General Guidelines. I'm not sure which is correct, but either the link should be updated, or the text describing the link.
1.0
Change Request: nit on logging for .NET guidelines - In the [Logging section](https://github.com/Azure/azure-sdk/blob/master/docs/dotnet/introduction.md#logging) of .NET guidelines, the following line > {% include requirement/MUST id="dotnet-logging-follow-guidelines" %} follow the logging section of the Azure SDK General Guidelines if logging directly (as opposed to through the HttpPipeline). links to the .NET implementation guidelines rather than the Azure SDK General Guidelines. I'm not sure which is correct, but either the link should be updated, or the text describing the link.
non_priority
change request nit on logging for net guidelines in the of net guidelines the following line include requirement must id dotnet logging follow guidelines follow the logging section of the azure sdk general guidelines if logging directly as opposed to through the httppipeline links to the net implementation guidelines rather than the azure sdk general guidelines i m not sure which is correct but either the link should be updated or the text describing the link
0
189,138
22,046,988,624
IssuesEvent
2022-05-30 03:39:58
praneethpanasala/linux
https://api.github.com/repos/praneethpanasala/linux
closed
CVE-2021-42252 (High) detected in linuxlinux-4.19.6 - autoclosed
security vulnerability
## CVE-2021-42252 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/misc/aspeed-lpc-ctrl.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/misc/aspeed-lpc-ctrl.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes. <p>Publish Date: 2021-10-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42252>CVE-2021-42252</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-42252">https://www.linuxkernelcves.com/cves/CVE-2021-42252</a></p> <p>Release Date: 2021-10-11</p> <p>Fix Resolution: v4.14.247,v4.19.207,v5.4.148,v5.10.67,v5.13.19,v5.14.6,v5.15-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-42252 (High) detected in linuxlinux-4.19.6 - autoclosed - ## CVE-2021-42252 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/misc/aspeed-lpc-ctrl.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/misc/aspeed-lpc-ctrl.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes. <p>Publish Date: 2021-10-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42252>CVE-2021-42252</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-42252">https://www.linuxkernelcves.com/cves/CVE-2021-42252</a></p> <p>Release Date: 2021-10-11</p> <p>Fix Resolution: v4.14.247,v4.19.207,v5.4.148,v5.10.67,v5.13.19,v5.14.6,v5.15-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linuxlinux autoclosed cve high severity vulnerability vulnerable library linuxlinux apache software foundation asf library home page a href found in head commit a href found in base branch master vulnerable source files drivers misc aspeed lpc ctrl c drivers misc aspeed lpc ctrl c vulnerability details an issue was discovered in aspeed lpc ctrl mmap in drivers soc aspeed aspeed lpc ctrl c in the linux kernel before local attackers able to access the aspeed lpc control interface could overwrite memory in the kernel and potentially execute privileges aka cid this occurs because a certain comparison uses values that are not memory sizes publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
704,896
24,213,767,034
IssuesEvent
2022-09-26 03:41:40
CS3219-AY2223S1/cs3219-project-ay2223s1-g8
https://api.github.com/repos/CS3219-AY2223S1/cs3219-project-ay2223s1-g8
opened
Implement collaboration room for users
Frontend priority.high
- [] pull question from `QuestionService` - [] link the 2 matched users to the same `CollaborationService` for the text editor - [] allow users to leave the room
1.0
Implement collaboration room for users - - [] pull question from `QuestionService` - [] link the 2 matched users to the same `CollaborationService` for the text editor - [] allow users to leave the room
priority
implement collaboration room for users pull question from questionservice link the matched users to the same collaborationservice for the text editor allow users to leave the room
1
447,744
12,892,680,057
IssuesEvent
2020-07-13 20:05:56
microsoft/AdaptiveCards
https://api.github.com/repos/microsoft/AdaptiveCards
closed
[TS][Renderer] Incomplete accessibility support for input validation
Bug BugBash Priority-Now Status-Fixed Triage-Approved for Fix
# Platform * JavaScript # Details The input validation code has incomplete support for accessibility: - Labels and errors are not read by narrator for Input.ChoiceSet in multiselect or expanded mode - Label and error are not read by narrator for Input.Toggle
1.0
[TS][Renderer] Incomplete accessibility support for input validation - # Platform * JavaScript # Details The input validation code has incomplete support for accessibility: - Labels and errors are not read by narrator for Input.ChoiceSet in multiselect or expanded mode - Label and error are not read by narrator for Input.Toggle
priority
incomplete accessibility support for input validation platform javascript details the input validation code has incomplete support for accessibility labels and errors are not read by narrator for input choiceset in multiselect or expanded mode label and error are not read by narrator for input toggle
1
86,738
3,728,753,510
IssuesEvent
2016-03-07 02:27:16
HubTurbo/HubTurbo
https://api.github.com/repos/HubTurbo/HubTurbo
closed
Refactor LabelPickerUILogic.java
aspect-refactoring priority.medium
This class is a good opportunity to practice refactoring skills and also to get used to our coding style. Things to improve: * Use more SLAP * Make methods more testable e.g. if a method doesn't have any side effects, it is easier to test. * Add header comments to non-trivial methods (comments should explain WHAT and WHY, but not HOW) The end goal is to make the class easier to understand.
1.0
Refactor LabelPickerUILogic.java - This class is a good opportunity to practice refactoring skills and also to get used to our coding style. Things to improve: * Use more SLAP * Make methods more testable e.g. if a method doesn't have any side effects, it is easier to test. * Add header comments to non-trivial methods (comments should explain WHAT and WHY, but not HOW) The end goal is to make the class easier to understand.
priority
refactor labelpickeruilogic java this class is a good opportunity to practice refactoring skills and also to get used to our coding style things to improve use more slap make methods more testable e g if a method doesn t have any side effects it is easier to test add header comments to non trivial methods comments should explain what and why but not how the end goal is to make the class easier to understand
1
142,872
11,498,059,692
IssuesEvent
2020-02-12 11:12:07
dsccommunity/ActiveDirectoryDsc
https://api.github.com/repos/dsccommunity/ActiveDirectoryDsc
closed
ADDomain: Integration tests is missing for this resource
in progress tests
We should add integration tests for this resource.
1.0
ADDomain: Integration tests is missing for this resource - We should add integration tests for this resource.
non_priority
addomain integration tests is missing for this resource we should add integration tests for this resource
0
369,134
10,888,589,460
IssuesEvent
2019-11-18 16:31:51
luna/enso
https://api.github.com/repos/luna/enso
opened
Clean the initial Rust AST implementation
Category: Tooling Change: Non-Breaking Difficulty: Core Contributor Priority: Medium Type: Enhancement
### Summary Clean-up the code, remove not needed parts, organize common libraries. ### Value The code should be nice and clean, before we start adding more functionalities into it. ### Specification All parts that were carried over from basegl without need are removed. Common libraries are properly split and placed in the proper location. ### Acceptance Criteria & Test Cases The code with AST is merged to master, having successfully passed the reviews.
1.0
Clean the initial Rust AST implementation - ### Summary Clean-up the code, remove not needed parts, organize common libraries. ### Value The code should be nice and clean, before we start adding more functionalities into it. ### Specification All parts that were carried over from basegl without need are removed. Common libraries are properly split and placed in the proper location. ### Acceptance Criteria & Test Cases The code with AST is merged to master, having successfully passed the reviews.
priority
clean the initial rust ast implementation summary clean up the code remove not needed parts organize common libraries value the code should be nice and clean before we start adding more functionalities into it specification all parts that were carried over from basegl without need are removed common libraries are properly split and placed in the proper location acceptance criteria test cases the code with ast is merged to master having successfully passed the reviews
1
210,912
7,196,507,410
IssuesEvent
2018-02-05 03:28:30
NeoISE/.emacs.d
https://api.github.com/repos/NeoISE/.emacs.d
opened
Custom theme setting is now broken.
priority:urgent
After a change to the `theme-changer` package, the function `theme-changer-daytime-p` is removed with its original logic replaced. Thus, the current init file will be broken partially with a `Symbol's function definition is void` warning being reported.
1.0
Custom theme setting is now broken. - After a change to the `theme-changer` package, the function `theme-changer-daytime-p` is removed with its original logic replaced. Thus, the current init file will be broken partially with a `Symbol's function definition is void` warning being reported.
priority
custom theme setting is now broken after a change to the theme changer package the function theme changer daytime p is removed with its original logic replaced thus the current init file will be broken partially with a symbol s function definition is void warning being reported
1
732,191
25,248,211,730
IssuesEvent
2022-11-15 12:48:28
bounswe/bounswe2022group2
https://api.github.com/repos/bounswe/bounswe2022group2
closed
Mobile: Implementing Highlighted (Annotated) Text Widget
priority-medium Status: Completed feature mobile
### Issue Description As we have already talked about in the lectures and Suzan hoca highlighted, annotations are the key part of the app. I have implemented the annotatable text widget with custom selectable text in issue #505. Now, it's time to implement the widget which will display the annotated parts in a text. Since I implemented the annotatable text widget, it's also my responsibility to implement the highlighted (annotated) text widget. I will either implement a separate widget or integrate the logic into the annotatable text. It will be used under the learning space (chapters, notes, and so on will be annotatable). ### Step Details Steps that will be performed: - [x] Do again a detailed research on highlighted and clickable texts with Flutter - [x] Determine the way/logic that will be used to show annotation in a text - [x] Implement a generic highlighted (annotated) text widget or integrate the logic to the annotatable text widget to use across the app - [x] Annotated text will be shown as clickable highlighted text - [x] Integrate annotated text widget into chapter content - [x] Test annotation feature on chapter section ### Final Actions I will test the implementation and widgets created on my real phone. If everything works like a charm, I will open a pull request. If the pull request is approved by at least one teammate, I will merge it and close the issue. ### Deadline of the Issue 12.11.2022 - Saturday [23.59] ### Reviewer Ezgi Aysel Batı ### Deadline for the Review 13.11.2022 - Sunday [15.00]
1.0
Mobile: Implementing Highlighted (Annotated) Text Widget - ### Issue Description As we have already talked about in the lectures and Suzan hoca highlighted, annotations are the key part of the app. I have implemented the annotatable text widget with custom selectable text in issue #505. Now, it's time to implement the widget which will display the annotated parts in a text. Since I implemented the annotatable text widget, it's also my responsibility to implement the highlighted (annotated) text widget. I will either implement a separate widget or integrate the logic into the annotatable text. It will be used under the learning space (chapters, notes, and so on will be annotatable). ### Step Details Steps that will be performed: - [x] Do again a detailed research on highlighted and clickable texts with Flutter - [x] Determine the way/logic that will be used to show annotation in a text - [x] Implement a generic highlighted (annotated) text widget or integrate the logic to the annotatable text widget to use across the app - [x] Annotated text will be shown as clickable highlighted text - [x] Integrate annotated text widget into chapter content - [x] Test annotation feature on chapter section ### Final Actions I will test the implementation and widgets created on my real phone. If everything works like a charm, I will open a pull request. If the pull request is approved by at least one teammate, I will merge it and close the issue. ### Deadline of the Issue 12.11.2022 - Saturday [23.59] ### Reviewer Ezgi Aysel Batı ### Deadline for the Review 13.11.2022 - Sunday [15.00]
priority
mobile implementing highlighted annotated text widget issue description as we have already talked about in the lectures and suzan hoca highlighted annotations are the key part of the app i have implemented the annotatable text widget with custom selectable text in issue now it s time to implement the widget which will display the annotated parts in a text since i implemented the annotatable text widget it s also my responsibility to implement the highlighted annotated text widget i will either implement a separate widget or integrate the logic into the annotatable text it will be used under the learning space chapters notes and so on will be annotatable step details steps that will be performed do again a detailed research on highlighted and clickable texts with flutter determine the way logic that will be used to show annotation in a text implement a generic highlighted annotated text widget or integrate the logic to the annotatable text widget to use across the app annotated text will be shown as clickable highlighted text integrate annotated text widget into chapter content test annotation feature on chapter section final actions i will test the implementation and widgets created on my real phone if everything works like a charm i will open a pull request if the pull request is approved by at least one teammate i will merge it and close the issue deadline of the issue saturday reviewer ezgi aysel batı deadline for the review sunday
1
188,302
15,158,217,375
IssuesEvent
2021-02-12 00:36:26
RoyMagnussen/Yummy-Recipe-Blog
https://api.github.com/repos/RoyMagnussen/Yummy-Recipe-Blog
closed
[FEATURE REQUEST] User Login
documentation enhancement
#### Describe The Feature Wanted Create a form where the user is able to log in easily by providing their username and password. #### Reason For Feature - To have the user easily log in.
1.0
[FEATURE REQUEST] User Login - #### Describe The Feature Wanted Create a form where the user is able to log in easily by providing their username and password. #### Reason For Feature - To have the user easily log in.
non_priority
user login describe the feature wanted create a form where the user is able to log in easily by providing their username and password reason for feature to have the user easily log in
0
320,176
27,423,151,413
IssuesEvent
2023-03-01 18:08:58
MaterializeInc/materialize
https://api.github.com/repos/MaterializeInc/materialize
closed
Add load generator test for invalid tick interval
D-good first issue T-testing
Add an additional test for handling of invalid tick interval values in [src/sql-parser/tests/testdata/ddl](https://github.com/MaterializeInc/materialize/blob/main/src/sql-parser/tests/testdata/ddl) or [test/testdrive/load-generator.td](https://github.com/MaterializeInc/materialize/blob/main/test/testdrive/load-generator.td). This is meant as an onboarding task to go through the end-to-end development flow.
1.0
Add load generator test for invalid tick interval - Add an additional test for handling of invalid tick interval values in [src/sql-parser/tests/testdata/ddl](https://github.com/MaterializeInc/materialize/blob/main/src/sql-parser/tests/testdata/ddl) or [test/testdrive/load-generator.td](https://github.com/MaterializeInc/materialize/blob/main/test/testdrive/load-generator.td). This is meant as an onboarding task to go through the end-to-end development flow.
non_priority
add load generator test for invalid tick interval add an additional test for handling of invalid tick interval values in or this is meant as an onboarding task to go through the end to end development flow
0
181,377
6,659,179,173
IssuesEvent
2017-10-01 07:31:04
spring-projects/spring-boot
https://api.github.com/repos/spring-projects/spring-boot
closed
OAuth configuration keys are duplicated in the meta-data
priority: normal
Plenty of OAuth2 configuration keys are duplicated in the meta-data, probably because it is bound multiple times in different auto-configuration. For instance `security.oauth2.client.client-id` is bound _five_ times and twice on the same object.
1.0
OAuth configuration keys are duplicated in the meta-data - Plenty of OAuth2 configuration keys are duplicated in the meta-data, probably because it is bound multiple times in different auto-configuration. For instance `security.oauth2.client.client-id` is bound _five_ times and twice on the same object.
priority
oauth configuration keys are duplicated in the meta data plenty of configuration keys are duplicated in the meta data probably because it is bound multiple times in different auto configuration for instance security client client id is bound five times and twice on the same object
1
85,901
3,700,106,019
IssuesEvent
2016-02-29 06:06:16
UltimateNate/12-year-old-simulator
https://api.github.com/repos/UltimateNate/12-year-old-simulator
closed
new_speak doesn't work when executing program on bot.py
bug help wanted high priority
It appears new_speak doesn't work if you execute it by running "python3 bot.py", but it works when executing by running "python3 new_speak.py" When interacting it on IRC, and running it on bot.py, it crashes and outputs the following error message: Traceback (most recent call last): File "bot.py", line 27, in <module> import new_speak File "/home/nolsen/12-year-old-simulator/new_speak.py", line 20, in <module> import bot File "/home/nolsen/12-year-old-simulator/bot.py", line 266, in <module> select_speak_type() File "/home/nolsen/12-year-old-simulator/bot.py", line 101, in select_speak_type new_speak.speak() AttributeError: module 'new_speak' has no attribute 'speak'
1.0
new_speak doesn't work when executing program on bot.py - It appears new_speak doesn't work if you execute it by running "python3 bot.py", but it works when executing by running "python3 new_speak.py" When interacting it on IRC, and running it on bot.py, it crashes and outputs the following error message: Traceback (most recent call last): File "bot.py", line 27, in <module> import new_speak File "/home/nolsen/12-year-old-simulator/new_speak.py", line 20, in <module> import bot File "/home/nolsen/12-year-old-simulator/bot.py", line 266, in <module> select_speak_type() File "/home/nolsen/12-year-old-simulator/bot.py", line 101, in select_speak_type new_speak.speak() AttributeError: module 'new_speak' has no attribute 'speak'
priority
new speak doesn t work when executing program on bot py it appears new speak doesn t work if you execute it by running bot py but it works when executing by running new speak py when interacting it on irc and running it on bot py it crashes and outputs the following error message traceback most recent call last file bot py line in import new speak file home nolsen year old simulator new speak py line in import bot file home nolsen year old simulator bot py line in select speak type file home nolsen year old simulator bot py line in select speak type new speak speak attributeerror module new speak has no attribute speak
1
94,393
8,488,589,539
IssuesEvent
2018-10-26 17:07:20
galaxyproject/usegalaxy-playbook
https://api.github.com/repos/galaxyproject/usegalaxy-playbook
closed
Cuffdiff SQLite output problem
enhancement fixathon 06/18 test/retest-fail
Update to 2.2.1.5 (from early 2017, conda updated). The server currently has 2.2.1.3 (2015). https://toolshed.g2.bx.psu.edu/view/devteam/cuffdiff/d3ae7d9c2202 Duplicated posts at Biostars about the issue have all been consolidated into this post. Use as the master when helping users. Should also post back an update once resolved: https://biostar.usegalaxy.org/p/26894/ @natefoo @davebx
2.0
Cuffdiff SQLite output problem - Update to 2.2.1.5 (from early 2017, conda updated). The server currently has 2.2.1.3 (2015). https://toolshed.g2.bx.psu.edu/view/devteam/cuffdiff/d3ae7d9c2202 Duplicated posts at Biostars about the issue have all been consolidated into this post. Use as the master when helping users. Should also post back an update once resolved: https://biostar.usegalaxy.org/p/26894/ @natefoo @davebx
non_priority
cuffdiff sqlite output problem update to from early conda updated the server currently has duplicated posts at biostars about the issue have all been consolidated into this post use as the master when helping users should also post back an update once resolved natefoo davebx
0
170,066
13,172,086,388
IssuesEvent
2020-08-11 17:48:40
google/blockly
https://api.github.com/repos/google/blockly
closed
Add cleanup for Events in mocha tests
component: tests type: cleanup
Many tests trigger Events fired on a timeout, which can end up firing outside of the tests (if that test didn't specifically stub events to fire immediately or may have some other method called on a timeout that then triggers an event). This can cause unexpected tests failures in tests that check for what events were fired during that test. Additionally, there is a lot of duplicated code relating the clearing the Event state (this may resolve the issue with event firing, but would need some investigation) that should be refactored and called in most tests.
