Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
1k
labels
stringlengths
4
1.38k
body
stringlengths
1
262k
index
stringclasses
16 values
text_combine
stringlengths
96
262k
label
stringclasses
2 values
text
stringlengths
96
252k
binary_label
int64
0
1
171,306
6,486,167,570
IssuesEvent
2017-08-19 17:11:20
SacredDuckwhale/TotalAP
https://api.github.com/repos/SacredDuckwhale/TotalAP
opened
Support for the Underlight Angler (fishing artifact)
module:controllers module:core module:gui priority:normal status:confirmed type:feature
I haven't had time to get it done yet, but the foundation to implementing this easily has been laid with the new GUI and DB interface. It's not the highest priority task, and obtaining the artifact and testing the feature will take up more time than adding it. See [CF#3](https://wow.curseforge.com/projects/totalap/issues/3) for details.
1.0
Support for the Underlight Angler (fishing artifact) - I haven't had time to get it done yet, but the foundation to implementing this easily has been laid with the new GUI and DB interface. It's not the highest priority task, and obtaining the artifact and testing the feature will take up more time than adding it. See [CF#3](https://wow.curseforge.com/projects/totalap/issues/3) for details.
priority
support for the underlight angler fishing artifact i haven t had time to get it done yet but the foundation to implementing this easily has been laid with the new gui and db interface it s not the highest priority task and obtaining the artifact and testing the feature will take up more time than adding it see for details
1
23,783
2,663,381,266
IssuesEvent
2015-03-20 04:42:18
AtlasOfLivingAustralia/layers-service
https://api.github.com/repos/AtlasOfLivingAustralia/layers-service
reopened
Load Layer: Important Bird Areas (IBAs) - Australia
priority-high type-enhancement
The Important Bird (and Biodiversity) Areas (see http://www.birdlife.org.au/projects/important-bird-areas/iba-maps) are internationally recognised and IUCN-supported area of significane for bird species. They are in addition to CAPAD areas. Criteria for IBAs (metadata): http://www.birdlife.org/datazone/info/ibacritglob International data: http://www.birdlife.org/datazone/geomap.php?r=i&bbox=-150%20-50%20150%2080 but can't see how to get GIS data. No counterparts to deprecate.
1.0
Load Layer: Important Bird Areas (IBAs) - Australia - The Important Bird (and Biodiversity) Areas (see http://www.birdlife.org.au/projects/important-bird-areas/iba-maps) are internationally recognised and IUCN-supported area of significane for bird species. They are in addition to CAPAD areas. Criteria for IBAs (metadata): http://www.birdlife.org/datazone/info/ibacritglob International data: http://www.birdlife.org/datazone/geomap.php?r=i&bbox=-150%20-50%20150%2080 but can't see how to get GIS data. No counterparts to deprecate.
priority
load layer important bird areas ibas australia the important bird and biodiversity areas see are internationally recognised and iucn supported area of significane for bird species they are in addition to capad areas criteria for ibas metadata international data but can t see how to get gis data no counterparts to deprecate
1
321,668
9,807,181,877
IssuesEvent
2019-06-12 13:11:41
founders-programme-2/business-launchpad
https://api.github.com/repos/founders-programme-2/business-launchpad
opened
Sign up: client-side
T1d priority-2
relates to #53 - create front end react form - name - email - password - send state to backend
1.0
Sign up: client-side - relates to #53 - create front end react form - name - email - password - send state to backend
priority
sign up client side relates to create front end react form name email password send state to backend
1
43,076
12,965,181,214
IssuesEvent
2020-07-20 21:50:41
jtimberlake/griffin
https://api.github.com/repos/jtimberlake/griffin
opened
CVE-2018-19839 (Medium) detected in node-sass-4.14.1.tgz, CSS::Sass-v3.6.0
security vulnerability