1.0
Add cleanup for Events in mocha tests - Many tests trigger Events fired on a timeout, which can end up firing outside of the tests (if that test didn't specifically stub events to fire immediately or may have some other method called on a timeout that then triggers an event). This can cause unexpected tests failures in tests that check for what events were fired during that test. Additionally, there is a lot of duplicated code relating the clearing the Event state (this may resolve the issue with event firing, but would need some investigation) that should be refactored and called in most tests.
non_priority
add cleanup for events in mocha tests many tests trigger events fired on a timeout which can end up firing outside of the tests if that test didn t specifically stub events to fire immediately or may have some other method called on a timeout that then triggers an event this can cause unexpected tests failures in tests that check for what events were fired during that test additionally there is a lot of duplicated code relating the clearing the event state this may resolve the issue with event firing but would need some investigation that should be refactored and called in most tests
0
10,412
8,933,124,778
IssuesEvent
2019-01-23 00:35:33
pulumi/pulumi
https://api.github.com/repos/pulumi/pulumi
closed
Consider not allowing `/` in project names
area/cli area/service kind/bug
We currently allow `/` in project names, which has caused issues when we update the project name in `package.json` because NPM doesn't support `/` in project names. https://github.com/pulumi/pulumi/blob/431f5b345063c6cb1709cac022601631f59077fd/pkg/workspace/project.go#L60 https://github.com/pulumi/pulumi/blob/431f5b345063c6cb1709cac022601631f59077fd/pkg/tokens/names.go#L52-L53 https://github.com/pulumi/pulumi/blob/431f5b345063c6cb1709cac022601631f59077fd/pkg/tokens/names.go#L95-L108 We should re-evaluate what characters we want to allow for project names. Note: Any changes in the CLI here should also be updated in the service to match, e.g. https://github.com/pulumi/pulumi-service/blob/d0d31ffb9bc5af6bd4f4eb79827461788feb4d24/cmd/console2/src/app/new/new.component.ts#L21-L23
1.0
Consider not allowing `/` in project names - We currently allow `/` in project names, which has caused issues when we update the project name in `package.json` because NPM doesn't support `/` in project names. https://github.com/pulumi/pulumi/blob/431f5b345063c6cb1709cac022601631f59077fd/pkg/workspace/project.go#L60 https://github.com/pulumi/pulumi/blob/431f5b345063c6cb1709cac022601631f59077fd/pkg/tokens/names.go#L52-L53 https://github.com/pulumi/pulumi/blob/431f5b345063c6cb1709cac022601631f59077fd/pkg/tokens/names.go#L95-L108 We should re-evaluate what characters we want to allow for project names. Note: Any changes in the CLI here should also be updated in the service to match, e.g. https://github.com/pulumi/pulumi-service/blob/d0d31ffb9bc5af6bd4f4eb79827461788feb4d24/cmd/console2/src/app/new/new.component.ts#L21-L23
non_priority
consider not allowing in project names we currently allow in project names which has caused issues when we update the project name in package json because npm doesn t support in project names we should re evaluate what characters we want to allow for project names note any changes in the cli here should also be updated in the service to match e g
0
212,469
16,452,302,185
IssuesEvent
2021-05-21 07:45:25
openshift/odo
https://api.github.com/repos/openshift/odo
closed
Operatorhub test fails on windows due to incompatible path
area/Windows area/testing good first issue help wanted kind/failing-test points/1
/kind failing-test /area testing ## What versions of software are you using? **Operating System:** Windows ## How did you run odo exactly? `make test-operator-hub` ## Actual behavior The test is failing as it doesn't uses windows friendly path in the test. ## Expected behavior Test should pass without any error on windows. ## Any logs, error output, etc? ``` Failure [10.533 seconds] [ssh:Windows 10] odo service command tests for OperatorHub [ssh:Windows 10] C:/Users/Admin/amqp_ci_rcv_odo-windows-e2e-pr-build_PR_4658/repo/tests/integration/operatorhub/cmd_service_test.go:16 [ssh:Windows 10] When using from-file option [ssh:Windows 10] C:/Users/Admin/amqp_ci_rcv_odo-windows-e2e-pr-build_PR_4658/repo/tests/integration/operatorhub/cmd_service_test.go:264 [ssh:Windows 10] should fail to create service if metadata doesn't exist or is invalid [It] [ssh:Windows 10] C:/Users/Admin/amqp_ci_rcv_odo-windows-e2e-pr-build_PR_4658/repo/tests/integration/operatorhub/cmd_service_test.go:274 [ssh:Windows 10] Expected [ssh:Windows 10] <string>: I0429 06:46:35.118141 7632 util.go:761] Cached response used. [ssh:Windows 10] I0429 06:46:35.121327 7632 context.go:152] absolute devfile path: 'C:\Users\Admin\790992200\devfile.yaml' [ssh:Windows 10] I0429 06:46:35.121327 7632 context.go:89] absolute devfile path: 'C:\Users\Admin\790992200\devfile.yaml' [ssh:Windows 10] I0429 06:46:35.121327 7632 content.go:33] converted devfile YAML to JSON [ssh:Windows 10] I0429 06:46:35.121327 7632 apiVersion.go:42] devfile schemaVersion: '2.0.0' [ssh:Windows 10] I0429 06:46:35.121327 7632 helper.go:41] devfile apiVersion '2.0.0' is supported [ssh:Windows 10] I0429 06:46:35.127121 7632 schema.go:46] validated devfile schema [ssh:Windows 10] I0429 06:46:35.130939 7632 validate.go:50] Successfully validated devfile sections [ssh:Windows 10] X CreateFile \tmp\lvdztx.yaml: The system cannot find the path specified. ```
2.0
Operatorhub test fails on windows due to incompatible path - /kind failing-test /area testing ## What versions of software are you using? **Operating System:** Windows ## How did you run odo exactly? `make test-operator-hub` ## Actual behavior The test is failing as it doesn't uses windows friendly path in the test. ## Expected behavior Test should pass without any error on windows. ## Any logs, error output, etc? ``` Failure [10.533 seconds] [ssh:Windows 10] odo service command tests for OperatorHub [ssh:Windows 10] C:/Users/Admin/amqp_ci_rcv_odo-windows-e2e-pr-build_PR_4658/repo/tests/integration/operatorhub/cmd_service_test.go:16 [ssh:Windows 10] When using from-file option [ssh:Windows 10] C:/Users/Admin/amqp_ci_rcv_odo-windows-e2e-pr-build_PR_4658/repo/tests/integration/operatorhub/cmd_service_test.go:264 [ssh:Windows 10] should fail to create service if metadata doesn't exist or is invalid [It] [ssh:Windows 10] C:/Users/Admin/amqp_ci_rcv_odo-windows-e2e-pr-build_PR_4658/repo/tests/integration/operatorhub/cmd_service_test.go:274 [ssh:Windows 10] Expected [ssh:Windows 10] <string>: I0429 06:46:35.118141 7632 util.go:761] Cached response used. [ssh:Windows 10] I0429 06:46:35.121327 7632 context.go:152] absolute devfile path: 'C:\Users\Admin\790992200\devfile.yaml' [ssh:Windows 10] I0429 06:46:35.121327 7632 context.go:89] absolute devfile path: 'C:\Users\Admin\790992200\devfile.yaml' [ssh:Windows 10] I0429 06:46:35.121327 7632 content.go:33] converted devfile YAML to JSON [ssh:Windows 10] I0429 06:46:35.121327 7632 apiVersion.go:42] devfile schemaVersion: '2.0.0' [ssh:Windows 10] I0429 06:46:35.121327 7632 helper.go:41] devfile apiVersion '2.0.0' is supported [ssh:Windows 10] I0429 06:46:35.127121 7632 schema.go:46] validated devfile schema [ssh:Windows 10] I0429 06:46:35.130939 7632 validate.go:50] Successfully validated devfile sections [ssh:Windows 10] X CreateFile \tmp\lvdztx.yaml: The system cannot find the path specified. ```
non_priority
operatorhub test fails on windows due to incompatible path kind failing test area testing what versions of software are you using operating system windows how did you run odo exactly make test operator hub actual behavior the test is failing as it doesn t uses windows friendly path in the test expected behavior test should pass without any error on windows any logs error output etc failure odo service command tests for operatorhub c users admin amqp ci rcv odo windows pr build pr repo tests integration operatorhub cmd service test go when using from file option c users admin amqp ci rcv odo windows pr build pr repo tests integration operatorhub cmd service test go should fail to create service if metadata doesn t exist or is invalid c users admin amqp ci rcv odo windows pr build pr repo tests integration operatorhub cmd service test go expected util go cached response used context go absolute devfile path c users admin devfile yaml context go absolute devfile path c users admin devfile yaml content go converted devfile yaml to json apiversion go devfile schemaversion helper go devfile apiversion is supported schema go validated devfile schema validate go successfully validated devfile sections x createfile tmp lvdztx yaml the system cannot find the path specified
0
274,256
8,559,006,241
IssuesEvent
2018-11-08 19:56:20
CS2113-AY1819S1-W13-2/main
https://api.github.com/repos/CS2113-AY1819S1-W13-2/main
closed
Edit commands allows for timezones that do not exist.
priority.low severity.High
**Describe the bug** Time zones can be +500000, which is not a valid time zone **To Reproduce** Steps to reproduce the behavior: edit 1 tz/500000 **Expected behavior** Should check for valid timezone and give an error. <hr> **Reported by:** @andrewome **Severity:** `Low` <sub>[original: nusCS2113-AY1819S1/pe-1#466]</sub>
1.0
Edit commands allows for timezones that do not exist. - **Describe the bug** Time zones can be +500000, which is not a valid time zone **To Reproduce** Steps to reproduce the behavior: edit 1 tz/500000 **Expected behavior** Should check for valid timezone and give an error. <hr> **Reported by:** @andrewome **Severity:** `Low` <sub>[original: nusCS2113-AY1819S1/pe-1#466]</sub>
priority
edit commands allows for timezones that do not exist describe the bug time zones can be which is not a valid time zone to reproduce steps to reproduce the behavior edit tz expected behavior should check for valid timezone and give an error reported by andrewome severity low
1
244,813
7,880,651,777
IssuesEvent
2018-06-26 16:31:51
aowen87/FOO
https://api.github.com/repos/aowen87/FOO
closed
Add ITAPS reader support to the ubuntu distributions.
Expected Use: 3 - Occasional Impact: 3 - Medium OS: All Priority: Normal Support Group: Any Target Version: 2.10.1 feature
I haven't been including the ITAPS reader in the Ubuntu distributions because of difficulties building it. A user has asked about it so I should make the effort to include it.
1.0
Add ITAPS reader support to the ubuntu distributions. - I haven't been including the ITAPS reader in the Ubuntu distributions because of difficulties building it. A user has asked about it so I should make the effort to include it.
priority
add itaps reader support to the ubuntu distributions i haven t been including the itaps reader in the ubuntu distributions because of difficulties building it a user has asked about it so i should make the effort to include it
1
339,377
10,253,424,473
IssuesEvent
2019-08-21 11:16:01
ballerina-platform/ballerina-lang
https://api.github.com/repos/ballerina-platform/ballerina-lang
closed
Make unused imports compilation errors.
Area/Language Component/Compiler Priority/Blocker Type/Improvement
We should give warning when unused imports are available in a bal file
1.0
Make unused imports compilation errors. - We should give warning when unused imports are available in a bal file
priority
make unused imports compilation errors we should give warning when unused imports are available in a bal file
1
366,728
10,825,414,234
IssuesEvent
2019-11-09 15:42:21
kiwicom/schemathesis
https://api.github.com/repos/kiwicom/schemathesis
closed
Make method names case insensitive in schema mapping interface
Priority: Low Type: Enhancement good first issue
It should be equivalent: ‘’’schema[“/foo”][“get”]’’’ and ‘’’schema[“/foo”][“GET”]’’’
1.0
Make method names case insensitive in schema mapping interface - It should be equivalent: ‘’’schema[“/foo”][“get”]’’’ and ‘’’schema[“/foo”][“GET”]’’’
priority
make method names case insensitive in schema mapping interface it should be equivalent ‘’’schema ’’’ and ‘’’schema ’’’
1
172,183
21,040,472,037
IssuesEvent
2022-03-31 11:52:00
LynRodWS/alcor
https://api.github.com/repos/LynRodWS/alcor
opened
CVE-2022-27772 (Medium) detected in multiple libraries
security vulnerability
## CVE-2022-27772 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>spring-boot-2.2.5.RELEASE.jar</b>, <b>spring-boot-2.1.6.RELEASE.jar</b>, <b>spring-boot-2.2.6.RELEASE.jar</b></p></summary> <p> <details><summary><b>spring-boot-2.2.5.RELEASE.jar</b></p></summary> <p>Spring Boot</p> <p>Library home page: <a href="https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot">https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot</a></p> <p>Path to dependency file: /services/route_manager/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.5.RELEASE/spring-boot-2.2.5.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-actuator-2.2.5.RELEASE.jar (Root Library) - spring-boot-starter-2.2.5.RELEASE.jar - :x: **spring-boot-2.2.5.RELEASE.jar** (Vulnerable Library) </details> <details><summary><b>spring-boot-2.1.6.RELEASE.jar</b></p></summary> <p>Spring Boot</p> <p>Library home page: <a href="https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot">https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot</a></p> <p>Path to dependency file: /services/api_gateway/pom.xml</p> <p>Path to vulnerable library: /canner/.m2/repository/org/springframework/boot/spring-boot/2.1.6.RELEASE/spring-boot-2.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.1.6.RELEASE/spring-boot-2.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.1.6.RELEASE/spring-boot-2.1.6.RELEASE.jar</p> <p> Dependency Hierarchy: - :x: **spring-boot-2.1.6.RELEASE.jar** (Vulnerable Library) </details> <details><summary><b>spring-boot-2.2.6.RELEASE.jar</b></p></summary> <p>Spring Boot</p> <p>Library home page: <a href="https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot">https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot</a></p> <p>Path to dependency file: /services/subnet_manager/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-actuator-2.2.6.RELEASE.jar (Root Library) - spring-boot-starter-2.2.6.RELEASE.jar - :x: **spring-boot-2.2.6.RELEASE.jar** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ** UNSUPPORTED WHEN ASSIGNED ** spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer. <p>Publish Date: 2022-03-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-27772>CVE-2022-27772</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-cm59-pr5q-cw85">https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-cm59-pr5q-cw85</a></p> <p>Release Date: 2022-03-30</p> <p>Fix Resolution: org.springframework.boot:spring-boot:2.2.11.RELEASE</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.springframework.boot","packageName":"spring-boot","packageVersion":"2.2.5.RELEASE","packageFilePaths":["/services/route_manager/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-actuator:2.2.5.RELEASE;org.springframework.boot:spring-boot-starter:2.2.5.RELEASE;org.springframework.boot:spring-boot:2.2.5.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework.boot:spring-boot:2.2.11.RELEASE","isBinary":false},{"packageType":"Java","groupId":"org.springframework.boot","packageName":"spring-boot","packageVersion":"2.1.6.RELEASE","packageFilePaths":["/services/api_gateway/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"org.springframework.boot:spring-boot:2.1.6.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework.boot:spring-boot:2.2.11.RELEASE","isBinary":false},{"packageType":"Java","groupId":"org.springframework.boot","packageName":"spring-boot","packageVersion":"2.2.6.RELEASE","packageFilePaths":["/services/subnet_manager/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-actuator:2.2.6.RELEASE;org.springframework.boot:spring-boot-starter:2.2.6.RELEASE;org.springframework.boot:spring-boot:2.2.6.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework.boot:spring-boot:2.2.11.RELEASE","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-27772","vulnerabilityDetails":"** UNSUPPORTED WHEN ASSIGNED ** spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-27772","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2022-27772 (Medium) detected in multiple libraries - ## CVE-2022-27772 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>spring-boot-2.2.5.RELEASE.jar</b>, <b>spring-boot-2.1.6.RELEASE.jar</b>, <b>spring-boot-2.2.6.RELEASE.jar</b></p></summary> <p> <details><summary><b>spring-boot-2.2.5.RELEASE.jar</b></p></summary> <p>Spring Boot</p> <p>Library home page: <a href="https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot">https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot</a></p> <p>Path to dependency file: /services/route_manager/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.5.RELEASE/spring-boot-2.2.5.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-actuator-2.2.5.RELEASE.jar (Root Library) - spring-boot-starter-2.2.5.RELEASE.jar - :x: **spring-boot-2.2.5.RELEASE.jar** (Vulnerable Library) </details> <details><summary><b>spring-boot-2.1.6.RELEASE.jar</b></p></summary> <p>Spring Boot</p> <p>Library home page: <a href="https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot">https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot</a></p> <p>Path to dependency file: /services/api_gateway/pom.xml</p> <p>Path to vulnerable library: /canner/.m2/repository/org/springframework/boot/spring-boot/2.1.6.RELEASE/spring-boot-2.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.1.6.RELEASE/spring-boot-2.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.1.6.RELEASE/spring-boot-2.1.6.RELEASE.jar</p> <p> Dependency Hierarchy: - :x: **spring-boot-2.1.6.RELEASE.jar** (Vulnerable Library) </details> <details><summary><b>spring-boot-2.2.6.RELEASE.jar</b></p></summary> <p>Spring Boot</p> <p>Library home page: <a href="https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot">https://projects.spring.io/spring-boot/#/spring-boot-parent/spring-boot</a></p> <p>Path to dependency file: /services/subnet_manager/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/boot/spring-boot/2.2.6.RELEASE/spring-boot-2.2.6.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-actuator-2.2.6.RELEASE.jar (Root Library) - spring-boot-starter-2.2.6.RELEASE.jar - :x: **spring-boot-2.2.6.RELEASE.jar** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ** UNSUPPORTED WHEN ASSIGNED ** spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer. <p>Publish Date: 2022-03-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-27772>CVE-2022-27772</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-cm59-pr5q-cw85">https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-cm59-pr5q-cw85</a></p> <p>Release Date: 2022-03-30</p> <p>Fix Resolution: org.springframework.boot:spring-boot:2.2.11.RELEASE</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.springframework.boot","packageName":"spring-boot","packageVersion":"2.2.5.RELEASE","packageFilePaths":["/services/route_manager/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-actuator:2.2.5.RELEASE;org.springframework.boot:spring-boot-starter:2.2.5.RELEASE;org.springframework.boot:spring-boot:2.2.5.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework.boot:spring-boot:2.2.11.RELEASE","isBinary":false},{"packageType":"Java","groupId":"org.springframework.boot","packageName":"spring-boot","packageVersion":"2.1.6.RELEASE","packageFilePaths":["/services/api_gateway/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"org.springframework.boot:spring-boot:2.1.6.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework.boot:spring-boot:2.2.11.RELEASE","isBinary":false},{"packageType":"Java","groupId":"org.springframework.boot","packageName":"spring-boot","packageVersion":"2.2.6.RELEASE","packageFilePaths":["/services/subnet_manager/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-actuator:2.2.6.RELEASE;org.springframework.boot:spring-boot-starter:2.2.6.RELEASE;org.springframework.boot:spring-boot:2.2.6.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework.boot:spring-boot:2.2.11.RELEASE","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-27772","vulnerabilityDetails":"** UNSUPPORTED WHEN ASSIGNED ** spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-27772","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries spring boot release jar spring boot release jar spring boot release jar spring boot release jar spring boot library home page a href path to dependency file services route manager pom xml path to vulnerable library home wss scanner repository org springframework boot spring boot release spring boot release jar dependency hierarchy spring boot starter actuator release jar root library spring boot starter release jar x spring boot release jar vulnerable library spring boot release jar spring boot library home page a href path to dependency file services api gateway pom xml path to vulnerable library canner repository org springframework boot spring boot release spring boot release jar home wss scanner repository org springframework boot spring boot release spring boot release jar home wss scanner repository org springframework boot spring boot release spring boot release jar dependency hierarchy x spring boot release jar vulnerable library spring boot release jar spring boot library home page a href path to dependency file services subnet manager pom xml path to vulnerable library home wss scanner repository org springframework boot spring boot release spring boot release jar home wss scanner repository org springframework boot spring boot release spring boot release jar home wss scanner repository org springframework boot spring boot release spring boot release jar home wss scanner repository org springframework boot spring boot release spring boot release jar home wss scanner repository org springframework boot spring boot release spring boot release jar home wss scanner repository org springframework boot spring boot release spring boot release jar home wss scanner repository org springframework boot spring boot release spring boot release jar home wss scanner repository org springframework boot spring boot release spring boot release jar home wss scanner repository org springframework boot spring boot release spring boot release jar home wss scanner repository org springframework boot spring boot release spring boot release jar dependency hierarchy spring boot starter actuator release jar root library spring boot starter release jar x spring boot release jar vulnerable library found in base branch master vulnerability details unsupported when assigned spring boot versions prior to version release was vulnerable to temporary directory hijacking this vulnerability impacted the org springframework boot web server abstractconfigurablewebserverfactory createtempdir method note this vulnerability only affects products and or versions that are no longer supported by the maintainer publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework boot spring boot release check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org springframework boot spring boot starter actuator release org springframework boot spring boot starter release org springframework boot spring boot release isminimumfixversionavailable true minimumfixversion org springframework boot spring boot release isbinary false packagetype java groupid org springframework boot packagename spring boot packageversion release packagefilepaths istransitivedependency false dependencytree org springframework boot spring boot release isminimumfixversionavailable true minimumfixversion org springframework boot spring boot release isbinary false packagetype java groupid org springframework boot packagename spring boot packageversion release packagefilepaths istransitivedependency true dependencytree org springframework boot spring boot starter actuator release org springframework boot spring boot starter release org springframework boot spring boot release isminimumfixversionavailable true minimumfixversion org springframework boot spring boot release isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails unsupported when assigned spring boot versions prior to version release was vulnerable to temporary directory hijacking this vulnerability impacted the org springframework boot web server abstractconfigurablewebserverfactory createtempdir method note this vulnerability only affects products and or versions that are no longer supported by the maintainer vulnerabilityurl
0
162,049
6,146,564,743
IssuesEvent
2017-06-27 14:07:32
BinPar/PRM
https://api.github.com/repos/BinPar/PRM
closed
INFORME ASIGNATURAS: campo curso contiene datos CURSO y AÑO ACADÉMICO
Priority: High
![image](https://cloud.githubusercontent.com/assets/22589031/25695086/06847214-30b2-11e7-98dc-9dbed1a4bbc1.png) Al descargar el INFORME ASIGNATURAS, el campo CURSO contiene tanto datos del curso (1,2,3,4,5,6) como datos del AÑO ACADEMICO (2016-2017, 2017-2018). Realmente solo debiera de aportar datos del curso, no del año académico. ¿De dónde toma el dato? En los registros que indican 2016-2017 o 2017-2018 se introdujeron directamente en el PRM y no fueron importados desde los Excel. Por otra parte, habría que sustituir en la bbdd 1º/2º.... por 1-2-3 en todos los registros. En el PRM el curso se indica 1-2-3-4-5-6, no con ordinales. @CristianBinpar @minigoBinpar
1.0
INFORME ASIGNATURAS: campo curso contiene datos CURSO y AÑO ACADÉMICO - ![image](https://cloud.githubusercontent.com/assets/22589031/25695086/06847214-30b2-11e7-98dc-9dbed1a4bbc1.png) Al descargar el INFORME ASIGNATURAS, el campo CURSO contiene tanto datos del curso (1,2,3,4,5,6) como datos del AÑO ACADEMICO (2016-2017, 2017-2018). Realmente solo debiera de aportar datos del curso, no del año académico. ¿De dónde toma el dato? En los registros que indican 2016-2017 o 2017-2018 se introdujeron directamente en el PRM y no fueron importados desde los Excel. Por otra parte, habría que sustituir en la bbdd 1º/2º.... por 1-2-3 en todos los registros. En el PRM el curso se indica 1-2-3-4-5-6, no con ordinales. @CristianBinpar @minigoBinpar
priority
informe asignaturas campo curso contiene datos curso y año académico al descargar el informe asignaturas el campo curso contiene tanto datos del curso como datos del año academico realmente solo debiera de aportar datos del curso no del año académico ¿de dónde toma el dato en los registros que indican o se introdujeron directamente en el prm y no fueron importados desde los excel por otra parte habría que sustituir en la bbdd por en todos los registros en el prm el curso se indica no con ordinales cristianbinpar minigobinpar
1
309,310
9,473,228,470
IssuesEvent
2019-04-19 00:44:15
hayata-yamamoto/neural_search
https://api.github.com/repos/hayata-yamamoto/neural_search
opened
rewrite api by django
low priority
fastapi has not their original models. Firstly, this api is designed not to use database.
1.0
rewrite api by django - fastapi has not their original models. Firstly, this api is designed not to use database.
priority
rewrite api by django fastapi has not their original models firstly this api is designed not to use database
1
60,659
3,131,290,610
IssuesEvent
2015-09-09 14:07:13
brharp/hjckrrh
https://api.github.com/repos/brharp/hjckrrh
opened
G3 - Local search has no associated heading
feature: general (G) priority: normal type: enhancement request
I noticed that for every local search input box that isn't on the main page, there is no heading associated with it. There appears to be an invisible h2 that has been commented out: ``` <!-- <h2 class="element-invisible"></h2> --> ``` Not sure if this was intentional or not. While not necessarily an accessibility issue, this is definitely a usability issue since both sighted and screen reader users have no indication that the input box is a local website search.
1.0
G3 - Local search has no associated heading - I noticed that for every local search input box that isn't on the main page, there is no heading associated with it. There appears to be an invisible h2 that has been commented out: ``` <!-- <h2 class="element-invisible"></h2> --> ``` Not sure if this was intentional or not. While not necessarily an accessibility issue, this is definitely a usability issue since both sighted and screen reader users have no indication that the input box is a local website search.
priority
local search has no associated heading i noticed that for every local search input box that isn t on the main page there is no heading associated with it there appears to be an invisible that has been commented out not sure if this was intentional or not while not necessarily an accessibility issue this is definitely a usability issue since both sighted and screen reader users have no indication that the input box is a local website search
1
715,166
24,588,849,336
IssuesEvent
2022-10-13 22:50:32
VoltanFr/memcheck
https://api.github.com/repos/VoltanFr/memcheck
closed
Adpatative sleep time in retries
priority-medium complexity-low
Retries in the Learn page are always done after a 1 second sleep. This sleep time should increase with retries (similarly to the computing of the timeOut). This happens in `handlePendingMoveOperations`, `downloadCardsIfNeeded`, `handlePendingNotificationRegistrations` and `handlePendingRatingOperations`. This will save power and bandwidth. But beware: the user is waiting, and when the train gets out of this long tunnel, he doesn't want to wait for a long time; so don't increase the sleep time too much. I'd say 10ms is a good first sleep time, and we don't want to increase it to more than 5 seconds (or maybe even less?)
1.0
Adpatative sleep time in retries - Retries in the Learn page are always done after a 1 second sleep. This sleep time should increase with retries (similarly to the computing of the timeOut). This happens in `handlePendingMoveOperations`, `downloadCardsIfNeeded`, `handlePendingNotificationRegistrations` and `handlePendingRatingOperations`. This will save power and bandwidth. But beware: the user is waiting, and when the train gets out of this long tunnel, he doesn't want to wait for a long time; so don't increase the sleep time too much. I'd say 10ms is a good first sleep time, and we don't want to increase it to more than 5 seconds (or maybe even less?)
priority
adpatative sleep time in retries retries in the learn page are always done after a second sleep this sleep time should increase with retries similarly to the computing of the timeout this happens in handlependingmoveoperations downloadcardsifneeded handlependingnotificationregistrations and handlependingratingoperations this will save power and bandwidth but beware the user is waiting and when the train gets out of this long tunnel he doesn t want to wait for a long time so don t increase the sleep time too much i d say is a good first sleep time and we don t want to increase it to more than seconds or maybe even less
1
316,833
9,657,937,994
IssuesEvent
2019-05-20 09:45:33
ampproject/amphtml
https://api.github.com/repos/ampproject/amphtml
closed
amp-list on shadow-dom doesn't render mustache template
Category: Dynamic/Personalized Content Category: PWA P1: High Priority Type: Bug
## What's the issue? amp-list on shadow-dom doesn't render mustache template from yesterday (17 April) ![image](https://user-images.githubusercontent.com/10278898/56364705-80f30900-61ef-11e9-870d-a909ba1e4b01.png) ## How do we reproduce the issue? You can visit every ours detail article page on https://rep.repubblica.it for example https://rep.repubblica.it/pwa/intervista/2019/04/17/news/orlando_il_ministro_sappia_che_non_mi_faro_scavalcare_sono_pronto_a_denunciarlo_-224314656/ and you can look for vote and comments info and links at the right of "condividi" (share) link 1. Go to our premium home page news site on https://rep.repubblica.it 2. Click on any link to an article detail page (eg https://rep.repubblica.it for example https://rep.repubblica.it/pwa/intervista/2019/04/17/news/orlando_il_ministro_sappia_che_non_mi_faro_scavalcare_sono_pronto_a_denunciarlo_-224314656/) 3. Find share bar after the title and signature like this ![image](https://user-images.githubusercontent.com/10278898/56365182-81d86a80-61f0-11e9-8447-6afa3034a5a8.png) 4. You can find only share label, miss vote and comments label If you visit pure amp page at this url https://rep.repubblica.it/ws/detail/intervista/2019/04/17/news/orlando_il_ministro_sappia_che_non_mi_faro_scavalcare_sono_pronto_a_denunciarlo_-224314656/ and all works fine Ours rest json services linked on src attribute at amp-list works fine and response with data and 200 http code. ## What browsers are affected? Chrome, Firefox, Safari ## Which AMP version is affected? 1904091426070
1.0
amp-list on shadow-dom doesn't render mustache template - ## What's the issue? amp-list on shadow-dom doesn't render mustache template from yesterday (17 April) ![image](https://user-images.githubusercontent.com/10278898/56364705-80f30900-61ef-11e9-870d-a909ba1e4b01.png) ## How do we reproduce the issue? You can visit every ours detail article page on https://rep.repubblica.it for example https://rep.repubblica.it/pwa/intervista/2019/04/17/news/orlando_il_ministro_sappia_che_non_mi_faro_scavalcare_sono_pronto_a_denunciarlo_-224314656/ and you can look for vote and comments info and links at the right of "condividi" (share) link 1. Go to our premium home page news site on https://rep.repubblica.it 2. Click on any link to an article detail page (eg https://rep.repubblica.it for example https://rep.repubblica.it/pwa/intervista/2019/04/17/news/orlando_il_ministro_sappia_che_non_mi_faro_scavalcare_sono_pronto_a_denunciarlo_-224314656/) 3. Find share bar after the title and signature like this ![image](https://user-images.githubusercontent.com/10278898/56365182-81d86a80-61f0-11e9-8447-6afa3034a5a8.png) 4. You can find only share label, miss vote and comments label If you visit pure amp page at this url https://rep.repubblica.it/ws/detail/intervista/2019/04/17/news/orlando_il_ministro_sappia_che_non_mi_faro_scavalcare_sono_pronto_a_denunciarlo_-224314656/ and all works fine Ours rest json services linked on src attribute at amp-list works fine and response with data and 200 http code. ## What browsers are affected? Chrome, Firefox, Safari ## Which AMP version is affected? 1904091426070
priority
amp list on shadow dom doesn t render mustache template what s the issue amp list on shadow dom doesn t render mustache template from yesterday april how do we reproduce the issue you can visit every ours detail article page on for example and you can look for vote and comments info and links at the right of condividi share link go to our premium home page news site on click on any link to an article detail page eg for example find share bar after the title and signature like this you can find only share label miss vote and comments label if you visit pure amp page at this url and all works fine ours rest json services linked on src attribute at amp list works fine and response with data and http code what browsers are affected chrome firefox safari which amp version is affected
1
55,159
6,890,287,866
IssuesEvent
2017-11-22 13:31:48
WordPress/gutenberg
https://api.github.com/repos/WordPress/gutenberg
closed
Docked Toolbar and Width Options
Blocks Chrome Design [Type] Bug
Docked toolbar has different positions depending on width used: ![image](https://user-images.githubusercontent.com/548849/33085019-c3096244-cee3-11e7-880a-c615f3e967ea.png) ![image](https://user-images.githubusercontent.com/548849/33085039-cc22b650-cee3-11e7-8cc8-8dd5bf634327.png) cc @jasmussen
1.0
Docked Toolbar and Width Options - Docked toolbar has different positions depending on width used: ![image](https://user-images.githubusercontent.com/548849/33085019-c3096244-cee3-11e7-880a-c615f3e967ea.png) ![image](https://user-images.githubusercontent.com/548849/33085039-cc22b650-cee3-11e7-8cc8-8dd5bf634327.png) cc @jasmussen
non_priority
docked toolbar and width options docked toolbar has different positions depending on width used cc jasmussen
0
271,776
20,718,340,754
IssuesEvent
2022-03-13 01:16:43
UPEI-Android/group-project-mindjogg
https://api.github.com/repos/UPEI-Android/group-project-mindjogg
closed
Documentation for Edit profile API
documentation Environment - Dev Status - Completed
## Context Edit profile API is used to update user information ## Problem The Technical documentation of the API is needed ## Solution - [ ] Create Documentation about how to setup the API (Overview of implementation details) - [ ] Create Documentation about how to use the API (How to call the API )
1.0
Documentation for Edit profile API - ## Context Edit profile API is used to update user information ## Problem The Technical documentation of the API is needed ## Solution - [ ] Create Documentation about how to setup the API (Overview of implementation details) - [ ] Create Documentation about how to use the API (How to call the API )
non_priority
documentation for edit profile api context edit profile api is used to update user information problem the technical documentation of the api is needed solution create documentation about how to setup the api overview of implementation details create documentation about how to use the api how to call the api
0
68,379
7,094,159,614
IssuesEvent
2018-01-13 00:14:42
rancher/rancher
https://api.github.com/repos/rancher/rancher
closed
NFS - When host is rebooted , docker volumes get created on the hosts.
area/storage kind/bug status/resolved status/to-test
Rancher versions: rancher/server:v1.6.12-flexvol NFS driver Version: daishan1992/storage-nfs:dev Steps to reproduce the problem: Create a service with nfs volume driver. Make sure that there are no docker volumes created on any host in storage pool. Reboot one of the hosts where there are service containers with nfs volumes. Once host is rebooted, and containers have restarted successfully on the host , notice that the docker volumes get created on the host for all the nfs volumes in the storage pool(not just for containers in that host). Host mount points continue to be present for the nfs volumes. ``` root@sannfsagain3:~# mount | grep var/nfs1 104.236.98.29:/var/nfs1/test1_foo1_089f2 on /var/lib/rancher/volumes/rancher-nfs/test1_foo1_089f2 type nfs4 (rw,relatime,vers=4.0,rsize=262144,wsize=262144,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=sys,clientaddr=159.89.176.148,local_lock=none,addr=104.236.98.29) 104.236.98.29:/var/nfs1/test1_foo1_089f2 on /var/lib/rancher/volumes/rancher-nfs/test1_foo1_089f2 type nfs4 (rw,relatime,vers=4.0,rsize=262144,wsize=262144,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=sys,clientaddr=159.89.176.148,local_lock=none,addr=104.236.98.29) 104.236.98.29:/var/nfs1/test2_foo1_2_bf3dbdfc-6901-435a-ba85-d4746e2091c7_0c92a on /var/lib/rancher/volumes/rancher-nfs/test2_foo1_2_bf3dbdfc-6901-435a-ba85-d4746e2091c7_0c92a type nfs4 (rw,relatime,vers=4.0,rsize=262144,wsize=262144,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=sys,clientaddr=159.89.176.148,local_lock=none,addr=104.236.98.29) 104.236.98.29:/var/nfs1/test2_foo1_2_bf3dbdfc-6901-435a-ba85-d4746e2091c7_0c92a on /var/lib/rancher/volumes/rancher-nfs/test2_foo1_2_bf3dbdfc-6901-435a-ba85-d4746e2091c7_0c92a type nfs4 (rw,relatime,vers=4.0,rsize=262144,wsize=262144,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=sys,clientaddr=159.89.176.148,local_lock=none,addr=104.236.98.29) root@sannfsagain3:~# docker volume ls DRIVER VOLUME NAME local rancher-agent-state local rancher-cni local rancher-cni-driver rancher-nfs test1_foo1_089f2 rancher-nfs test2_foo1_1_036f0d03-d647-4f3d-82c7-c8d0494790d4_5a4b4 rancher-nfs test2_foo1_2_bf3dbdfc-6901-435a-ba85-d4746e2091c7_0c92a rancher-nfs test2_foo1_3_f04ee493-1f76-4ba7-9036-f936691e58f7_0a9b6 rancher-nfs test2_foo1_4_335b2d52-0ec8-4eef-b67f-dbaa5668f822_b4478 root@sannfsagain3:~# ```
1.0
NFS - When host is rebooted , docker volumes get created on the hosts. - Rancher versions: rancher/server:v1.6.12-flexvol NFS driver Version: daishan1992/storage-nfs:dev Steps to reproduce the problem: Create a service with nfs volume driver. Make sure that there are no docker volumes created on any host in storage pool. Reboot one of the hosts where there are service containers with nfs volumes. Once host is rebooted, and containers have restarted successfully on the host , notice that the docker volumes get created on the host for all the nfs volumes in the storage pool(not just for containers in that host). Host mount points continue to be present for the nfs volumes. ``` root@sannfsagain3:~# mount | grep var/nfs1 104.236.98.29:/var/nfs1/test1_foo1_089f2 on /var/lib/rancher/volumes/rancher-nfs/test1_foo1_089f2 type nfs4 (rw,relatime,vers=4.0,rsize=262144,wsize=262144,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=sys,clientaddr=159.89.176.148,local_lock=none,addr=104.236.98.29) 104.236.98.29:/var/nfs1/test1_foo1_089f2 on /var/lib/rancher/volumes/rancher-nfs/test1_foo1_089f2 type nfs4 (rw,relatime,vers=4.0,rsize=262144,wsize=262144,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=sys,clientaddr=159.89.176.148,local_lock=none,addr=104.236.98.29) 104.236.98.29:/var/nfs1/test2_foo1_2_bf3dbdfc-6901-435a-ba85-d4746e2091c7_0c92a on /var/lib/rancher/volumes/rancher-nfs/test2_foo1_2_bf3dbdfc-6901-435a-ba85-d4746e2091c7_0c92a type nfs4 (rw,relatime,vers=4.0,rsize=262144,wsize=262144,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=sys,clientaddr=159.89.176.148,local_lock=none,addr=104.236.98.29) 104.236.98.29:/var/nfs1/test2_foo1_2_bf3dbdfc-6901-435a-ba85-d4746e2091c7_0c92a on /var/lib/rancher/volumes/rancher-nfs/test2_foo1_2_bf3dbdfc-6901-435a-ba85-d4746e2091c7_0c92a type nfs4 (rw,relatime,vers=4.0,rsize=262144,wsize=262144,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=sys,clientaddr=159.89.176.148,local_lock=none,addr=104.236.98.29) root@sannfsagain3:~# docker volume ls DRIVER VOLUME NAME local rancher-agent-state local rancher-cni local rancher-cni-driver rancher-nfs test1_foo1_089f2 rancher-nfs test2_foo1_1_036f0d03-d647-4f3d-82c7-c8d0494790d4_5a4b4 rancher-nfs test2_foo1_2_bf3dbdfc-6901-435a-ba85-d4746e2091c7_0c92a rancher-nfs test2_foo1_3_f04ee493-1f76-4ba7-9036-f936691e58f7_0a9b6 rancher-nfs test2_foo1_4_335b2d52-0ec8-4eef-b67f-dbaa5668f822_b4478 root@sannfsagain3:~# ```
non_priority
nfs when host is rebooted docker volumes get created on the hosts rancher versions rancher server flexvol nfs driver version storage nfs dev steps to reproduce the problem create a service with nfs volume driver make sure that there are no docker volumes created on any host in storage pool reboot one of the hosts where there are service containers with nfs volumes once host is rebooted and containers have restarted successfully on the host notice that the docker volumes get created on the host for all the nfs volumes in the storage pool not just for containers in that host host mount points continue to be present for the nfs volumes root mount grep var var on var lib rancher volumes rancher nfs type rw relatime vers rsize wsize namlen hard proto tcp port timeo retrans sec sys clientaddr local lock none addr var on var lib rancher volumes rancher nfs type rw relatime vers rsize wsize namlen hard proto tcp port timeo retrans sec sys clientaddr local lock none addr var on var lib rancher volumes rancher nfs type rw relatime vers rsize wsize namlen hard proto tcp port timeo retrans sec sys clientaddr local lock none addr var on var lib rancher volumes rancher nfs type rw relatime vers rsize wsize namlen hard proto tcp port timeo retrans sec sys clientaddr local lock none addr root docker volume ls driver volume name local rancher agent state local rancher cni local rancher cni driver rancher nfs rancher nfs rancher nfs rancher nfs rancher nfs root
0
171,068
14,279,265,687
IssuesEvent
2020-11-23 02:14:13
tensorflow/addons
https://api.github.com/repos/tensorflow/addons
closed
Generated documentation of type aliases are included in unrelated modules
bug documentation good first issue help wanted
For example, the documentation of `TensorLike` is located in `tfa.image.color_ops`: https://www.tensorflow.org/addons/api_docs/python/tfa/image/color_ops/TensorLike Presumably, the system selects the module where the symbol was first found. This is not a big issue but it produces strange and unexpected documentation for type annotations, see for example: https://www.tensorflow.org/addons/api_docs/python/tfa/seq2seq/LuongAttention I see 2 possible solutions: 1. Hide non public symbols in the generated documentation 1. Properly export type aliases in a public module
1.0
Generated documentation of type aliases are included in unrelated modules - For example, the documentation of `TensorLike` is located in `tfa.image.color_ops`: https://www.tensorflow.org/addons/api_docs/python/tfa/image/color_ops/TensorLike Presumably, the system selects the module where the symbol was first found. This is not a big issue but it produces strange and unexpected documentation for type annotations, see for example: https://www.tensorflow.org/addons/api_docs/python/tfa/seq2seq/LuongAttention I see 2 possible solutions: 1. Hide non public symbols in the generated documentation 1. Properly export type aliases in a public module
non_priority
generated documentation of type aliases are included in unrelated modules for example the documentation of tensorlike is located in tfa image color ops presumably the system selects the module where the symbol was first found this is not a big issue but it produces strange and unexpected documentation for type annotations see for example i see possible solutions hide non public symbols in the generated documentation properly export type aliases in a public module
0
65,799
19,697,906,025
IssuesEvent
2022-01-12 14:01:35
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
Messages missing from chat, but still show in search
T-Defect X-Needs-Info P1 Z-Synapse
### Description Messages from June 16th, 2018 to November 10th, 2018 are missing from #offtopic:matrix.org. However, if I search for them, I am able to see them, so the messages are definitely still there. ### Steps to reproduce - Scroll up to the first message sent on November 10th, then look at the date of the message above it, and you'll see it is June 16fh. Then, search for a message sent between those dates (ex. search "newspaper", and you'll see some of the messages sent in September and October of 2018). ## Describe how what happens differs from what you expected. If the messages between these dates still exist, then they should show sequentially. Log: sent/not sent? Will include log if necessary, but this seems easy to reproduce. Let me know <!-- Include screenshots if possible: you can drag and drop images below. --> Gap between messages: https://imgur.com/a/UcDdJjw https://imgur.com/a/q6AL0xI Messages between these dates still shows in the search: https://imgur.com/a/eRE8t8x ### Version information - **Platform**: web - **Browser**: Firefox - **OS**: Arch Linux - **URL**: https://riot.im/app/#/room/#offtopic:matrix.org
1.0