## CVE-2018-19839 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.14.1.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/griffin/ui/angular/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/griffin/ui/angular/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - cli-1.3.0.tgz (Root Library) - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jtimberlake/griffin/commit/7b8d4cb53c4eab239eecb18da5b2a6048b2fce60">7b8d4cb53c4eab239eecb18da5b2a6048b2fce60</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass prior to 3.5.5, the function handle_error in sass_context.cpp allows attackers to cause a denial-of-service resulting from a heap-based buffer over-read via a crafted sass file. <p>Publish Date: 2018-12-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19839>CVE-2018-19839</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19839">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19839</a></p> <p>Release Date: 2018-12-04</p> <p>Fix Resolution: Libsass:3.6.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-sass","packageVersion":"4.14.1","isTransitiveDependency":true,"dependencyTree":"@angular/cli:1.3.0;node-sass:4.14.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"Libsass:3.6.0"}],"vulnerabilityIdentifier":"CVE-2018-19839","vulnerabilityDetails":"In LibSass prior to 3.5.5, the function handle_error in sass_context.cpp allows attackers to cause a denial-of-service resulting from a heap-based buffer over-read via a crafted sass file.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19839","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2018-19839 (Medium) detected in node-sass-4.14.1.tgz, CSS::Sass-v3.6.0 - ## CVE-2018-19839 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.14.1.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/griffin/ui/angular/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/griffin/ui/angular/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - cli-1.3.0.tgz (Root Library) - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jtimberlake/griffin/commit/7b8d4cb53c4eab239eecb18da5b2a6048b2fce60">7b8d4cb53c4eab239eecb18da5b2a6048b2fce60</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass prior to 3.5.5, the function handle_error in sass_context.cpp allows attackers to cause a denial-of-service resulting from a heap-based buffer over-read via a crafted sass file. <p>Publish Date: 2018-12-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19839>CVE-2018-19839</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19839">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19839</a></p> <p>Release Date: 2018-12-04</p> <p>Fix Resolution: Libsass:3.6.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-sass","packageVersion":"4.14.1","isTransitiveDependency":true,"dependencyTree":"@angular/cli:1.3.0;node-sass:4.14.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"Libsass:3.6.0"}],"vulnerabilityIdentifier":"CVE-2018-19839","vulnerabilityDetails":"In LibSass prior to 3.5.5, the function handle_error in sass_context.cpp allows attackers to cause a denial-of-service resulting from a heap-based buffer over-read via a crafted sass file.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19839","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in node sass tgz css sass cve medium severity vulnerability vulnerable libraries node sass tgz node sass tgz wrapper around libsass library home page a href path to dependency file tmp ws scm griffin ui angular package json path to vulnerable library tmp ws scm griffin ui angular node modules node sass package json dependency hierarchy cli tgz root library x node sass tgz vulnerable library found in head commit a href vulnerability details in libsass prior to the function handle error in sass context cpp allows attackers to cause a denial of service resulting from a heap based buffer over read via a crafted sass file publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails in libsass prior to the function handle error in sass context cpp allows attackers to cause a denial of service resulting from a heap based buffer over read via a crafted sass file vulnerabilityurl
0
678,959
23,217,347,754
IssuesEvent
2022-08-02 15:03:52
deckhouse/deckhouse
https://api.github.com/repos/deckhouse/deckhouse
closed
[metallb] BGP-based LoadBalancer IPs response only to legitimate IP:port requests
area/network status/rotten priority/backlog
### Preflight Checklist - [X] I agree to follow the [Code of Conduct](https://github.com/deckhouse/deckhouse/blob/main/CODE_OF_CONDUCT.md) that this project adheres to. - [X] I have searched the [issue tracker](https://github.com/deckhouse/deckhouse/issues) for an issue that matches the one I want to file, without success. ### Version v1.28 ### Expected Behavior There should be clear errors when trying to connect the wrong port of LoadBalancer or when trying to ping it: ``` $ telnet 10.40.0.168 2345 Trying 10.40.0.168... telnet: Unable to connect to remote host: Connection refused ``` ``` $ ping 10.40.0.168 -c 1 PING 10.40.0.168 (10.40.0.168) 56(84) bytes of data. From 10.40.0.168 icmp_seq=1 Destination Port Unreachable --- 10.40.0.168 ping statistics --- 1 packets transmitted, 0 received, +1 errors, 100% packet loss, time 0ms ``` Solution proposal: * add speaker sidecar with a daemon which adds REJECT rules to every subnet or IP range in `metallb.addressPools`. * if the #470 issue will be solved by adding the terminating REJECT rule, this issue will be solved automatically. ### Actual Behavior The LB IPs don't respond at all (of the default FORWARD policy is DROP): ``` $ telnet 10.40.0.168 2345 Trying 10.40.0.168... ``` ``` $ ping 10.40.0.168 -c 1 -w 1 PING 10.40.0.168 (10.40.0.168) 56(84) bytes of data. --- 10.40.0.168 ping statistics --- 1 packets transmitted, 0 received, 100% packet loss, time 0ms ``` ### Steps To Reproduce _No response_ ### Additional Information _No response_ ### Logs _No response_
1.0
[metallb] BGP-based LoadBalancer IPs response only to legitimate IP:port requests - ### Preflight Checklist - [X] I agree to follow the [Code of Conduct](https://github.com/deckhouse/deckhouse/blob/main/CODE_OF_CONDUCT.md) that this project adheres to. - [X] I have searched the [issue tracker](https://github.com/deckhouse/deckhouse/issues) for an issue that matches the one I want to file, without success. ### Version v1.28 ### Expected Behavior There should be clear errors when trying to connect the wrong port of LoadBalancer or when trying to ping it: ``` $ telnet 10.40.0.168 2345 Trying 10.40.0.168... telnet: Unable to connect to remote host: Connection refused ``` ``` $ ping 10.40.0.168 -c 1 PING 10.40.0.168 (10.40.0.168) 56(84) bytes of data. From 10.40.0.168 icmp_seq=1 Destination Port Unreachable --- 10.40.0.168 ping statistics --- 1 packets transmitted, 0 received, +1 errors, 100% packet loss, time 0ms ``` Solution proposal: * add speaker sidecar with a daemon which adds REJECT rules to every subnet or IP range in `metallb.addressPools`. * if the #470 issue will be solved by adding the terminating REJECT rule, this issue will be solved automatically. ### Actual Behavior The LB IPs don't respond at all (of the default FORWARD policy is DROP): ``` $ telnet 10.40.0.168 2345 Trying 10.40.0.168... ``` ``` $ ping 10.40.0.168 -c 1 -w 1 PING 10.40.0.168 (10.40.0.168) 56(84) bytes of data. --- 10.40.0.168 ping statistics --- 1 packets transmitted, 0 received, 100% packet loss, time 0ms ``` ### Steps To Reproduce _No response_ ### Additional Information _No response_ ### Logs _No response_
priority