Messages missing from chat, but still show in search - ### Description Messages from June 16th, 2018 to November 10th, 2018 are missing from #offtopic:matrix.org. However, if I search for them, I am able to see them, so the messages are definitely still there. ### Steps to reproduce - Scroll up to the first message sent on November 10th, then look at the date of the message above it, and you'll see it is June 16fh. Then, search for a message sent between those dates (ex. search "newspaper", and you'll see some of the messages sent in September and October of 2018). ## Describe how what happens differs from what you expected. If the messages between these dates still exist, then they should show sequentially. Log: sent/not sent? Will include log if necessary, but this seems easy to reproduce. Let me know <!-- Include screenshots if possible: you can drag and drop images below. --> Gap between messages: https://imgur.com/a/UcDdJjw https://imgur.com/a/q6AL0xI Messages between these dates still shows in the search: https://imgur.com/a/eRE8t8x ### Version information - **Platform**: web - **Browser**: Firefox - **OS**: Arch Linux - **URL**: https://riot.im/app/#/room/#offtopic:matrix.org
non_priority
messages missing from chat but still show in search description messages from june to november are missing from offtopic matrix org however if i search for them i am able to see them so the messages are definitely still there steps to reproduce scroll up to the first message sent on november then look at the date of the message above it and you ll see it is june then search for a message sent between those dates ex search newspaper and you ll see some of the messages sent in september and october of describe how what happens differs from what you expected if the messages between these dates still exist then they should show sequentially log sent not sent will include log if necessary but this seems easy to reproduce let me know gap between messages messages between these dates still shows in the search version information platform web browser firefox os arch linux url
0
604,159
18,677,668,891
IssuesEvent
2021-10-31 20:46:54
OpenPerpetuum/PerpetuumServer
https://api.github.com/repos/OpenPerpetuum/PerpetuumServer
opened
Research/proto boost item
Feature Difficulty: Hard Priority: Medium
A Research Boost Item is used to add a x% boost to the prototype efficiency for a particular research tree and level (columns in tree) for x period of time (just enough to kick off a handful of jobs - timer only necessary to cover the start of job, not duration as efficiency of job is stamped at kickoff). This will be DB heavy to create the item, components, CT, CT capsule etc. Please take note of how to make activatable items (like robot paints) with their attributes, and how they get wired in with category flags. This might deserve a new category! 😱 The [components] table for each item will require X kernels of X type - acting as a renewable kernel sink! (yay) Once those items are configured add a class for this new item/category that when activated: - add a buff for research/prototyping of specific entitydefaults selected by research tree and level of the item activated - Add some manager to handle the buffing, and expiration of bonus, any alerting, events, mails to the character to communicate state - On production jobs, check if the effect is on the character from the manager, and apply the bonus accordingly - on the "facility points" query (when player hovers over the facility % efficiency) optionally communicate this point value increase, if possible
1.0
Research/proto boost item - A Research Boost Item is used to add a x% boost to the prototype efficiency for a particular research tree and level (columns in tree) for x period of time (just enough to kick off a handful of jobs - timer only necessary to cover the start of job, not duration as efficiency of job is stamped at kickoff). This will be DB heavy to create the item, components, CT, CT capsule etc. Please take note of how to make activatable items (like robot paints) with their attributes, and how they get wired in with category flags. This might deserve a new category! 😱 The [components] table for each item will require X kernels of X type - acting as a renewable kernel sink! (yay) Once those items are configured add a class for this new item/category that when activated: - add a buff for research/prototyping of specific entitydefaults selected by research tree and level of the item activated - Add some manager to handle the buffing, and expiration of bonus, any alerting, events, mails to the character to communicate state - On production jobs, check if the effect is on the character from the manager, and apply the bonus accordingly - on the "facility points" query (when player hovers over the facility % efficiency) optionally communicate this point value increase, if possible
priority
research proto boost item a research boost item is used to add a x boost to the prototype efficiency for a particular research tree and level columns in tree for x period of time just enough to kick off a handful of jobs timer only necessary to cover the start of job not duration as efficiency of job is stamped at kickoff this will be db heavy to create the item components ct ct capsule etc please take note of how to make activatable items like robot paints with their attributes and how they get wired in with category flags this might deserve a new category 😱 the table for each item will require x kernels of x type acting as a renewable kernel sink yay once those items are configured add a class for this new item category that when activated add a buff for research prototyping of specific entitydefaults selected by research tree and level of the item activated add some manager to handle the buffing and expiration of bonus any alerting events mails to the character to communicate state on production jobs check if the effect is on the character from the manager and apply the bonus accordingly on the facility points query when player hovers over the facility efficiency optionally communicate this point value increase if possible
1
183,742
31,759,572,850
IssuesEvent
2023-09-12 03:16:39
btcpayserver/btcpayserver
https://api.github.com/repos/btcpayserver/btcpayserver
closed
[Bug]: The return of the `remember me` on login page
Bug good first issue Design
### What is your BTCPay version? BTCPay Server v1.11.2+1c5fcfe09 ### How did you deploy BTCPay Server? Docker ### What happened? Kukks and I noticed in Riga, that we nuked the `remember me` checkbox from the login page, which made logins challenging for us on point of sales. @dstrukt @dennisreimann I remember we used to have this ,was it intentionally removed or? Once we have clarity, someone can tackle this one, even a new contributor, it's quite trivial to add it back. ### How did you encounter this bug? 1. Go to login page ### Relevant log output _No response_ ### What browser do you use? _No response_ ### Additional information _No response_ ### Are you sure this is a bug report? - [X] I confirm this is a bug report
1.0
[Bug]: The return of the `remember me` on login page - ### What is your BTCPay version? BTCPay Server v1.11.2+1c5fcfe09 ### How did you deploy BTCPay Server? Docker ### What happened? Kukks and I noticed in Riga, that we nuked the `remember me` checkbox from the login page, which made logins challenging for us on point of sales. @dstrukt @dennisreimann I remember we used to have this ,was it intentionally removed or? Once we have clarity, someone can tackle this one, even a new contributor, it's quite trivial to add it back. ### How did you encounter this bug? 1. Go to login page ### Relevant log output _No response_ ### What browser do you use? _No response_ ### Additional information _No response_ ### Are you sure this is a bug report? - [X] I confirm this is a bug report
non_priority
the return of the remember me on login page what is your btcpay version btcpay server how did you deploy btcpay server docker what happened kukks and i noticed in riga that we nuked the remember me checkbox from the login page which made logins challenging for us on point of sales dstrukt dennisreimann i remember we used to have this was it intentionally removed or once we have clarity someone can tackle this one even a new contributor it s quite trivial to add it back how did you encounter this bug go to login page relevant log output no response what browser do you use no response additional information no response are you sure this is a bug report i confirm this is a bug report
0
560,533
16,599,140,634
IssuesEvent
2021-06-01 16:52:35
pw-software-engineering/j-team
https://api.github.com/repos/pw-software-engineering/j-team
closed
Poprawienie testów postmanowych
priority: high time: 5
1. Poprawienie kolejności testów 2. Uzupełnienie testów klienta 3. Sprawdzanie tokenu
1.0
Poprawienie testów postmanowych - 1. Poprawienie kolejności testów 2. Uzupełnienie testów klienta 3. Sprawdzanie tokenu
priority
poprawienie testów postmanowych poprawienie kolejności testów uzupełnienie testów klienta sprawdzanie tokenu
1
761,538
26,684,971,302
IssuesEvent
2023-01-26 21:03:40
GoogleCloudPlatform/golang-samples
https://api.github.com/repos/GoogleCloudPlatform/golang-samples
closed
bigquery/bigquery_migration_quickstart: TestApp failed
type: bug priority: p1 api: bigquery samples flakybot: issue
This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: 4226690ccc343022b414ac38faa39a0a3550929f buildURL: [Build Status](https://source.cloud.google.com/results/invocations/b6d1113d-ee02-4f92-a72f-9a84ba441481), [Sponge](http://sponge2/b6d1113d-ee02-4f92-a72f-9a84ba441481) status: failed <details><summary>Test output</summary><br><pre> main_test.go:47: execution failed: signal: killed main_test.go:52: Did not find expected output. Stdout: </pre></details>
1.0
bigquery/bigquery_migration_quickstart: TestApp failed - This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: 4226690ccc343022b414ac38faa39a0a3550929f buildURL: [Build Status](https://source.cloud.google.com/results/invocations/b6d1113d-ee02-4f92-a72f-9a84ba441481), [Sponge](http://sponge2/b6d1113d-ee02-4f92-a72f-9a84ba441481) status: failed <details><summary>Test output</summary><br><pre> main_test.go:47: execution failed: signal: killed main_test.go:52: Did not find expected output. Stdout: </pre></details>
priority
bigquery bigquery migration quickstart testapp failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed test output main test go execution failed signal killed main test go did not find expected output stdout
1
164,471
13,943,196,914
IssuesEvent
2020-10-22 22:31:04
open-contracting/kingfisher-collect
https://api.github.com/repos/open-contracting/kingfisher-collect
closed
Add command to report unsupported spider arguments based on docstrings
documentation framework-spiders
We now have a page to show which spider arguments are supported by which spiders (to be filled in as part of #347): https://kingfisher-scrape.readthedocs.io/en/latest/spiders.html#openopps It'd be useful to generate a report of which spider arguments are/aren't supported – either for us to plan to add support where possible, or to communicate to users where not possible. This can just be printed to standard output. We can add a module under `kingfisher_scrapy.commands`. See [scrapy/commands](https://github.com/scrapy/scrapy/tree/master/scrapy/commands) for example commands if needed. Later, we can consider adding a table of supported arguments to the top of spiders.rst (by editing `updatedocs.py`).
1.0
Add command to report unsupported spider arguments based on docstrings - We now have a page to show which spider arguments are supported by which spiders (to be filled in as part of #347): https://kingfisher-scrape.readthedocs.io/en/latest/spiders.html#openopps It'd be useful to generate a report of which spider arguments are/aren't supported – either for us to plan to add support where possible, or to communicate to users where not possible. This can just be printed to standard output. We can add a module under `kingfisher_scrapy.commands`. See [scrapy/commands](https://github.com/scrapy/scrapy/tree/master/scrapy/commands) for example commands if needed. Later, we can consider adding a table of supported arguments to the top of spiders.rst (by editing `updatedocs.py`).
non_priority
add command to report unsupported spider arguments based on docstrings we now have a page to show which spider arguments are supported by which spiders to be filled in as part of it d be useful to generate a report of which spider arguments are aren t supported – either for us to plan to add support where possible or to communicate to users where not possible this can just be printed to standard output we can add a module under kingfisher scrapy commands see for example commands if needed later we can consider adding a table of supported arguments to the top of spiders rst by editing updatedocs py
0
393,524
11,620,760,609
IssuesEvent
2020-02-27 00:38:29
h2oai/datatable
https://api.github.com/repos/h2oai/datatable
opened
Values in a string column may become NA after rbinding
High priority bug
``` import datatable as dt DT0 = dt.Frame(["2017-11-10 07:50:18" for i in range(14887665)]) DT1 = dt.rbind(*[DT0 for i in range(8)]) assert DT1[-1, "C0"] is not None # Fails ``` ``` >>> print(DT1[113025454, 0]) 2017-11-10 07:50:18 >>> print(DT1[113025455, 0]) None ``` the length of each string is 19 chars, and 113025454*19 == 2147483626 == 0x7fffffea. The string column overflows the int32 limit Attribute-To: @arnocandel
1.0
Values in a string column may become NA after rbinding - ``` import datatable as dt DT0 = dt.Frame(["2017-11-10 07:50:18" for i in range(14887665)]) DT1 = dt.rbind(*[DT0 for i in range(8)]) assert DT1[-1, "C0"] is not None # Fails ``` ``` >>> print(DT1[113025454, 0]) 2017-11-10 07:50:18 >>> print(DT1[113025455, 0]) None ``` the length of each string is 19 chars, and 113025454*19 == 2147483626 == 0x7fffffea. The string column overflows the int32 limit Attribute-To: @arnocandel
priority
values in a string column may become na after rbinding import datatable as dt dt frame dt rbind assert is not none fails print print none the length of each string is chars and the string column overflows the limit attribute to arnocandel
1
640,061
20,772,444,604
IssuesEvent
2022-03-16 06:59:54
freeboardgames/FreeBoardGames.org
https://api.github.com/repos/freeboardgames/FreeBoardGames.org
closed
Localization
help wanted high priority features
Hello everybody, I really think this project needs some localization to attract users. Is there any plan to implement this? I would gladly support you s a translator (german, little (bad) spanish).
1.0
Localization - Hello everybody, I really think this project needs some localization to attract users. Is there any plan to implement this? I would gladly support you s a translator (german, little (bad) spanish).
priority
localization hello everybody i really think this project needs some localization to attract users is there any plan to implement this i would gladly support you s a translator german little bad spanish
1
278,288
24,143,103,596
IssuesEvent
2022-09-21 16:17:39
WaunBroderick/Conduit
https://api.github.com/repos/WaunBroderick/Conduit
opened
Complete Jest Test Code Coverage on Departments Service
hacktoberfest Testing
Increase the jest code coverage on the departments service on NestJS
1.0
Complete Jest Test Code Coverage on Departments Service - Increase the jest code coverage on the departments service on NestJS
non_priority
complete jest test code coverage on departments service increase the jest code coverage on the departments service on nestjs
0
78,435
7,642,073,397
IssuesEvent
2018-05-08 08:01:05
ActivityWatch/activitywatch
https://api.github.com/repos/ActivityWatch/activitywatch
closed
Delete bucket feature
improves: testing/qa improves: ux priority: low size: medium type: enhancement
I actually want this now. It is especially when managing or moving buckets to/from a testing server. It could even be used when upgrading the database if we make the export format forwards compatible for importing. IIRC, the reason we were previously hesitant is that it has a high risk for mistakes. We could fix this by asking for a strong confirmation dialog where the id of the bucket has to be entered to confirm (like when removing repos on GitHub). That way it has an extremely low probability of being a mistake. But first we need https://github.com/ActivityWatch/activitywatch/issues/103 to be reliably implemented. We should definitely set up tests for importing exports (forward compatibility is critical). **Edit:** For now I could just use the API though. <bountysource-plugin> --- Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/48658166-delete-bucket-feature?utm_campaign=plugin&utm_content=tracker%2F35920020&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F35920020&utm_medium=issues&utm_source=github). </bountysource-plugin>
1.0
Delete bucket feature - I actually want this now. It is especially when managing or moving buckets to/from a testing server. It could even be used when upgrading the database if we make the export format forwards compatible for importing. IIRC, the reason we were previously hesitant is that it has a high risk for mistakes. We could fix this by asking for a strong confirmation dialog where the id of the bucket has to be entered to confirm (like when removing repos on GitHub). That way it has an extremely low probability of being a mistake. But first we need https://github.com/ActivityWatch/activitywatch/issues/103 to be reliably implemented. We should definitely set up tests for importing exports (forward compatibility is critical). **Edit:** For now I could just use the API though. <bountysource-plugin> --- Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/48658166-delete-bucket-feature?utm_campaign=plugin&utm_content=tracker%2F35920020&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F35920020&utm_medium=issues&utm_source=github). </bountysource-plugin>
non_priority
delete bucket feature i actually want this now it is especially when managing or moving buckets to from a testing server it could even be used when upgrading the database if we make the export format forwards compatible for importing iirc the reason we were previously hesitant is that it has a high risk for mistakes we could fix this by asking for a strong confirmation dialog where the id of the bucket has to be entered to confirm like when removing repos on github that way it has an extremely low probability of being a mistake but first we need to be reliably implemented we should definitely set up tests for importing exports forward compatibility is critical edit for now i could just use the api though want to back this issue we accept bounties via
0
182,257
14,908,596,465
IssuesEvent
2021-01-22 06:16:10
openhab/openhab-addons
https://api.github.com/repos/openhab/openhab-addons
opened
[openweathermap] - daily forecasts are now available for free acounts
documentation
OWM supports daily forecasts with it's OneCall API. So the restriction mentioned in the docs is no longer true: Attention: The daily forecast is only available for paid accounts (opens new window). Please remove this sentence. For discussion see https://community.openhab.org/t/weather-binding-and-openhab-v3-0/108353/15
1.0
[openweathermap] - daily forecasts are now available for free acounts - OWM supports daily forecasts with it's OneCall API. So the restriction mentioned in the docs is no longer true: Attention: The daily forecast is only available for paid accounts (opens new window). Please remove this sentence. For discussion see https://community.openhab.org/t/weather-binding-and-openhab-v3-0/108353/15
non_priority
daily forecasts are now available for free acounts owm supports daily forecasts with it s onecall api so the restriction mentioned in the docs is no longer true attention the daily forecast is only available for paid accounts opens new window please remove this sentence for discussion see
0
291,210
21,917,917,148
IssuesEvent
2022-05-22 05:22:22
a-little-org-called-mario/a-little-game-called-mario
https://api.github.com/repos/a-little-org-called-mario/a-little-game-called-mario
closed
Automatic screenshot update
documentation stale adopt-a-feature
It would be cool if the screenshot introduced in #183 could be automatically updated with each new build.