bgp based loadbalancer ips response only to legitimate ip port requests preflight checklist i agree to follow the that this project adheres to i have searched the for an issue that matches the one i want to file without success version expected behavior there should be clear errors when trying to connect the wrong port of loadbalancer or when trying to ping it telnet trying telnet unable to connect to remote host connection refused ping c ping bytes of data from icmp seq destination port unreachable ping statistics packets transmitted received errors packet loss time solution proposal add speaker sidecar with a daemon which adds reject rules to every subnet or ip range in metallb addresspools if the issue will be solved by adding the terminating reject rule this issue will be solved automatically actual behavior the lb ips don t respond at all of the default forward policy is drop telnet trying ping c w ping bytes of data ping statistics packets transmitted received packet loss time steps to reproduce no response additional information no response logs no response
1
4,242
7,187,127,872
IssuesEvent
2018-02-02 03:06:28
Great-Hill-Corporation/quickBlocks
https://api.github.com/repos/Great-Hill-Corporation/quickBlocks
closed
trace optimizations
monitors-all status-inprocess type-enhancement
If a trace has more than 50? 100? traces, then store the traces on the hard drive. 99% of the time needed to process a block with a big trace is taken by the node returning the traces and the javascript code parsing the JSON. Add a field to the transaction structure called 'tracesOnDisk' which instructs the monitor to read the traces from disc and then only load them if we're doing --deep
1.0
trace optimizations - If a trace has more than 50? 100? traces, then store the traces on the hard drive. 99% of the time needed to process a block with a big trace is taken by the node returning the traces and the javascript code parsing the JSON. Add a field to the transaction structure called 'tracesOnDisk' which instructs the monitor to read the traces from disc and then only load them if we're doing --deep
non_priority
trace optimizations if a trace has more than traces then store the traces on the hard drive of the time needed to process a block with a big trace is taken by the node returning the traces and the javascript code parsing the json add a field to the transaction structure called tracesondisk which instructs the monitor to read the traces from disc and then only load them if we re doing deep
0
122,951
4,847,474,159
IssuesEvent
2016-11-10 15:03:35
CSC-IT-Center-for-Science/iow-ui
https://api.github.com/repos/CSC-IT-Center-for-Science/iow-ui
closed
E2E tests with protractor
epic frontend High priority
# Sections - [x] Frontpage - [x] Add model - [x] Edit model - [x] Model vocabularies - [x] Model reference data - [x] Model links - [x] Model namespaces - [x] Remove model - [x] Add class (by concept, reference, external) - [x] Add predicate (by concept, reference, external) - [x] Edit class - [x] Add property (by concept, existing predicate, external) - [x] Edit property - [x] Property predicate view - [x] Edit predicate - [x] Remove class - [x] Remove predicate - [x] Remove property - [ ] Concept editor ! wont fix before termeditor is in use
1.0
E2E tests with protractor - # Sections - [x] Frontpage - [x] Add model - [x] Edit model - [x] Model vocabularies - [x] Model reference data - [x] Model links - [x] Model namespaces - [x] Remove model - [x] Add class (by concept, reference, external) - [x] Add predicate (by concept, reference, external) - [x] Edit class - [x] Add property (by concept, existing predicate, external) - [x] Edit property - [x] Property predicate view - [x] Edit predicate - [x] Remove class - [x] Remove predicate - [x] Remove property - [ ] Concept editor ! wont fix before termeditor is in use
priority
tests with protractor sections frontpage add model edit model model vocabularies model reference data model links model namespaces remove model add class by concept reference external add predicate by concept reference external edit class add property by concept existing predicate external edit property property predicate view edit predicate remove class remove predicate remove property concept editor wont fix before termeditor is in use
1
2,394
2,725,873,674
IssuesEvent
2015-04-15 05:37:13
adobe/brackets
https://api.github.com/repos/adobe/brackets
closed
Code folding markers broken after deleting selection across collapsed section
F Code Folding fix in progress high priority