1.0
Automatic screenshot update - It would be cool if the screenshot introduced in #183 could be automatically updated with each new build.
non_priority
automatic screenshot update it would be cool if the screenshot introduced in could be automatically updated with each new build
0
364,384
10,763,566,989
IssuesEvent
2019-11-01 04:38:26
AY1920S1-CS2103T-F12-4/main
https://api.github.com/repos/AY1920S1-CS2103T-F12-4/main
closed
Update Ui to Expense instead of Person
priority.High type.Story
* [x] Change the PersonCard to Ui card and update the fields * [x] Change rest of references to person/addressbook
1.0
Update Ui to Expense instead of Person - * [x] Change the PersonCard to Ui card and update the fields * [x] Change rest of references to person/addressbook
priority
update ui to expense instead of person change the personcard to ui card and update the fields change rest of references to person addressbook
1
364,754
10,772,885,076
IssuesEvent
2019-11-02 17:17:49
KKPMW/vim-sendtowindow
https://api.github.com/repos/KKPMW/vim-sendtowindow
closed
An extra carriage return when sending a visual line selection
bug priority: medium
Thank you for this useful plugin! This is a minor bug, but when I select a text inside a file with `Shift+V` (visual line selection) and then send it to a right window with `<space>l`, the other window appears to receive one additional carriage return symbol. Specifically, when I am sending the text to an IPython running in a right window, I get a blank cell after the correctly sent text. Note this doesn't appear if I use a regular motion (e.g. `<space>l + $` doesn't have this problem). Edit: the problem is likely that visual line selection also copies the new line break, so maybe this is not a bug, but it might be worth it to trim/drop the last line break in a copied text that is sent to another window.
1.0
An extra carriage return when sending a visual line selection - Thank you for this useful plugin! This is a minor bug, but when I select a text inside a file with `Shift+V` (visual line selection) and then send it to a right window with `<space>l`, the other window appears to receive one additional carriage return symbol. Specifically, when I am sending the text to an IPython running in a right window, I get a blank cell after the correctly sent text. Note this doesn't appear if I use a regular motion (e.g. `<space>l + $` doesn't have this problem). Edit: the problem is likely that visual line selection also copies the new line break, so maybe this is not a bug, but it might be worth it to trim/drop the last line break in a copied text that is sent to another window.
priority
an extra carriage return when sending a visual line selection thank you for this useful plugin this is a minor bug but when i select a text inside a file with shift v visual line selection and then send it to a right window with l the other window appears to receive one additional carriage return symbol specifically when i am sending the text to an ipython running in a right window i get a blank cell after the correctly sent text note this doesn t appear if i use a regular motion e g l doesn t have this problem edit the problem is likely that visual line selection also copies the new line break so maybe this is not a bug but it might be worth it to trim drop the last line break in a copied text that is sent to another window
1
449,546
12,970,491,918
IssuesEvent
2020-07-21 09:25:01
elixir-cloud-aai/cwl-WES
https://api.github.com/repos/elixir-cloud-aai/cwl-WES
opened
Document logging to files
priority: low type: docs workload: hours
**Is your feature request related to a problem? Please describe.** Currently, app and worker logs are streamed to STDERR. While this guarantees easy access to logs by devops/administrators, logs are not persisting when the service is re-deployed. It may also be harder to find and analyze logs. **Describe the solution you'd like** Different logging handlers can be configured via `cwl_wes/config/log_config.yaml`. Document how logging to files, as well as a [basic log rotation scheme](https://docs.python.org/3/library/logging.handlers.html#baserotatinghandler) can be configured. **Describe alternatives you've considered** N/A **Additional context** For log rotations, consider how overflowing volumes can be avoided given a configured volume size for the service. This may require code changes.
1.0
Document logging to files - **Is your feature request related to a problem? Please describe.** Currently, app and worker logs are streamed to STDERR. While this guarantees easy access to logs by devops/administrators, logs are not persisting when the service is re-deployed. It may also be harder to find and analyze logs. **Describe the solution you'd like** Different logging handlers can be configured via `cwl_wes/config/log_config.yaml`. Document how logging to files, as well as a [basic log rotation scheme](https://docs.python.org/3/library/logging.handlers.html#baserotatinghandler) can be configured. **Describe alternatives you've considered** N/A **Additional context** For log rotations, consider how overflowing volumes can be avoided given a configured volume size for the service. This may require code changes.
priority
document logging to files is your feature request related to a problem please describe currently app and worker logs are streamed to stderr while this guarantees easy access to logs by devops administrators logs are not persisting when the service is re deployed it may also be harder to find and analyze logs describe the solution you d like different logging handlers can be configured via cwl wes config log config yaml document how logging to files as well as a can be configured describe alternatives you ve considered n a additional context for log rotations consider how overflowing volumes can be avoided given a configured volume size for the service this may require code changes
1
250,557
7,978,750,561
IssuesEvent
2018-07-17 19:21:29
Vhoyon/Discord-Bot
https://api.github.com/repos/Vhoyon/Discord-Bot
closed
Add a Volume setting to the settings command
Feature Request: Commands Priority: Medium settings
This field could take the form of `volume`. The field would only take numeric values between 0 and 100. This would default to `60`.
1.0
Add a Volume setting to the settings command - This field could take the form of `volume`. The field would only take numeric values between 0 and 100. This would default to `60`.
priority
add a volume setting to the settings command this field could take the form of volume the field would only take numeric values between and this would default to
1
299,548
9,205,602,770
IssuesEvent
2019-03-08 11:03:37
qissue-bot/QGIS
https://api.github.com/repos/qissue-bot/QGIS
closed
identify tool: features highlited wrong when a polygon inside a polygon is presnt
Category: Vectors Component: Affected QGIS version Component: Crashes QGIS or corrupts data Component: Easy fix? Component: Operating System Component: Pull Request or Patch supplied Component: Regression? Component: Resolution Priority: Low Project: QGIS Application Status: Closed Tracker: Bug report
--- Author Name: **Maciej Sieczka -** (Maciej Sieczka -) Original Redmine Issue: 926, https://issues.qgis.org/issues/926 Original Assignee: Tim Sutton --- Look at the attached screendumps. Black arrow points at the polygon being queried. identify_bad.png shows how it is now. This is wrong - although the smaller polygon inside is not being queried, it looks like if it was too. identify_ok.png shows how it should look like - it is clear which polygon is queried actually. --- - [identify_bad.png](https://issues.qgis.org/attachments/download/1989/identify_bad.png) (Maciej Sieczka -) - [identify_ok.png](https://issues.qgis.org/attachments/download/1990/identify_ok.png) (Maciej Sieczka -) - [Screenshot.png](https://issues.qgis.org/attachments/download/1993/Screenshot.png) (Giovanni Manghi) - [Screenshot-1.png](https://issues.qgis.org/attachments/download/1991/Screenshot-1.png) (Giovanni Manghi) - [Screenshot-2.png](https://issues.qgis.org/attachments/download/1992/Screenshot-2.png) (Giovanni Manghi)
1.0
identify tool: features highlited wrong when a polygon inside a polygon is presnt - --- Author Name: **Maciej Sieczka -** (Maciej Sieczka -) Original Redmine Issue: 926, https://issues.qgis.org/issues/926 Original Assignee: Tim Sutton --- Look at the attached screendumps. Black arrow points at the polygon being queried. identify_bad.png shows how it is now. This is wrong - although the smaller polygon inside is not being queried, it looks like if it was too. identify_ok.png shows how it should look like - it is clear which polygon is queried actually. --- - [identify_bad.png](https://issues.qgis.org/attachments/download/1989/identify_bad.png) (Maciej Sieczka -) - [identify_ok.png](https://issues.qgis.org/attachments/download/1990/identify_ok.png) (Maciej Sieczka -) - [Screenshot.png](https://issues.qgis.org/attachments/download/1993/Screenshot.png) (Giovanni Manghi) - [Screenshot-1.png](https://issues.qgis.org/attachments/download/1991/Screenshot-1.png) (Giovanni Manghi) - [Screenshot-2.png](https://issues.qgis.org/attachments/download/1992/Screenshot-2.png) (Giovanni Manghi)
priority
identify tool features highlited wrong when a polygon inside a polygon is presnt author name maciej sieczka maciej sieczka original redmine issue original assignee tim sutton look at the attached screendumps black arrow points at the polygon being queried identify bad png shows how it is now this is wrong although the smaller polygon inside is not being queried it looks like if it was too identify ok png shows how it should look like it is clear which polygon is queried actually maciej sieczka maciej sieczka giovanni manghi giovanni manghi giovanni manghi
1
234,038
7,715,145,447
IssuesEvent
2018-05-23 06:26:45
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
fjb.m.kaskus.co.id - Dropdown buttons are duplicated
Re-triaged browser-firefox-mobile priority-important
<!-- @browser: Firefox Mobile Nightly 58.0a1 (2017-11-06) --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36 --> <!-- @reported_with: web --> **URL**: https://fjb.m.kaskus.co.id/fjb/sell/?ref=header&med=quick_create **Browser / Version**: Firefox Mobile Nightly 58.0a1 (2017-11-06) **Operating System**: Samsung Galaxy S6 (Android 7.0) - 1440 x 2560 pixels (~577 ppi pixel density) **Tested Another Browser**: Yes **Problem type**: Design is broken **Description**: Dropdown buttons are duplicated **Steps to Reproduce**: Login with valid credentials. **Steps to reproduce:** 1. Navigate to: https://fjb.m.kaskus.co.id/fjb/sell/?ref=header&med=quick_create 2. Observe the dropdown buttons. **Expected Behavior:** The buttons are correctly displayed. **Actual Behavior:** Dropdown buttons are duplicated. **Notes:** 1. The issue is also reproducible on Firefox 56.0 Release (Mobile). 2. The issue is not reproducible on Chrome (Mobile) 62.0.3202.84. 3. Screenshot attached. **Watchers:** @softvision-oana-arbuzov @softvision-sergiulogigan sv; country: id [![Screenshot Description](https://webcompat.com/uploads/2017/11/81bf29a3-2f2a-414c-b879-b41099f36e41-thumb.jpeg)](https://webcompat.com/uploads/2017/11/81bf29a3-2f2a-414c-b879-b41099f36e41.jpeg) _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
fjb.m.kaskus.co.id - Dropdown buttons are duplicated - <!-- @browser: Firefox Mobile Nightly 58.0a1 (2017-11-06) --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36 --> <!-- @reported_with: web --> **URL**: https://fjb.m.kaskus.co.id/fjb/sell/?ref=header&med=quick_create **Browser / Version**: Firefox Mobile Nightly 58.0a1 (2017-11-06) **Operating System**: Samsung Galaxy S6 (Android 7.0) - 1440 x 2560 pixels (~577 ppi pixel density) **Tested Another Browser**: Yes **Problem type**: Design is broken **Description**: Dropdown buttons are duplicated **Steps to Reproduce**: Login with valid credentials. **Steps to reproduce:** 1. Navigate to: https://fjb.m.kaskus.co.id/fjb/sell/?ref=header&med=quick_create 2. Observe the dropdown buttons. **Expected Behavior:** The buttons are correctly displayed. **Actual Behavior:** Dropdown buttons are duplicated. **Notes:** 1. The issue is also reproducible on Firefox 56.0 Release (Mobile). 2. The issue is not reproducible on Chrome (Mobile) 62.0.3202.84. 3. Screenshot attached. **Watchers:** @softvision-oana-arbuzov @softvision-sergiulogigan sv; country: id [![Screenshot Description](https://webcompat.com/uploads/2017/11/81bf29a3-2f2a-414c-b879-b41099f36e41-thumb.jpeg)](https://webcompat.com/uploads/2017/11/81bf29a3-2f2a-414c-b879-b41099f36e41.jpeg) _From [webcompat.com](https://webcompat.com/) with ❤️_
priority
fjb m kaskus co id dropdown buttons are duplicated url browser version firefox mobile nightly operating system samsung galaxy android x pixels ppi pixel density tested another browser yes problem type design is broken description dropdown buttons are duplicated steps to reproduce login with valid credentials steps to reproduce navigate to observe the dropdown buttons expected behavior the buttons are correctly displayed actual behavior dropdown buttons are duplicated notes the issue is also reproducible on firefox release mobile the issue is not reproducible on chrome mobile screenshot attached watchers softvision oana arbuzov softvision sergiulogigan sv country id from with ❤️
1
427,922
12,400,881,819
IssuesEvent
2020-05-21 08:46:07
dirkwhoffmann/vAmiga
https://api.github.com/repos/dirkwhoffmann/vAmiga
closed
Test dmacon6 fails
Priority-High bug
Amiga 500 MMSE: 🥰 ![dmacon6_A500_8A](https://user-images.githubusercontent.com/12561945/81838422-6308ec80-9546-11ea-8ae5-d60462717b51.jpg) vAmiga: 🙈 <img width="1023" alt="Bildschirmfoto 2020-05-13 um 18 13 05" src="https://user-images.githubusercontent.com/12561945/81838287-37860200-9546-11ea-8510-b7b8e58a4c23.png"> Might be related to #335.
1.0
Test dmacon6 fails - Amiga 500 MMSE: 🥰 ![dmacon6_A500_8A](https://user-images.githubusercontent.com/12561945/81838422-6308ec80-9546-11ea-8ae5-d60462717b51.jpg) vAmiga: 🙈 <img width="1023" alt="Bildschirmfoto 2020-05-13 um 18 13 05" src="https://user-images.githubusercontent.com/12561945/81838287-37860200-9546-11ea-8510-b7b8e58a4c23.png"> Might be related to #335.
priority
test fails amiga mmse 🥰 vamiga 🙈 img width alt bildschirmfoto um src might be related to
1
257,278
8,135,276,277
IssuesEvent
2018-08-20 01:43:23
BigOokie/skywire-wing-commander
https://api.github.com/repos/BigOokie/skywire-wing-commander
opened
Prevent starting multiple instances
enhancement low priority
**Is your feature request related to a problem? Please describe.** Its currently possible for any number of instances of the Bot application (`wcbot`) to be run on the same machine - however there is no point and this has caused confusion with some users. **Describe the solution you'd like** The Bot (`wcbot`) should detect if another instance is already present and running on the same machine and inform the user with a helpful message. The second instance should not start.
1.0
Prevent starting multiple instances - **Is your feature request related to a problem? Please describe.** Its currently possible for any number of instances of the Bot application (`wcbot`) to be run on the same machine - however there is no point and this has caused confusion with some users. **Describe the solution you'd like** The Bot (`wcbot`) should detect if another instance is already present and running on the same machine and inform the user with a helpful message. The second instance should not start.
priority
prevent starting multiple instances is your feature request related to a problem please describe its currently possible for any number of instances of the bot application wcbot to be run on the same machine however there is no point and this has caused confusion with some users describe the solution you d like the bot wcbot should detect if another instance is already present and running on the same machine and inform the user with a helpful message the second instance should not start
1
15,397
5,112,138,155
IssuesEvent
2017-01-06 09:58:19
cherrypy/cherrypy
https://api.github.com/repos/cherrypy/cherrypy
closed
Exception in BuiltinSSLAdapter "The handshake operation timed out"
bug CherryPy code major
Originally reported by: **Anonymous** --- Using BuiltinSSLAdapter CherryPy crashes with SSLError ("_ssl.c:484: The handshake operation timed out") after some successful request when browsing with Chromium. Does not occur with Internet Explorer. CherryPy 3.2.0rc1[[BR]] Microsoft Windows [Version 6.1.7600]/32-Bit[[BR]] Chromium 10.0.605.0 (68468)[[BR]] Python 2.7.1[[BR]] OpenSSL 1.0.0c 2 Dec 2010[[BR]] Workaround:[[BR]] File: site-packages/cherrypy/wsgiserver/ssl_builtin.py[[BR]] Method: BuiltinSSLAdapter.wrap()[[BR]] append to the except-block before the raise statement: ``` #!python elif not e.errno and str(e).split(None, 1)[1] == "The handshake operation timed out": # print __name__ + ".BuiltinSSLAdapter." + BuiltinSSLAdapter.wrap.__name__ + "() " + str(type(e)) + " " + str(e) return None, {} ``` Reported by daniel@redneck-engineering.com --- - Bitbucket: https://bitbucket.org/cherrypy/cherrypy/issue/1036
1.0
Exception in BuiltinSSLAdapter "The handshake operation timed out" - Originally reported by: **Anonymous** --- Using BuiltinSSLAdapter CherryPy crashes with SSLError ("_ssl.c:484: The handshake operation timed out") after some successful request when browsing with Chromium. Does not occur with Internet Explorer. CherryPy 3.2.0rc1[[BR]] Microsoft Windows [Version 6.1.7600]/32-Bit[[BR]] Chromium 10.0.605.0 (68468)[[BR]] Python 2.7.1[[BR]] OpenSSL 1.0.0c 2 Dec 2010[[BR]] Workaround:[[BR]] File: site-packages/cherrypy/wsgiserver/ssl_builtin.py[[BR]] Method: BuiltinSSLAdapter.wrap()[[BR]] append to the except-block before the raise statement: ``` #!python elif not e.errno and str(e).split(None, 1)[1] == "The handshake operation timed out": # print __name__ + ".BuiltinSSLAdapter." + BuiltinSSLAdapter.wrap.__name__ + "() " + str(type(e)) + " " + str(e) return None, {} ``` Reported by daniel@redneck-engineering.com --- - Bitbucket: https://bitbucket.org/cherrypy/cherrypy/issue/1036
non_priority
exception in builtinssladapter the handshake operation timed out originally reported by anonymous using builtinssladapter cherrypy crashes with sslerror ssl c the handshake operation timed out after some successful request when browsing with chromium does not occur with internet explorer cherrypy microsoft windows bit chromium python openssl dec workaround file site packages cherrypy wsgiserver ssl builtin py method builtinssladapter wrap append to the except block before the raise statement python elif not e errno and str e split none the handshake operation timed out print name builtinssladapter builtinssladapter wrap name str type e str e return none reported by daniel redneck engineering com bitbucket
0
18,189
24,238,049,402
IssuesEvent
2022-09-27 02:32:41
gobuffalo/buffalo
https://api.github.com/repos/gobuffalo/buffalo
opened
milestone v1.1.0 or v1.0.1
process
Starting with #2306, stabilizing the Buffalo core library is almost done. Now time to clean up the Buffalo core library itself. The remaining issues to be (hopefully) addressed by this release are as follow: * [ ] #2306 * [ ] #1653 * [ ] #1769 * [ ] #2264 * [ ] #2287 * [ ] #2300 * [ ] #2306 * [ ] #1206
1.0
milestone v1.1.0 or v1.0.1 - Starting with #2306, stabilizing the Buffalo core library is almost done. Now time to clean up the Buffalo core library itself. The remaining issues to be (hopefully) addressed by this release are as follow: * [ ] #2306 * [ ] #1653 * [ ] #1769 * [ ] #2264 * [ ] #2287 * [ ] #2300 * [ ] #2306 * [ ] #1206
non_priority
milestone or starting with stabilizing the buffalo core library is almost done now time to clean up the buffalo core library itself the remaining issues to be hopefully addressed by this release are as follow
0
29,859
2,718,146,420
IssuesEvent
2015-04-12 00:40:14
babel/babel
https://api.github.com/repos/babel/babel
closed
crash with simple for loop at top level with `system` module formatter
bug high priority transformation
With this file `foo.js` (listed in it's entirety): ```javascript for (let a = 0; a < 10; a++) { } ``` I get the following output ``` ## babel -V 5.0.12 ## babel -m amd foo.js define(["exports"], function (exports) { "use strict"; for (var a = 0; a < 10; a++) {} }); ## babel -m system foo.js /home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/helpers/parse.js:70 throw err; ^ Error: foo.js: We don't know what to do with this node type. We were previously a Statement but we can't fit in here? at TraversalPath.insertAfter (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:184:15) at TraversalPath.replaceWithMultiple (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:322:10) at TraversalPath.replaceWith (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:337:21) at TraversalPath.call (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:444:27) at TraversalPath.visit (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:455:10) at TraversalContext.visitSingle (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/context.js:63:41) at TraversalContext.visit (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/context.js:73:19) at Function.traverse.node (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/index.js:44:17) at TraversalPath.visit (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:472:18) at TraversalContext.visitMultiple (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/context.js:50:16) ``` I tried to do a bisect, but after spending 3 hours having to skip commits because things didn't built I gave up, sorry :/ I ran into this upgrading from 4 something to 5.0.12 today, and have been banging my head on it; a workaround is putting the offending for statement into some nested scope, like an IIFE.
1.0
crash with simple for loop at top level with `system` module formatter - With this file `foo.js` (listed in it's entirety): ```javascript for (let a = 0; a < 10; a++) { } ``` I get the following output ``` ## babel -V 5.0.12 ## babel -m amd foo.js define(["exports"], function (exports) { "use strict"; for (var a = 0; a < 10; a++) {} }); ## babel -m system foo.js /home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/helpers/parse.js:70 throw err; ^ Error: foo.js: We don't know what to do with this node type. We were previously a Statement but we can't fit in here? at TraversalPath.insertAfter (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:184:15) at TraversalPath.replaceWithMultiple (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:322:10) at TraversalPath.replaceWith (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:337:21) at TraversalPath.call (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:444:27) at TraversalPath.visit (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:455:10) at TraversalContext.visitSingle (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/context.js:63:41) at TraversalContext.visit (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/context.js:73:19) at Function.traverse.node (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/index.js:44:17) at TraversalPath.visit (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/path/index.js:472:18) at TraversalContext.visitMultiple (/home/jonathan/code/babel/packages/babel-cli/node_modules/babel-core/lib/babel/traversal/context.js:50:16) ``` I tried to do a bisect, but after spending 3 hours having to skip commits because things didn't built I gave up, sorry :/ I ran into this upgrading from 4 something to 5.0.12 today, and have been banging my head on it; a workaround is putting the offending for statement into some nested scope, like an IIFE.
priority
crash with simple for loop at top level with system module formatter with this file foo js listed in it s entirety javascript for let a a a i get the following output babel v babel m amd foo js define function exports use strict for var a a a babel m system foo js home jonathan code babel packages babel cli node modules babel core lib babel helpers parse js throw err error foo js we don t know what to do with this node type we were previously a statement but we can t fit in here at traversalpath insertafter home jonathan code babel packages babel cli node modules babel core lib babel traversal path index js at traversalpath replacewithmultiple home jonathan code babel packages babel cli node modules babel core lib babel traversal path index js at traversalpath replacewith home jonathan code babel packages babel cli node modules babel core lib babel traversal path index js at traversalpath call home jonathan code babel packages babel cli node modules babel core lib babel traversal path index js at traversalpath visit home jonathan code babel packages babel cli node modules babel core lib babel traversal path index js at traversalcontext visitsingle home jonathan code babel packages babel cli node modules babel core lib babel traversal context js at traversalcontext visit home jonathan code babel packages babel cli node modules babel core lib babel traversal context js at function traverse node home jonathan code babel packages babel cli node modules babel core lib babel traversal index js at traversalpath visit home jonathan code babel packages babel cli node modules babel core lib babel traversal path index js at traversalcontext visitmultiple home jonathan code babel packages babel cli node modules babel core lib babel traversal context js i tried to do a bisect but after spending hours having to skip commits because things didn t built i gave up sorry i ran into this upgrading from something to today and have been banging my head on it a workaround is putting the offending for statement into some nested scope like an iife
1
402,997
11,833,996,775
IssuesEvent
2020-03-23 08:01:03
projectcalico/bird
https://api.github.com/repos/projectcalico/bird
closed
bird cpu single core usage is always 100%
kind/bug priority/P1
Hello, our production environment encountered this problem, if there is any way to solve it would be greatly appreciated. bird cpu single core usage is always 100% Use perf top to find that if_find_by_name function is higher using cpu ![image](https://user-images.githubusercontent.com/33449123/74443007-6f30cf80-4ead-11ea-9a82-29927ca99f2c.png) ## Expected Behavior cpu usage reduced to within normal range ![image](https://user-images.githubusercontent.com/33449123/74442845-2ed15180-4ead-11ea-9c9b-793a114995e3.png) ## Current Behavior ![image](https://user-images.githubusercontent.com/33449123/74442913-4ad4f300-4ead-11ea-80d9-dda5f18c3f8e.png) ## Possible Solution <!--- Not obligatory, but suggest a fix/reason/workaround for the bug, --> <!--- or ideas how to implement the addition or change --> ## Steps to Reproduce (for bugs) <!--- Provide a link to a live example, or an unambiguous set of steps to --> <!--- reproduce this bug. Include code to reproduce, if relevant --> 1. 2. 3. 4. ## Context <!--- How has this issue affected you? What are you trying to accomplish? --> <!--- Providing context helps us come up with a solution that is most useful in the real world --> ## Your Environment <!--- Include as many relevant details about the environment you experienced the bug in --> * bird version: BIRD version v0.3.3+birdv1.6.3 * Operating System and version: CentOS Linux release 7.6.1810 (Core) Linux vlnx010003.foneshare.cn 3.10.0-957.27.2.el7.x86_64 #1 SMP Mon Jul 29 17:46:05 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux * Link to your project (optional):
1.0
bird cpu single core usage is always 100% - Hello, our production environment encountered this problem, if there is any way to solve it would be greatly appreciated. bird cpu single core usage is always 100% Use perf top to find that if_find_by_name function is higher using cpu ![image](https://user-images.githubusercontent.com/33449123/74443007-6f30cf80-4ead-11ea-9a82-29927ca99f2c.png) ## Expected Behavior cpu usage reduced to within normal range ![image](https://user-images.githubusercontent.com/33449123/74442845-2ed15180-4ead-11ea-9c9b-793a114995e3.png) ## Current Behavior ![image](https://user-images.githubusercontent.com/33449123/74442913-4ad4f300-4ead-11ea-80d9-dda5f18c3f8e.png) ## Possible Solution <!--- Not obligatory, but suggest a fix/reason/workaround for the bug, --> <!--- or ideas how to implement the addition or change --> ## Steps to Reproduce (for bugs) <!--- Provide a link to a live example, or an unambiguous set of steps to --> <!--- reproduce this bug. Include code to reproduce, if relevant --> 1. 2. 3. 4. ## Context <!--- How has this issue affected you? What are you trying to accomplish? --> <!--- Providing context helps us come up with a solution that is most useful in the real world --> ## Your Environment <!--- Include as many relevant details about the environment you experienced the bug in --> * bird version: BIRD version v0.3.3+birdv1.6.3 * Operating System and version: CentOS Linux release 7.6.1810 (Core) Linux vlnx010003.foneshare.cn 3.10.0-957.27.2.el7.x86_64 #1 SMP Mon Jul 29 17:46:05 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux * Link to your project (optional):
priority
bird cpu single core usage is always hello our production environment encountered this problem if there is any way to solve it would be greatly appreciated bird cpu single core usage is always use perf top to find that if find by name function is higher using cpu expected behavior cpu usage reduced to within normal range current behavior possible solution steps to reproduce for bugs context your environment bird version bird version operating system and version centos linux release core linux foneshare cn smp mon jul utc gnu linux link to your project optional
1
232,265
7,656,890,549
IssuesEvent
2018-05-10 17:48:35
kcgrimes/grimes-simple-revive
https://api.github.com/repos/kcgrimes/grimes-simple-revive
closed
Unit Tags gets very laggy with many units
Priority: High Status: Completed Type: Bug
Because Unit Tags, particularly when operating on key press, operates through allUnits, it become very laggy when used with high numbers (> 50 units). The key down response is delayed by multiple seconds, and there may even be negative impact on the mission itself.
1.0
Unit Tags gets very laggy with many units - Because Unit Tags, particularly when operating on key press, operates through allUnits, it become very laggy when used with high numbers (> 50 units). The key down response is delayed by multiple seconds, and there may even be negative impact on the mission itself.
priority
unit tags gets very laggy with many units because unit tags particularly when operating on key press operates through allunits it become very laggy when used with high numbers units the key down response is delayed by multiple seconds and there may even be negative impact on the mission itself
1
41,888
6,952,686,638
IssuesEvent
2017-12-06 18:18:36
JuliaReach/LazySets.jl
https://api.github.com/repos/JuliaReach/LazySets.jl
closed
Allow example doctests
documentation
as suggested [here](https://github.com/JuliaReach/LazySets.jl/issues/14#issuecomment-348289126), we can turn our examples into proper doctests. with [Documenter.jl](https://juliadocs.github.io/Documenter.jl/), this boils down to using [jldoctest](https://juliadocs.github.io/Documenter.jl/stable/man/doctests/#Doctests-1) in triple backticks for each example. i don't know if we need to have the line `using LazySets` in each code block.
1.0
Allow example doctests - as suggested [here](https://github.com/JuliaReach/LazySets.jl/issues/14#issuecomment-348289126), we can turn our examples into proper doctests. with [Documenter.jl](https://juliadocs.github.io/Documenter.jl/), this boils down to using [jldoctest](https://juliadocs.github.io/Documenter.jl/stable/man/doctests/#Doctests-1) in triple backticks for each example. i don't know if we need to have the line `using LazySets` in each code block.
non_priority
allow example doctests as suggested we can turn our examples into proper doctests with this boils down to using in triple backticks for each example i don t know if we need to have the line using lazysets in each code block
0
212,925
7,244,131,130
IssuesEvent
2018-02-14 14:14:10
kubernetes/kubernetes
https://api.github.com/repos/kubernetes/kubernetes
closed
[Feature] IP Subnets for Nodes
kind/feature lifecycle/rotten priority/important-soon sig/network team/cluster (deprecated - do not use)
[Girish - Need a good description/writeup for this feature] Provide a new mode of Pod CIDR allocation for nodes instead of the current discovery mechanism.
1.0
[Feature] IP Subnets for Nodes - [Girish - Need a good description/writeup for this feature] Provide a new mode of Pod CIDR allocation for nodes instead of the current discovery mechanism.
priority
ip subnets for nodes provide a new mode of pod cidr allocation for nodes instead of the current discovery mechanism
1
383,209
11,352,472,305
IssuesEvent
2020-01-24 13:43:21
ntop/ntopng
https://api.github.com/repos/ntop/ntopng
closed
Alert... How can I find all the hosts with a modified thresholds?
alerts enhancement low-priority bug
In the last days I modified the Alert thresholds for 15/16 internal IPs. Now I should set the SYN flood threshold for all these IPs to another value but: -) I don't remember which IPs I modified and in which interfaces -) I don't remember which threshold values I set for each IP So... What do you think to add a global page with the list of all modified IPs ad all the set thresholds? This would be useful to easily manage this kind of settings. Thanks! Bye bye... PS: I'm using ntopng version "3.8.190118 - Professional Edition"
1.0
Alert... How can I find all the hosts with a modified thresholds? - In the last days I modified the Alert thresholds for 15/16 internal IPs. Now I should set the SYN flood threshold for all these IPs to another value but: -) I don't remember which IPs I modified and in which interfaces -) I don't remember which threshold values I set for each IP So... What do you think to add a global page with the list of all modified IPs ad all the set thresholds? This would be useful to easily manage this kind of settings. Thanks! Bye bye... PS: I'm using ntopng version "3.8.190118 - Professional Edition"
priority
alert how can i find all the hosts with a modified thresholds in the last days i modified the alert thresholds for internal ips now i should set the syn flood threshold for all these ips to another value but i don t remember which ips i modified and in which interfaces i don t remember which threshold values i set for each ip so what do you think to add a global page with the list of all modified ips ad all the set thresholds this would be useful to easily manage this kind of settings thanks bye bye ps i m using ntopng version professional edition
1
762,300
26,714,180,274
IssuesEvent
2023-01-28 09:13:17
o3de/o3de
https://api.github.com/repos/o3de/o3de
opened
m_applyMoveOnPhysicsTick is not accessible through character controller component
feature/physics kind/bug needs-triage priority/major sig/simulation
m_applyMoveOnPhysicsTick can only be accessed at edit time and should be exposed at runtime as well.
1.0
m_applyMoveOnPhysicsTick is not accessible through character controller component - m_applyMoveOnPhysicsTick can only be accessed at edit time and should be exposed at runtime as well.
priority
m applymoveonphysicstick is not accessible through character controller component m applymoveonphysicstick can only be accessed at edit time and should be exposed at runtime as well
1
268,752
23,393,080,411
IssuesEvent
2022-08-11 19:54:18
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
closed
Add E2E test for "In the Spotlight box" and links on the VAMC system page
frontend vsa Facilities testing frontend-vamc stretch-goal vamc-pages
## Issue description We need to add end to end tests to check for required content appearing on VAMC pages. This issue to check for the presence of "In the Spotlight box" and links on the VAMC system page ## Task Add test to confirm the presence of - "In the Spotlight box" on the VAMC system page - Expected links, such as - Get help from a patient advocate - Medical records office - Phone directory - Compare our performance with non-VA health facilities - Billing and insurance - Become a volunteer - Annual reports and newsletters - Coronavirus Updates ## Acceptance criteria - Tests to confirm the presence of the "In the Spotlight" box and expected required links
1.0
Add E2E test for "In the Spotlight box" and links on the VAMC system page - ## Issue description We need to add end to end tests to check for required content appearing on VAMC pages. This issue to check for the presence of "In the Spotlight box" and links on the VAMC system page ## Task Add test to confirm the presence of - "In the Spotlight box" on the VAMC system page - Expected links, such as - Get help from a patient advocate - Medical records office - Phone directory - Compare our performance with non-VA health facilities - Billing and insurance - Become a volunteer - Annual reports and newsletters - Coronavirus Updates ## Acceptance criteria - Tests to confirm the presence of the "In the Spotlight" box and expected required links
non_priority
add test for in the spotlight box and links on the vamc system page issue description we need to add end to end tests to check for required content appearing on vamc pages this issue to check for the presence of in the spotlight box and links on the vamc system page task add test to confirm the presence of in the spotlight box on the vamc system page expected links such as get help from a patient advocate medical records office phone directory compare our performance with non va health facilities billing and insurance become a volunteer annual reports and newsletters coronavirus updates acceptance criteria tests to confirm the presence of the in the spotlight box and expected required links
0
119,856
25,594,749,714
IssuesEvent
2022-12-01 15:25:09
CleverRaven/Cataclysm-DDA
https://api.github.com/repos/CleverRaven/Cataclysm-DDA
closed
Allow each different save files to choose different default tilesets for themselves (or default to the global default tileset).