1. Start with this JS code: ``` define(function () { var foo; function one() { foo = 1; } function two() { foo = 2; } function three() { foo = 3; } }); ``` 1. Collapse "two" 2. Select from the start of the `function` keyword in "two", to the start of the `function` keyword in "three" 3. Press delete * Result: folding triangle for "one" now shows it's collapsed, even though function "one" is _not_ collapsed 4. Click the folding triangle for "one" repeatedly * Result: nothing happens; triangle is nonresponsive 5. Undo * Result: triangle for "one" still show's it's collapsed. Triangle for "two" shows it's _not_ collapsed even though it _is_ 6. Click triangle for "two" repeatedly * Result nothing happens on first click, but on 2nd click it starts working correctly 7. Click triangle for "one" repeatedly * Result: it still does nothing
1.0
Code folding markers broken after deleting selection across collapsed section - 1. Start with this JS code: ``` define(function () { var foo; function one() { foo = 1; } function two() { foo = 2; } function three() { foo = 3; } }); ``` 1. Collapse "two" 2. Select from the start of the `function` keyword in "two", to the start of the `function` keyword in "three" 3. Press delete * Result: folding triangle for "one" now shows it's collapsed, even though function "one" is _not_ collapsed 4. Click the folding triangle for "one" repeatedly * Result: nothing happens; triangle is nonresponsive 5. Undo * Result: triangle for "one" still show's it's collapsed. Triangle for "two" shows it's _not_ collapsed even though it _is_ 6. Click triangle for "two" repeatedly * Result nothing happens on first click, but on 2nd click it starts working correctly 7. Click triangle for "one" repeatedly * Result: it still does nothing
non_priority
code folding markers broken after deleting selection across collapsed section start with this js code define function var foo function one foo function two foo function three foo collapse two select from the start of the function keyword in two to the start of the function keyword in three press delete result folding triangle for one now shows it s collapsed even though function one is not collapsed click the folding triangle for one repeatedly result nothing happens triangle is nonresponsive undo result triangle for one still show s it s collapsed triangle for two shows it s not collapsed even though it is click triangle for two repeatedly result nothing happens on first click but on click it starts working correctly click triangle for one repeatedly result it still does nothing
0
798,548
28,289,559,052
IssuesEvent
2023-04-09 02:44:23
AY2223S2-CS2103T-W09-4/tp
https://api.github.com/repos/AY2223S2-CS2103T-W09-4/tp
closed
[PE-D][Tester D] [Minor] days instead of day
priority.Low type.FeatureFlaw
![image.png](https://raw.githubusercontent.com/rockman007372/ped/main/files/5e7f15d9-4088-4433-a07c-24f2c9d45ad2.png) <!--session: 1680242808805-81f07706-8824-452e-a98e-ad93d1f47077--><!--Version: Web v3.4.7--> ------------- Labels: `severity.VeryLow` `type.FunctionalityBug` original: rockman007372/ped#9
1.0
[PE-D][Tester D] [Minor] days instead of day - ![image.png](https://raw.githubusercontent.com/rockman007372/ped/main/files/5e7f15d9-4088-4433-a07c-24f2c9d45ad2.png) <!--session: 1680242808805-81f07706-8824-452e-a98e-ad93d1f47077--><!--Version: Web v3.4.7--> ------------- Labels: `severity.VeryLow` `type.FunctionalityBug` original: rockman007372/ped#9
priority
days instead of day labels severity verylow type functionalitybug original ped
1
605,730
18,739,636,201
IssuesEvent
2021-11-04 12:07:07
tektoncd/operator
https://api.github.com/repos/tektoncd/operator
closed
tekton operator fails to deploy dashboard
kind/bug priority/critical-urgent
# Expected Behavior The dashboard is not deployed via the operator with "all" profile # Actual Behavior ``` panic: open /var/run/ko/tekton-dashboard/tekton-dashboard-fullaccess: no such file or directory ``` # Steps to Reproduce the Problem Follow operator install instructions with "all" profile. # Additional Info - Kubernetes version: 1.22.1 ``` │ {"level":"debug","logger":"tekton-operator","caller":"controller/controller.go:526","msg":"Processing from queue dashboar │ │ d (depth: 0)","knative.dev/pod":"tekton-operator-7dd98cb7fc-2l4j9","knative.dev/controller":"github.com.tektoncd.operator │ │ .pkg.reconciler.kubernetes.tektondashboard.Reconciler","knative.dev/kind":"operator.tekton.dev.TektonDashboard"} │ │ {"level":"info","logger":"tekton-operator","caller":"tektondashboard/tektondashboard.go:98","msg":"Reconciling TektonDash │ │ boards","knative.dev/pod":"tekton-operator-7dd98cb7fc-2l4j9","knative.dev/controller":"github.com.tektoncd.operator.pkg.r │ │ econciler.kubernetes.tektondashboard.Reconciler","knative.dev/kind":"operator.tekton.dev.TektonDashboard","knative.dev/tr │ │ aceid":"37da2fea-00ed-4675-a751-f986bac72a0c","knative.dev/key":"dashboard","status":{"observedGeneration":1,"conditions" │ │ :[{"type":"DependenciesInstalled","status":"Unknown","lastTransitionTime":"2021-10-26T21:47:42Z"},{"type":"DeploymentsAva │ │ ilable","status":"Unknown","lastTransitionTime":"2021-10-26T21:47:42Z"},{"type":"InstallSucceeded","status":"Unknown","la │ │ stTransitionTime":"2021-10-26T21:47:42Z"},{"type":"Ready","status":"Unknown","lastTransitionTime":"2021-10-26T21:47:42Z"} │ │ ]}} │ │ panic: open /var/run/ko/tekton-dashboard/tekton-dashboard-fullaccess: no such file or directory │ │ goroutine 856 [running]: │ │ github.com/tektoncd/operator/pkg/reconciler/common.latestRelease(...) │ │ github.com/tektoncd/operator/pkg/reconciler/common/releases.go:170 │ │ github.com/tektoncd/operator/pkg/reconciler/common.TargetVersion(0x1932b88, 0x40003bfa00, 0x400035b020, 0x3) │ │ github.com/tektoncd/operator/pkg/reconciler/common/releases.go:46 +0x90 │ │ github.com/tektoncd/operator/pkg/reconciler/common.TargetManifest(0x1932b88, 0x40003bfa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, │ │ 0x0, 0x146fc40, ...) │ │ github.com/tektoncd/operator/pkg/reconciler/common/releases.go:51 +0x40 │ │ github.com/tektoncd/operator/pkg/reconciler/common.AppendTarget(0x19088d8, 0x4001512720, 0x4000a5ea00, 0x1932b88, 0x40003 │ │ bfa00, 0x1604ee0, 0x4001303528) │ │ github.com/tektoncd/operator/pkg/reconciler/common/stages.go:51 +0x48 │ │ github.com/tektoncd/operator/pkg/reconciler/common.Stages.Execute(0x4001303680, 0x4, 0x4, 0x19088d8, 0x4001512720, 0x4000 │ │ a5ea00, 0x1932b88, 0x40003bfa00, 0x0, 0x0) │ │ github.com/tektoncd/operator/pkg/reconciler/common/stages.go:36 +0x74 │ │ github.com/tektoncd/operator/pkg/reconciler/kubernetes/tektondashboard.(*Reconciler).ReconcileKind(0x4000933e80, 0x19088d │ │ 8, 0x4001512720, 0x40003bfa00, 0x0, 0x0) │ │ github.com/tektoncd/operator/pkg/reconciler/kubernetes/tektondashboard/tektondashboard.go:133 +0xa80 │ │ github.com/tektoncd/operator/pkg/client/injection/reconciler/operator/v1alpha1/tektondashboard.(*reconcilerImpl).Reconcil │ │ e(0x40004bed20, 0x19088d8, 0x4001512720, 0x4000895ca4, 0x9, 0x4000356e50, 0x19088d8) │ │ github.com/tektoncd/operator/pkg/client/injection/reconciler/operator/v1alpha1/tektondashboard/reconciler.go:249 +0xe │ │ 50 │ │ knative.dev/pkg/controller.(*Impl).processNextWorkItem(0x4000978b40, 0x0) │ │ knative.dev/pkg@v0.0.0-20210827184538-2bd91f75571c/controller/controller.go:555 +0x3fc │ │ knative.dev/pkg/controller.(*Impl).RunContext.func3(0x4000b0a5a0, 0x4000978b40) │ │ knative.dev/pkg@v0.0.0-20210827184538-2bd91f75571c/controller/controller.go:491 +0x50 │ │ created by knative.dev/pkg/controller.(*Impl).RunContext │ │ knative.dev/pkg@v0.0.0-20210827184538-2bd91f75571c/controller/controller.go:489 +0x130 │ ``` - Tekton Pipeline version: **Output of `tkn version` or `kubectl get pods -n tekton-pipelines -l app=tekton-pipelines-controller -o=jsonpath='{.items[0].metadata.labels.version}'`** v0.28.2 <!-- Any other additional information -->
1.0