<Enhancement / Feature> <Suggestion / Discussion> SDL: Tiles / Sound Character / World Generation stale Code: Debug
# Is your feature request related to a problem? Please describe. Cataclysm is a game that can offer drastically different experiences in tone and game-feel depending on what kind of mod you chose to enable. For example, a basic, DDA-only game will differ a lot from an Aftershock enabled one, a Magiclysm one, a No Hope one, or a Dark Days of the Dead one. Sometimes I want to switch from one game with a particular tone to another with a vastly different tone, but the game won't switch to the right tileset by itself so I'd have to manually navigate the GFX menu and do the switch myself, which personally ruins the experience for me. # Describe the solution you'd like In the world creation menu, there could be an option to choose your preferred tileset that would only apply to the world that you are currently making, so that when you switch between save files, it would automatically load that tileset for you, instead of using only one default tileset. The game should of course give you the option to default to whatever tileset that the game is using as the global default. # Describe alternatives you've considered # Additional context
1.0
Allow each different save files to choose different default tilesets for themselves (or default to the global default tileset). - # Is your feature request related to a problem? Please describe. Cataclysm is a game that can offer drastically different experiences in tone and game-feel depending on what kind of mod you chose to enable. For example, a basic, DDA-only game will differ a lot from an Aftershock enabled one, a Magiclysm one, a No Hope one, or a Dark Days of the Dead one. Sometimes I want to switch from one game with a particular tone to another with a vastly different tone, but the game won't switch to the right tileset by itself so I'd have to manually navigate the GFX menu and do the switch myself, which personally ruins the experience for me. # Describe the solution you'd like In the world creation menu, there could be an option to choose your preferred tileset that would only apply to the world that you are currently making, so that when you switch between save files, it would automatically load that tileset for you, instead of using only one default tileset. The game should of course give you the option to default to whatever tileset that the game is using as the global default. # Describe alternatives you've considered # Additional context
non_priority
allow each different save files to choose different default tilesets for themselves or default to the global default tileset is your feature request related to a problem please describe cataclysm is a game that can offer drastically different experiences in tone and game feel depending on what kind of mod you chose to enable for example a basic dda only game will differ a lot from an aftershock enabled one a magiclysm one a no hope one or a dark days of the dead one sometimes i want to switch from one game with a particular tone to another with a vastly different tone but the game won t switch to the right tileset by itself so i d have to manually navigate the gfx menu and do the switch myself which personally ruins the experience for me describe the solution you d like in the world creation menu there could be an option to choose your preferred tileset that would only apply to the world that you are currently making so that when you switch between save files it would automatically load that tileset for you instead of using only one default tileset the game should of course give you the option to default to whatever tileset that the game is using as the global default describe alternatives you ve considered additional context
0
35,150
12,311,807,775
IssuesEvent
2020-05-12 13:01:40
vondenstein/gitblast.com
https://api.github.com/repos/vondenstein/gitblast.com
opened
CVE-2020-7608 (High) detected in yargs-parser-5.0.0.tgz, yargs-parser-11.1.1.tgz
security vulnerability
## CVE-2020-7608 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>yargs-parser-5.0.0.tgz</b>, <b>yargs-parser-11.1.1.tgz</b></p></summary> <p> <details><summary><b>yargs-parser-5.0.0.tgz</b></p></summary> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-5.0.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-5.0.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/gitblast.com/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/gitblast.com/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - node-sass-4.13.1.tgz (Root Library) - sass-graph-2.2.4.tgz - yargs-7.1.0.tgz - :x: **yargs-parser-5.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>yargs-parser-11.1.1.tgz</b></p></summary> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-11.1.1.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-11.1.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/gitblast.com/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/gitblast.com/node_modules/webpack-dev-server/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.1.tgz (Root Library) - webpack-dev-server-3.10.3.tgz - yargs-12.0.5.tgz - :x: **yargs-parser-11.1.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/vondenstein/gitblast.com/commit/a314df2b364e12b151867e918afdf0c57b137f43">a314df2b364e12b151867e918afdf0c57b137f43</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload. <p>Publish Date: 2020-03-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7608>CVE-2020-7608</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608</a></p> <p>Release Date: 2020-03-16</p> <p>Fix Resolution: v18.1.1;13.1.2;15.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7608 (High) detected in yargs-parser-5.0.0.tgz, yargs-parser-11.1.1.tgz - ## CVE-2020-7608 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>yargs-parser-5.0.0.tgz</b>, <b>yargs-parser-11.1.1.tgz</b></p></summary> <p> <details><summary><b>yargs-parser-5.0.0.tgz</b></p></summary> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-5.0.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-5.0.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/gitblast.com/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/gitblast.com/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - node-sass-4.13.1.tgz (Root Library) - sass-graph-2.2.4.tgz - yargs-7.1.0.tgz - :x: **yargs-parser-5.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>yargs-parser-11.1.1.tgz</b></p></summary> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-11.1.1.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-11.1.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/gitblast.com/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/gitblast.com/node_modules/webpack-dev-server/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.1.tgz (Root Library) - webpack-dev-server-3.10.3.tgz - yargs-12.0.5.tgz - :x: **yargs-parser-11.1.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/vondenstein/gitblast.com/commit/a314df2b364e12b151867e918afdf0c57b137f43">a314df2b364e12b151867e918afdf0c57b137f43</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload. <p>Publish Date: 2020-03-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7608>CVE-2020-7608</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608</a></p> <p>Release Date: 2020-03-16</p> <p>Fix Resolution: v18.1.1;13.1.2;15.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in yargs parser tgz yargs parser tgz cve high severity vulnerability vulnerable libraries yargs parser tgz yargs parser tgz yargs parser tgz the mighty option parser used by yargs library home page a href path to dependency file tmp ws scm gitblast com package json path to vulnerable library tmp ws scm gitblast com node modules yargs parser package json dependency hierarchy node sass tgz root library sass graph tgz yargs tgz x yargs parser tgz vulnerable library yargs parser tgz the mighty option parser used by yargs library home page a href path to dependency file tmp ws scm gitblast com package json path to vulnerable library tmp ws scm gitblast com node modules webpack dev server node modules yargs parser package json dependency hierarchy react scripts tgz root library webpack dev server tgz yargs tgz x yargs parser tgz vulnerable library found in head commit a href vulnerability details yargs parser could be tricked into adding or modifying properties of object prototype using a proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
269,494
20,384,276,060
IssuesEvent
2022-02-22 04:03:42
nartc/angular-three
https://api.github.com/repos/nartc/angular-three
closed
[Feature] add wakeup event to physics props
documentation
Using sleepTimeLimit is helpful to limit the number of collision events after an object has stopped moving. [cannon.js sleep example](https://github.com/pmndrs/cannon-es/blob/master/examples/sleep.html) If the object is hit again, the wakeup event is fired. Please add the wakeup event to physics props ```javascript // The body wakes up when it gets a new contact sphereBody.addEventListener('wakeup', (event) => { console.log('The sphere woke up!') }) ```
1.0
[Feature] add wakeup event to physics props - Using sleepTimeLimit is helpful to limit the number of collision events after an object has stopped moving. [cannon.js sleep example](https://github.com/pmndrs/cannon-es/blob/master/examples/sleep.html) If the object is hit again, the wakeup event is fired. Please add the wakeup event to physics props ```javascript // The body wakes up when it gets a new contact sphereBody.addEventListener('wakeup', (event) => { console.log('The sphere woke up!') }) ```
non_priority
add wakeup event to physics props using sleeptimelimit is helpful to limit the number of collision events after an object has stopped moving if the object is hit again the wakeup event is fired please add the wakeup event to physics props javascript the body wakes up when it gets a new contact spherebody addeventlistener wakeup event console log the sphere woke up
0
83,056
23,955,990,216
IssuesEvent
2022-09-12 15:00:08
finos/legend-studio
https://api.github.com/repos/finos/legend-studio
closed
Feature request: Support `workflows` in query builders
Type: Feature Request Studio Core Team Component: Query Builder
Query builder might be used in different workflows right now: - Data browsing mode: the current query builder where the query is expected to be of shape `SomeClass.all()...` - Advanced/Unsupported mode: the query can be of any form As such, we come up with this idea to add a new feature to the query builder - `workflows`. Think of Adobe Photoshop [workspace](https://helpx.adobe.com/photoshop/using/workspace-basics.html) feature: you can pick the flow that works best for you - `Illustration`, `Photography`, etc. ### Implementation Plan - [ ] Add new feature: `Workflow` - [ ] `Workflow` bundles plugins together and there should be a generic check for when `workflow` is applicable and instruction on what happens when switching between `workflows` - [ ] Add the workflows as mentioned in the previous section - [ ] Workflow can also take a config to show/hide elements: hide result panel, etc.
1.0
Feature request: Support `workflows` in query builders - Query builder might be used in different workflows right now: - Data browsing mode: the current query builder where the query is expected to be of shape `SomeClass.all()...` - Advanced/Unsupported mode: the query can be of any form As such, we come up with this idea to add a new feature to the query builder - `workflows`. Think of Adobe Photoshop [workspace](https://helpx.adobe.com/photoshop/using/workspace-basics.html) feature: you can pick the flow that works best for you - `Illustration`, `Photography`, etc. ### Implementation Plan - [ ] Add new feature: `Workflow` - [ ] `Workflow` bundles plugins together and there should be a generic check for when `workflow` is applicable and instruction on what happens when switching between `workflows` - [ ] Add the workflows as mentioned in the previous section - [ ] Workflow can also take a config to show/hide elements: hide result panel, etc.
non_priority
feature request support workflows in query builders query builder might be used in different workflows right now data browsing mode the current query builder where the query is expected to be of shape someclass all advanced unsupported mode the query can be of any form as such we come up with this idea to add a new feature to the query builder workflows think of adobe photoshop feature you can pick the flow that works best for you illustration photography etc implementation plan add new feature workflow workflow bundles plugins together and there should be a generic check for when workflow is applicable and instruction on what happens when switching between workflows add the workflows as mentioned in the previous section workflow can also take a config to show hide elements hide result panel etc
0
200,578
7,009,265,705
IssuesEvent
2017-12-19 18:29:40
larshp/abapGit
https://api.github.com/repos/larshp/abapGit
closed
Improve usability of repository popup
low priority new feature
When we try to clone a repository and an error occurs, e.g. invalid url or non existing package, the popup is closed and then the error is displayed. ![image](https://user-images.githubusercontent.com/17437789/32020623-1a7c47bc-b9d1-11e7-816e-22c6b2bb9fe2.png) ![image](https://user-images.githubusercontent.com/17437789/32020624-1b6f92dc-b9d1-11e7-9af8-5b608e2ee09b.png) Then the user has to redo his actions and refill values. I think it would a good idea to keep the popup open respectively the popup is displayed again with populated values.
1.0
Improve usability of repository popup - When we try to clone a repository and an error occurs, e.g. invalid url or non existing package, the popup is closed and then the error is displayed. ![image](https://user-images.githubusercontent.com/17437789/32020623-1a7c47bc-b9d1-11e7-816e-22c6b2bb9fe2.png) ![image](https://user-images.githubusercontent.com/17437789/32020624-1b6f92dc-b9d1-11e7-9af8-5b608e2ee09b.png) Then the user has to redo his actions and refill values. I think it would a good idea to keep the popup open respectively the popup is displayed again with populated values.
priority
improve usability of repository popup when we try to clone a repository and an error occurs e g invalid url or non existing package the popup is closed and then the error is displayed then the user has to redo his actions and refill values i think it would a good idea to keep the popup open respectively the popup is displayed again with populated values
1
221,112
17,291,463,881
IssuesEvent
2021-07-24 21:06:11
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
[HTTP/3] Loopback server should handle graceful shutdown properly
area-System.Net.Http in pr test bug
Currently, the HTTP3 loopback server used in tests is sending a GOAWAY frame but never closing the connection. This seems to lead to occasional races with the client in tests that issue multiple requests with the server closing the connection between requests. Some cookie tests are an example of this. To function correctly per the RFC and to prevent these races, the HTTP3 loopback server needs to do the following: (1) Send GOAWAY (it's doing this already) (2) Accept any incoming streams and abort them with the H3_REQUEST_REJECTED (3) When the client closes the connection, the AcceptStream operation from (2) will return null, indicating the connection has been closed. At this point the server can close its connection. See https://quicwg.org/base-drafts/draft-ietf-quic-http.html#name-connection-shutdown Note: I'm not sure the client is handling graceful shutdown properly itself; we may need to fix this as well in order to get this all to work.
1.0
[HTTP/3] Loopback server should handle graceful shutdown properly - Currently, the HTTP3 loopback server used in tests is sending a GOAWAY frame but never closing the connection. This seems to lead to occasional races with the client in tests that issue multiple requests with the server closing the connection between requests. Some cookie tests are an example of this. To function correctly per the RFC and to prevent these races, the HTTP3 loopback server needs to do the following: (1) Send GOAWAY (it's doing this already) (2) Accept any incoming streams and abort them with the H3_REQUEST_REJECTED (3) When the client closes the connection, the AcceptStream operation from (2) will return null, indicating the connection has been closed. At this point the server can close its connection. See https://quicwg.org/base-drafts/draft-ietf-quic-http.html#name-connection-shutdown Note: I'm not sure the client is handling graceful shutdown properly itself; we may need to fix this as well in order to get this all to work.
non_priority
loopback server should handle graceful shutdown properly currently the loopback server used in tests is sending a goaway frame but never closing the connection this seems to lead to occasional races with the client in tests that issue multiple requests with the server closing the connection between requests some cookie tests are an example of this to function correctly per the rfc and to prevent these races the loopback server needs to do the following send goaway it s doing this already accept any incoming streams and abort them with the request rejected when the client closes the connection the acceptstream operation from will return null indicating the connection has been closed at this point the server can close its connection see note i m not sure the client is handling graceful shutdown properly itself we may need to fix this as well in order to get this all to work
0
542,714
15,865,388,001
IssuesEvent
2021-04-08 14:41:53
AY2021S2-CS2103-T16-1/tp
https://api.github.com/repos/AY2021S2-CS2103-T16-1/tp
closed
[PE-D] Incorrect Display Result when using "blist" after "find"
priority.high response.Accepted type.FunctionalityBug
For example, search for contacts with tag "colleagues" ![Screenshot 2021-04-03 at 2.54.38 PM.png](https://raw.githubusercontent.com/Sharptail/ped/main/files/3649f56c-6833-4d8f-b046-63ba8ae0cfbe.png) then input "blist 2", - The correct person "Roy Balakrishnan" will be blacklisted however the display message shows "removed" instead of "added" to black list - And the person "Bernice Yu" shown in the display message is the wrong person which should be "Roy Balakrishnan" instead ![Screenshot 2021-04-03 at 2.55.15 PM.png](https://raw.githubusercontent.com/Sharptail/ped/main/files/30307317-938f-4415-8002-4c1672affdea.png) <!--session: 1617429670489-d54b87d8-4630-4bc7-9228-4b53845b8668--> ------------- Labels: `severity.High` `type.FunctionalityBug` original: Sharptail/ped#9
1.0
[PE-D] Incorrect Display Result when using "blist" after "find" - For example, search for contacts with tag "colleagues" ![Screenshot 2021-04-03 at 2.54.38 PM.png](https://raw.githubusercontent.com/Sharptail/ped/main/files/3649f56c-6833-4d8f-b046-63ba8ae0cfbe.png) then input "blist 2", - The correct person "Roy Balakrishnan" will be blacklisted however the display message shows "removed" instead of "added" to black list - And the person "Bernice Yu" shown in the display message is the wrong person which should be "Roy Balakrishnan" instead ![Screenshot 2021-04-03 at 2.55.15 PM.png](https://raw.githubusercontent.com/Sharptail/ped/main/files/30307317-938f-4415-8002-4c1672affdea.png) <!--session: 1617429670489-d54b87d8-4630-4bc7-9228-4b53845b8668--> ------------- Labels: `severity.High` `type.FunctionalityBug` original: Sharptail/ped#9
priority
incorrect display result when using blist after find for example search for contacts with tag colleagues then input blist the correct person roy balakrishnan will be blacklisted however the display message shows removed instead of added to black list and the person bernice yu shown in the display message is the wrong person which should be roy balakrishnan instead labels severity high type functionalitybug original sharptail ped
1
149,017
5,705,644,941
IssuesEvent
2017-04-18 09:05:37
minishift/minishift
https://api.github.com/repos/minishift/minishift
closed
Hostfolder configuration should not save the password in clear text
component/hostfolder kind/bug priority/critical
minishift hostfolder saves the password in clear text. So anyone who will get the access of the workstation can view the file and can get read the password ``` $ cat ~/.minishift/config/allinstances.json { "HostFolders": [ { "Name": "share", "Type": "cifs", "Options": { "domain": "test", "mountpoint": "", "password": "sample-password", "uncpath": "/Users/lmohanty/", "username": "lmohanty" } } ] ```
1.0
Hostfolder configuration should not save the password in clear text - minishift hostfolder saves the password in clear text. So anyone who will get the access of the workstation can view the file and can get read the password ``` $ cat ~/.minishift/config/allinstances.json { "HostFolders": [ { "Name": "share", "Type": "cifs", "Options": { "domain": "test", "mountpoint": "", "password": "sample-password", "uncpath": "/Users/lmohanty/", "username": "lmohanty" } } ] ```
priority
hostfolder configuration should not save the password in clear text minishift hostfolder saves the password in clear text so anyone who will get the access of the workstation can view the file and can get read the password cat minishift config allinstances json hostfolders name share type cifs options domain test mountpoint password sample password uncpath users lmohanty username lmohanty
1
396,890
27,140,078,537
IssuesEvent
2023-02-16 15:46:10
extratone/gpt
https://api.github.com/repos/extratone/gpt
opened
Chatbot Prayers Okay?
documentation
![ChatGPT-2023-02-16T15-43-03](https://user-images.githubusercontent.com/43663476/219416228-e4afd82a-aa6b-4339-8767-bfcc609d146f.png) You: According to the literature of protestant christianity - taking both the Old and New Testaments in account - would it be a sin against God if I chose to engage chatgpt to write my nightly prayers to God instead of thinking of them myself? ChatGPT: In the literature of Protestant Christianity, there is no clear directive regarding the use of technology or external sources in prayer. However, prayer is generally understood as a personal and intimate communication between the individual and God, so it is important to approach it with a genuine and sincere heart. While using ChatGPT to write your nightly prayers may save you time and effort, it is important to consider the intention behind the act. If you are simply using it as a tool to help you express your thoughts and feelings to God, then it may be considered acceptable. However, if you are relying on it as a substitute for your own personal engagement with God, then it may be seen as a way of avoiding true communication with God and may be viewed as insincere or even disrespectful. In summary, there is no clear directive in the literature of Protestant Christianity regarding the use of technology or external sources in prayer, but the sincerity and genuineness of one's communication with God are important factors to consider. You: I want to use ChatGPT to condense my before-bed prayer to God tonight. What is the first step? ChatGPT: The first step to using ChatGPT to condense your before-bed prayer to God would be to clearly identify the most important elements and themes of your prayer. Here are some steps you could take: 1. Begin by reflecting on the main areas of your life that you want to bring to God in prayer. This could include expressing gratitude for blessings, seeking guidance or forgiveness, and offering prayers for others. 2. Once you have identified the key themes, try to distill them down to their essence. Focus on the main ideas and feelings that you want to convey in your prayer. 3. Write down a few short phrases or sentences that capture the essence of your prayer. Keep in mind that brevity is key when using ChatGPT, so aim for concise and clear expressions. 4. Use these short phrases or sentences to craft a condensed version of your prayer. Be open to different phrasings and let ChatGPT generate suggestions based on the input you give. 5. Review and revise the condensed prayer as needed until it accurately captures the key themes and feelings you want to convey to God. Remember, using ChatGPT to help with your prayer is just a tool to help you communicate with God. It's important to approach your prayer with sincerity, and to be mindful of the content and the intention behind your words. You: Is there currently an integration for ChatGPT that would allow me to send the result directly to God? ChatGPT: As an AI language model, ChatGPT does not have the capability to directly communicate with God or any divine entity. While ChatGPT can assist you in generating a condensed version of your prayer, it is ultimately up to you to communicate your prayer to God through your own personal beliefs and practices. In many religions, prayer is understood as a direct communication with God that requires a personal and sincere approach. While using ChatGPT to help with your prayer can be a useful tool, it is important to remember that the act of prayer is ultimately a personal and individual experience that requires a genuine and sincere intention. Therefore, while ChatGPT can assist you in generating a condensed version of your prayer, you would need to communicate it to God through your own personal prayer practice. This might involve speaking the prayer out loud, writing it down, or reflecting on it silently in your heart.