tekton operator fails to deploy dashboard - # Expected Behavior The dashboard is not deployed via the operator with "all" profile # Actual Behavior ``` panic: open /var/run/ko/tekton-dashboard/tekton-dashboard-fullaccess: no such file or directory ``` # Steps to Reproduce the Problem Follow operator install instructions with "all" profile. # Additional Info - Kubernetes version: 1.22.1 ``` │ {"level":"debug","logger":"tekton-operator","caller":"controller/controller.go:526","msg":"Processing from queue dashboar │ │ d (depth: 0)","knative.dev/pod":"tekton-operator-7dd98cb7fc-2l4j9","knative.dev/controller":"github.com.tektoncd.operator │ │ .pkg.reconciler.kubernetes.tektondashboard.Reconciler","knative.dev/kind":"operator.tekton.dev.TektonDashboard"} │ │ {"level":"info","logger":"tekton-operator","caller":"tektondashboard/tektondashboard.go:98","msg":"Reconciling TektonDash │ │ boards","knative.dev/pod":"tekton-operator-7dd98cb7fc-2l4j9","knative.dev/controller":"github.com.tektoncd.operator.pkg.r │ │ econciler.kubernetes.tektondashboard.Reconciler","knative.dev/kind":"operator.tekton.dev.TektonDashboard","knative.dev/tr │ │ aceid":"37da2fea-00ed-4675-a751-f986bac72a0c","knative.dev/key":"dashboard","status":{"observedGeneration":1,"conditions" │ │ :[{"type":"DependenciesInstalled","status":"Unknown","lastTransitionTime":"2021-10-26T21:47:42Z"},{"type":"DeploymentsAva │ │ ilable","status":"Unknown","lastTransitionTime":"2021-10-26T21:47:42Z"},{"type":"InstallSucceeded","status":"Unknown","la │ │ stTransitionTime":"2021-10-26T21:47:42Z"},{"type":"Ready","status":"Unknown","lastTransitionTime":"2021-10-26T21:47:42Z"} │ │ ]}} │ │ panic: open /var/run/ko/tekton-dashboard/tekton-dashboard-fullaccess: no such file or directory │ │ goroutine 856 [running]: │ │ github.com/tektoncd/operator/pkg/reconciler/common.latestRelease(...) │ │ github.com/tektoncd/operator/pkg/reconciler/common/releases.go:170 │ │ github.com/tektoncd/operator/pkg/reconciler/common.TargetVersion(0x1932b88, 0x40003bfa00, 0x400035b020, 0x3) │ │ github.com/tektoncd/operator/pkg/reconciler/common/releases.go:46 +0x90 │ │ github.com/tektoncd/operator/pkg/reconciler/common.TargetManifest(0x1932b88, 0x40003bfa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, │ │ 0x0, 0x146fc40, ...) │ │ github.com/tektoncd/operator/pkg/reconciler/common/releases.go:51 +0x40 │ │ github.com/tektoncd/operator/pkg/reconciler/common.AppendTarget(0x19088d8, 0x4001512720, 0x4000a5ea00, 0x1932b88, 0x40003 │ │ bfa00, 0x1604ee0, 0x4001303528) │ │ github.com/tektoncd/operator/pkg/reconciler/common/stages.go:51 +0x48 │ │ github.com/tektoncd/operator/pkg/reconciler/common.Stages.Execute(0x4001303680, 0x4, 0x4, 0x19088d8, 0x4001512720, 0x4000 │ │ a5ea00, 0x1932b88, 0x40003bfa00, 0x0, 0x0) │ │ github.com/tektoncd/operator/pkg/reconciler/common/stages.go:36 +0x74 │ │ github.com/tektoncd/operator/pkg/reconciler/kubernetes/tektondashboard.(*Reconciler).ReconcileKind(0x4000933e80, 0x19088d │ │ 8, 0x4001512720, 0x40003bfa00, 0x0, 0x0) │ │ github.com/tektoncd/operator/pkg/reconciler/kubernetes/tektondashboard/tektondashboard.go:133 +0xa80 │ │ github.com/tektoncd/operator/pkg/client/injection/reconciler/operator/v1alpha1/tektondashboard.(*reconcilerImpl).Reconcil │ │ e(0x40004bed20, 0x19088d8, 0x4001512720, 0x4000895ca4, 0x9, 0x4000356e50, 0x19088d8) │ │ github.com/tektoncd/operator/pkg/client/injection/reconciler/operator/v1alpha1/tektondashboard/reconciler.go:249 +0xe │ │ 50 │ │ knative.dev/pkg/controller.(*Impl).processNextWorkItem(0x4000978b40, 0x0) │ │ knative.dev/pkg@v0.0.0-20210827184538-2bd91f75571c/controller/controller.go:555 +0x3fc │ │ knative.dev/pkg/controller.(*Impl).RunContext.func3(0x4000b0a5a0, 0x4000978b40) │ │ knative.dev/pkg@v0.0.0-20210827184538-2bd91f75571c/controller/controller.go:491 +0x50 │ │ created by knative.dev/pkg/controller.(*Impl).RunContext │ │ knative.dev/pkg@v0.0.0-20210827184538-2bd91f75571c/controller/controller.go:489 +0x130 │ ``` - Tekton Pipeline version: **Output of `tkn version` or `kubectl get pods -n tekton-pipelines -l app=tekton-pipelines-controller -o=jsonpath='{.items[0].metadata.labels.version}'`** v0.28.2 <!-- Any other additional information -->