1.0
Chatbot Prayers Okay? - ![ChatGPT-2023-02-16T15-43-03](https://user-images.githubusercontent.com/43663476/219416228-e4afd82a-aa6b-4339-8767-bfcc609d146f.png) You: According to the literature of protestant christianity - taking both the Old and New Testaments in account - would it be a sin against God if I chose to engage chatgpt to write my nightly prayers to God instead of thinking of them myself? ChatGPT: In the literature of Protestant Christianity, there is no clear directive regarding the use of technology or external sources in prayer. However, prayer is generally understood as a personal and intimate communication between the individual and God, so it is important to approach it with a genuine and sincere heart. While using ChatGPT to write your nightly prayers may save you time and effort, it is important to consider the intention behind the act. If you are simply using it as a tool to help you express your thoughts and feelings to God, then it may be considered acceptable. However, if you are relying on it as a substitute for your own personal engagement with God, then it may be seen as a way of avoiding true communication with God and may be viewed as insincere or even disrespectful. In summary, there is no clear directive in the literature of Protestant Christianity regarding the use of technology or external sources in prayer, but the sincerity and genuineness of one's communication with God are important factors to consider. You: I want to use ChatGPT to condense my before-bed prayer to God tonight. What is the first step? ChatGPT: The first step to using ChatGPT to condense your before-bed prayer to God would be to clearly identify the most important elements and themes of your prayer. Here are some steps you could take: 1. Begin by reflecting on the main areas of your life that you want to bring to God in prayer. This could include expressing gratitude for blessings, seeking guidance or forgiveness, and offering prayers for others. 2. Once you have identified the key themes, try to distill them down to their essence. Focus on the main ideas and feelings that you want to convey in your prayer. 3. Write down a few short phrases or sentences that capture the essence of your prayer. Keep in mind that brevity is key when using ChatGPT, so aim for concise and clear expressions. 4. Use these short phrases or sentences to craft a condensed version of your prayer. Be open to different phrasings and let ChatGPT generate suggestions based on the input you give. 5. Review and revise the condensed prayer as needed until it accurately captures the key themes and feelings you want to convey to God. Remember, using ChatGPT to help with your prayer is just a tool to help you communicate with God. It's important to approach your prayer with sincerity, and to be mindful of the content and the intention behind your words. You: Is there currently an integration for ChatGPT that would allow me to send the result directly to God? ChatGPT: As an AI language model, ChatGPT does not have the capability to directly communicate with God or any divine entity. While ChatGPT can assist you in generating a condensed version of your prayer, it is ultimately up to you to communicate your prayer to God through your own personal beliefs and practices. In many religions, prayer is understood as a direct communication with God that requires a personal and sincere approach. While using ChatGPT to help with your prayer can be a useful tool, it is important to remember that the act of prayer is ultimately a personal and individual experience that requires a genuine and sincere intention. Therefore, while ChatGPT can assist you in generating a condensed version of your prayer, you would need to communicate it to God through your own personal prayer practice. This might involve speaking the prayer out loud, writing it down, or reflecting on it silently in your heart.
non_priority
chatbot prayers okay you according to the literature of protestant christianity taking both the old and new testaments in account would it be a sin against god if i chose to engage chatgpt to write my nightly prayers to god instead of thinking of them myself chatgpt in the literature of protestant christianity there is no clear directive regarding the use of technology or external sources in prayer however prayer is generally understood as a personal and intimate communication between the individual and god so it is important to approach it with a genuine and sincere heart while using chatgpt to write your nightly prayers may save you time and effort it is important to consider the intention behind the act if you are simply using it as a tool to help you express your thoughts and feelings to god then it may be considered acceptable however if you are relying on it as a substitute for your own personal engagement with god then it may be seen as a way of avoiding true communication with god and may be viewed as insincere or even disrespectful in summary there is no clear directive in the literature of protestant christianity regarding the use of technology or external sources in prayer but the sincerity and genuineness of one s communication with god are important factors to consider you i want to use chatgpt to condense my before bed prayer to god tonight what is the first step chatgpt the first step to using chatgpt to condense your before bed prayer to god would be to clearly identify the most important elements and themes of your prayer here are some steps you could take begin by reflecting on the main areas of your life that you want to bring to god in prayer this could include expressing gratitude for blessings seeking guidance or forgiveness and offering prayers for others once you have identified the key themes try to distill them down to their essence focus on the main ideas and feelings that you want to convey in your prayer write down a few short phrases or sentences that capture the essence of your prayer keep in mind that brevity is key when using chatgpt so aim for concise and clear expressions use these short phrases or sentences to craft a condensed version of your prayer be open to different phrasings and let chatgpt generate suggestions based on the input you give review and revise the condensed prayer as needed until it accurately captures the key themes and feelings you want to convey to god remember using chatgpt to help with your prayer is just a tool to help you communicate with god it s important to approach your prayer with sincerity and to be mindful of the content and the intention behind your words you is there currently an integration for chatgpt that would allow me to send the result directly to god chatgpt as an ai language model chatgpt does not have the capability to directly communicate with god or any divine entity while chatgpt can assist you in generating a condensed version of your prayer it is ultimately up to you to communicate your prayer to god through your own personal beliefs and practices in many religions prayer is understood as a direct communication with god that requires a personal and sincere approach while using chatgpt to help with your prayer can be a useful tool it is important to remember that the act of prayer is ultimately a personal and individual experience that requires a genuine and sincere intention therefore while chatgpt can assist you in generating a condensed version of your prayer you would need to communicate it to god through your own personal prayer practice this might involve speaking the prayer out loud writing it down or reflecting on it silently in your heart
0
227,869
25,127,538,572
IssuesEvent
2022-11-09 12:55:20
NirShaharabani/verdaccio
https://api.github.com/repos/NirShaharabani/verdaccio
opened
@verdaccio/e2e-cli-npm7-1.0.1-6-next.5.tgz: 2 vulnerabilities (highest severity is: 9.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>@verdaccio/e2e-cli-npm7-1.0.1-6-next.5.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/NirShaharabani/verdaccio/commit/6580df98f62d821bca93d2b0acd528447eafe22b">6580df98f62d821bca93d2b0acd528447eafe22b</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (@verdaccio/e2e-cli-npm7 version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-43616](https://www.mend.io/vulnerability-database/CVE-2021-43616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | npm-7.24.2.tgz | Transitive | N/A* | &#10060; | | [CVE-2022-29244](https://www.mend.io/vulnerability-database/CVE-2022-29244) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | npm-7.24.2.tgz | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-43616</summary> ### Vulnerable Library - <b>npm-7.24.2.tgz</b></p> <p>a package manager for JavaScript</p> <p>Library home page: <a href="https://registry.npmjs.org/npm/-/npm-7.24.2.tgz">https://registry.npmjs.org/npm/-/npm-7.24.2.tgz</a></p> <p> Dependency Hierarchy: - @verdaccio/e2e-cli-npm7-1.0.1-6-next.5.tgz (Root Library) - :x: **npm-7.24.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NirShaharabani/verdaccio/commit/6580df98f62d821bca93d2b0acd528447eafe22b">6580df98f62d821bca93d2b0acd528447eafe22b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> ** DISPUTED ** The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. NOTE: The npm team believes this is not a vulnerability. It would require someone to socially engineer package.json which has different dependencies than package-lock.json. That user would have to have file system or write access to change dependencies. The npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm CLI. <p>Publish Date: 2021-11-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-43616>CVE-2021-43616</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43616">https://nvd.nist.gov/vuln/detail/CVE-2021-43616</a></p> <p>Release Date: 2021-11-13</p> <p>Fix Resolution: npm - 8.1.4</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-29244</summary> ### Vulnerable Library - <b>npm-7.24.2.tgz</b></p> <p>a package manager for JavaScript</p> <p>Library home page: <a href="https://registry.npmjs.org/npm/-/npm-7.24.2.tgz">https://registry.npmjs.org/npm/-/npm-7.24.2.tgz</a></p> <p> Dependency Hierarchy: - @verdaccio/e2e-cli-npm7-1.0.1-6-next.5.tgz (Root Library) - :x: **npm-7.24.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NirShaharabani/verdaccio/commit/6580df98f62d821bca93d2b0acd528447eafe22b">6580df98f62d821bca93d2b0acd528447eafe22b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm. <p>Publish Date: 2022-06-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-29244>CVE-2022-29244</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-hj9c-8jmm-8c52">https://github.com/advisories/GHSA-hj9c-8jmm-8c52</a></p> <p>Release Date: 2022-06-13</p> <p>Fix Resolution: npm - 8.11.0</p> </p> <p></p> </details>
True
@verdaccio/e2e-cli-npm7-1.0.1-6-next.5.tgz: 2 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>@verdaccio/e2e-cli-npm7-1.0.1-6-next.5.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/NirShaharabani/verdaccio/commit/6580df98f62d821bca93d2b0acd528447eafe22b">6580df98f62d821bca93d2b0acd528447eafe22b</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (@verdaccio/e2e-cli-npm7 version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-43616](https://www.mend.io/vulnerability-database/CVE-2021-43616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | npm-7.24.2.tgz | Transitive | N/A* | &#10060; | | [CVE-2022-29244](https://www.mend.io/vulnerability-database/CVE-2022-29244) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | npm-7.24.2.tgz | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-43616</summary> ### Vulnerable Library - <b>npm-7.24.2.tgz</b></p> <p>a package manager for JavaScript</p> <p>Library home page: <a href="https://registry.npmjs.org/npm/-/npm-7.24.2.tgz">https://registry.npmjs.org/npm/-/npm-7.24.2.tgz</a></p> <p> Dependency Hierarchy: - @verdaccio/e2e-cli-npm7-1.0.1-6-next.5.tgz (Root Library) - :x: **npm-7.24.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NirShaharabani/verdaccio/commit/6580df98f62d821bca93d2b0acd528447eafe22b">6580df98f62d821bca93d2b0acd528447eafe22b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> ** DISPUTED ** The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. NOTE: The npm team believes this is not a vulnerability. It would require someone to socially engineer package.json which has different dependencies than package-lock.json. That user would have to have file system or write access to change dependencies. The npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm CLI. <p>Publish Date: 2021-11-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-43616>CVE-2021-43616</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43616">https://nvd.nist.gov/vuln/detail/CVE-2021-43616</a></p> <p>Release Date: 2021-11-13</p> <p>Fix Resolution: npm - 8.1.4</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-29244</summary> ### Vulnerable Library - <b>npm-7.24.2.tgz</b></p> <p>a package manager for JavaScript</p> <p>Library home page: <a href="https://registry.npmjs.org/npm/-/npm-7.24.2.tgz">https://registry.npmjs.org/npm/-/npm-7.24.2.tgz</a></p> <p> Dependency Hierarchy: - @verdaccio/e2e-cli-npm7-1.0.1-6-next.5.tgz (Root Library) - :x: **npm-7.24.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NirShaharabani/verdaccio/commit/6580df98f62d821bca93d2b0acd528447eafe22b">6580df98f62d821bca93d2b0acd528447eafe22b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm. <p>Publish Date: 2022-06-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-29244>CVE-2022-29244</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-hj9c-8jmm-8c52">https://github.com/advisories/GHSA-hj9c-8jmm-8c52</a></p> <p>Release Date: 2022-06-13</p> <p>Fix Resolution: npm - 8.11.0</p> </p> <p></p> </details>
non_priority
verdaccio cli next tgz vulnerabilities highest severity is vulnerable library verdaccio cli next tgz path to dependency file package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in verdaccio cli version remediation available high npm tgz transitive n a high npm tgz transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the section details below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library npm tgz a package manager for javascript library home page a href dependency hierarchy verdaccio cli next tgz root library x npm tgz vulnerable library found in head commit a href found in base branch master vulnerability details disputed the npm ci command in npm x and x through proceeds with an installation even if dependency information in package lock json differs from package json this behavior is inconsistent with the documentation and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package lock json note the npm team believes this is not a vulnerability it would require someone to socially engineer package json which has different dependencies than package lock json that user would have to have file system or write access to change dependencies the npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm cli publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution npm cve vulnerable library npm tgz a package manager for javascript library home page a href dependency hierarchy verdaccio cli next tgz root library x npm tgz vulnerable library found in head commit a href found in base branch master vulnerability details npm pack ignores root level gitignore and npmignore file exclusion directives when run in a workspace or with a workspace flag ie workspaces workspace anyone who has run npm pack or npm publish inside a workspace as of and respectively may be affected and have published files into the npm registry they did not intend to include users should upgrade to the latest patched version of npm run npm i g npm latest node js versions and include the patched version of npm publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution npm
0
627,627
19,910,662,928
IssuesEvent
2022-01-25 16:50:47
twanda/vertical-agriculture
https://api.github.com/repos/twanda/vertical-agriculture
opened
Incoming Products (Receipts): Unable to register farmer deliveries in mobile view
bug 2nd Priority
In mobile view (p.e. on a tablet) it is not possible to register or edit farmer deliveries. ![IMG_80007A3398FC-1](https://user-images.githubusercontent.com/90847414/151021675-7a7c62cf-d817-47be-8856-1db9a9245c30.jpeg)
1.0
Incoming Products (Receipts): Unable to register farmer deliveries in mobile view - In mobile view (p.e. on a tablet) it is not possible to register or edit farmer deliveries. ![IMG_80007A3398FC-1](https://user-images.githubusercontent.com/90847414/151021675-7a7c62cf-d817-47be-8856-1db9a9245c30.jpeg)
priority
incoming products receipts unable to register farmer deliveries in mobile view in mobile view p e on a tablet it is not possible to register or edit farmer deliveries
1
480,122
13,823,615,010
IssuesEvent
2020-10-13 07:17:11
wso2/product-apim
https://api.github.com/repos/wso2/product-apim
closed
Add support for 3.0.x OpenAPI definitions in API publisher.
Priority/Normal Type/Bug
### Description: Currently in 2.2.0 publisher we only support version 3.0.0 OpenAPI definitions. However we should add improved support for 3.0x versions because they can only contain minor fixes and not major changes in the spec. ### Steps to reproduce: Import an OpenAPI 3.0.1 API definition. UI will show an error saying the OpenAPI version is not supported. ### Affected Product Version: APIM 2.2.0 ### Environment details (with versions): - OS: - Client: - Env (Docker/K8s): --- ### Optional Fields #### Related Issues: <!-- Any related issues from this/other repositories--> #### Suggested Labels: <!--Only to be used by non-members--> #### Suggested Assignees: <!--Only to be used by non-members-->
1.0
Add support for 3.0.x OpenAPI definitions in API publisher. - ### Description: Currently in 2.2.0 publisher we only support version 3.0.0 OpenAPI definitions. However we should add improved support for 3.0x versions because they can only contain minor fixes and not major changes in the spec. ### Steps to reproduce: Import an OpenAPI 3.0.1 API definition. UI will show an error saying the OpenAPI version is not supported. ### Affected Product Version: APIM 2.2.0 ### Environment details (with versions): - OS: - Client: - Env (Docker/K8s): --- ### Optional Fields #### Related Issues: <!-- Any related issues from this/other repositories--> #### Suggested Labels: <!--Only to be used by non-members--> #### Suggested Assignees: <!--Only to be used by non-members-->
priority
add support for x openapi definitions in api publisher description currently in publisher we only support version openapi definitions however we should add improved support for versions because they can only contain minor fixes and not major changes in the spec steps to reproduce import an openapi api definition ui will show an error saying the openapi version is not supported affected product version apim environment details with versions os client env docker optional fields related issues suggested labels suggested assignees
1
515,561
14,965,285,007
IssuesEvent
2021-01-27 13:11:10
windowsboy111/merlin-py
https://api.github.com/repos/windowsboy111/merlin-py
closed
[BUG/ISSUE] Broken /poll check
bug cog: Utilities help wanted priority: High
**Describe the bug** `/poll check` is problematic. Sometimes it shows message id on the title, sometimes the whole command fails. **Screenshots** ![image](https://user-images.githubusercontent.com/48051237/93033707-fcb5e700-f669-11ea-9648-c7a06e9574ea.png) **Desktop (please complete the following information):** - discord.py 1.4 - linux - python 3.8 - merlin build 2008.210 ~ 2009.012 (latest)
1.0
[BUG/ISSUE] Broken /poll check - **Describe the bug** `/poll check` is problematic. Sometimes it shows message id on the title, sometimes the whole command fails. **Screenshots** ![image](https://user-images.githubusercontent.com/48051237/93033707-fcb5e700-f669-11ea-9648-c7a06e9574ea.png) **Desktop (please complete the following information):** - discord.py 1.4 - linux - python 3.8 - merlin build 2008.210 ~ 2009.012 (latest)
priority
broken poll check describe the bug poll check is problematic sometimes it shows message id on the title sometimes the whole command fails screenshots desktop please complete the following information discord py linux python merlin build latest
1
58,128
16,343,181,856
IssuesEvent
2021-05-13 02:07:13
Questie/Questie
https://api.github.com/repos/Questie/Questie
opened
Missing Dungs & Zones
Type - Defect
We are missing the following Dungs for https://github.com/Questie/Questie/blob/master/Database/Zones/zoneTables.lua Old Hillsbrad Foothills The Black Morass Stratholme Past Hyjal Summit Also missing Zone 2300 = caverns-of-time <!-- READ THIS FIRST Hello, thanks for taking the time to report a bug! Before you proceed, please verify that you're running the latest version of Questie. The easiest way to do this is via the Twitch client, but you can also download the latest version here: https://www.curseforge.com/wow/addons/questie Questie is one of the most popular Classic WoW addons, with over 22M downloads. However, like almost all WoW addons, it's built and maintained by a team of volunteers. The current Questie team is: * @AeroScripts / Aero#1357 (Discord) * @BreakBB / TheCrux#1702 (Discord) * @drejjmit / Drejjmit#8241 (Discord) * @Dyaxler / Dyaxler#0086 (Discord) * @gogo1951 / Gogo#0298 (Discord) If you'd like to help, please consider making a donation. You can do so here: https://www.paypal.com/cgi-bin/webscr?cmd=_donations&business=aero1861%40gmail%2ecom&lc=CA&item_name=Questie%20Devs&currency_code=USD&bn=PP%2dDonationsBF%3abtn_donate_LG%2egif%3aNonHosted You can also help as a tester, developer or translator, please join the Questie Discord here https://discord.gg/fYcQfv7 --> ## Bug description <!-- Explain in detail what the bug is and how you encountered it. If possible explain how it can be reproduced. --> ## Screenshots <!-- If you can, add a screenshot to help explaining the bug. Simply drag and drop the image in this input field, no need to upload it to any other image platform. --> ## Questie version <!-- Which version of Questie are you using? You can find it by: - 1. Hovering over the Questie Minimap Icon - 2. looking at your Questie.toc file (open it with any text editor). It looks something like this: "v5.9.0" or "## Version: 5.9.0". -->
1.0
Missing Dungs & Zones - We are missing the following Dungs for https://github.com/Questie/Questie/blob/master/Database/Zones/zoneTables.lua Old Hillsbrad Foothills The Black Morass Stratholme Past Hyjal Summit Also missing Zone 2300 = caverns-of-time <!-- READ THIS FIRST Hello, thanks for taking the time to report a bug! Before you proceed, please verify that you're running the latest version of Questie. The easiest way to do this is via the Twitch client, but you can also download the latest version here: https://www.curseforge.com/wow/addons/questie Questie is one of the most popular Classic WoW addons, with over 22M downloads. However, like almost all WoW addons, it's built and maintained by a team of volunteers. The current Questie team is: * @AeroScripts / Aero#1357 (Discord) * @BreakBB / TheCrux#1702 (Discord) * @drejjmit / Drejjmit#8241 (Discord) * @Dyaxler / Dyaxler#0086 (Discord) * @gogo1951 / Gogo#0298 (Discord) If you'd like to help, please consider making a donation. You can do so here: https://www.paypal.com/cgi-bin/webscr?cmd=_donations&business=aero1861%40gmail%2ecom&lc=CA&item_name=Questie%20Devs&currency_code=USD&bn=PP%2dDonationsBF%3abtn_donate_LG%2egif%3aNonHosted You can also help as a tester, developer or translator, please join the Questie Discord here https://discord.gg/fYcQfv7 --> ## Bug description <!-- Explain in detail what the bug is and how you encountered it. If possible explain how it can be reproduced. --> ## Screenshots <!-- If you can, add a screenshot to help explaining the bug. Simply drag and drop the image in this input field, no need to upload it to any other image platform. --> ## Questie version <!-- Which version of Questie are you using? You can find it by: - 1. Hovering over the Questie Minimap Icon - 2. looking at your Questie.toc file (open it with any text editor). It looks something like this: "v5.9.0" or "## Version: 5.9.0". -->
non_priority
missing dungs zones we are missing the following dungs for old hillsbrad foothills the black morass stratholme past hyjal summit also missing zone caverns of time read this first hello thanks for taking the time to report a bug before you proceed please verify that you re running the latest version of questie the easiest way to do this is via the twitch client but you can also download the latest version here questie is one of the most popular classic wow addons with over downloads however like almost all wow addons it s built and maintained by a team of volunteers the current questie team is aeroscripts aero discord breakbb thecrux discord drejjmit drejjmit discord dyaxler dyaxler discord gogo discord if you d like to help please consider making a donation you can do so here you can also help as a tester developer or translator please join the questie discord here bug description screenshots questie version which version of questie are you using you can find it by hovering over the questie minimap icon looking at your questie toc file open it with any text editor it looks something like this or version
0
569,613
17,015,527,421
IssuesEvent
2021-07-02 11:27:16
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
opened
Cyclemap should render surface=cobblestone
Component: opencyclemap Priority: major Type: enhancement
**[Submitted to the original trac issue database at 6.59am, Wednesday, 4th May 2011]** Cobblestone surfaces are huge inconvenience for cyclist, and should be rendered on cycle map.
1.0
Cyclemap should render surface=cobblestone - **[Submitted to the original trac issue database at 6.59am, Wednesday, 4th May 2011]** Cobblestone surfaces are huge inconvenience for cyclist, and should be rendered on cycle map.
priority
cyclemap should render surface cobblestone cobblestone surfaces are huge inconvenience for cyclist and should be rendered on cycle map
1