priority
tekton operator fails to deploy dashboard expected behavior the dashboard is not deployed via the operator with all profile actual behavior panic open var run ko tekton dashboard tekton dashboard fullaccess no such file or directory steps to reproduce the problem follow operator install instructions with all profile additional info kubernetes version │ level debug logger tekton operator caller controller controller go msg processing from queue dashboar │ │ d depth knative dev pod tekton operator knative dev controller github com tektoncd operator │ │ pkg reconciler kubernetes tektondashboard reconciler knative dev kind operator tekton dev tektondashboard │ │ level info logger tekton operator caller tektondashboard tektondashboard go msg reconciling tektondash │ │ boards knative dev pod tekton operator knative dev controller github com tektoncd operator pkg r │ │ econciler kubernetes tektondashboard reconciler knative dev kind operator tekton dev tektondashboard knative dev tr │ │ aceid knative dev key dashboard status observedgeneration conditions │ │ type dependenciesinstalled status unknown lasttransitiontime type deploymentsava │ │ ilable status unknown lasttransitiontime type installsucceeded status unknown la │ │ sttransitiontime type ready status unknown lasttransitiontime │ │ │ │ panic open var run ko tekton dashboard tekton dashboard fullaccess no such file or directory │ │ goroutine │ │ github com tektoncd operator pkg reconciler common latestrelease │ │ github com tektoncd operator pkg reconciler common releases go │ │ github com tektoncd operator pkg reconciler common targetversion │ │ github com tektoncd operator pkg reconciler common releases go │ │ github com tektoncd operator pkg reconciler common targetmanifest │ │ │ │ github com tektoncd operator pkg reconciler common releases go │ │ github com tektoncd operator pkg reconciler common appendtarget │ │ │ │ github com tektoncd operator pkg reconciler common stages go │ │ github com tektoncd operator pkg reconciler common stages execute │ │ │ │ github com tektoncd operator pkg reconciler common stages go │ │ github com tektoncd operator pkg reconciler kubernetes tektondashboard reconciler reconcilekind │ │ │ │ github com tektoncd operator pkg reconciler kubernetes tektondashboard tektondashboard go │ │ github com tektoncd operator pkg client injection reconciler operator tektondashboard reconcilerimpl reconcil │ │ e │ │ github com tektoncd operator pkg client injection reconciler operator tektondashboard reconciler go │ │ │ │ knative dev pkg controller impl processnextworkitem │ │ knative dev pkg controller controller go │ │ knative dev pkg controller impl runcontext │ │ knative dev pkg controller controller go │ │ created by knative dev pkg controller impl runcontext │ │ knative dev pkg controller controller go │ tekton pipeline version output of tkn version or kubectl get pods n tekton pipelines l app tekton pipelines controller o jsonpath items metadata labels version
1
140,091
18,894,897,825
IssuesEvent
2021-11-15 16:48:17
w3c/web-share
https://api.github.com/repos/w3c/web-share
opened
Split security & privacy considerations
privacy-tracker security-tracker
Please split security and privacy considerations into separate sections, as it has been claimed was done here, but appears to have not yet been done. https://github.com/w3c/security-request/issues/17#issuecomment-968988827
True
Split security & privacy considerations - Please split security and privacy considerations into separate sections, as it has been claimed was done here, but appears to have not yet been done. https://github.com/w3c/security-request/issues/17#issuecomment-968988827
non_priority
split security privacy considerations please split security and privacy considerations into separate sections as it has been claimed was done here but appears to have not yet been done
0
373,549
11,045,547,946
IssuesEvent
2019-12-09 15:18:13
openshift/odo
https://api.github.com/repos/openshift/odo
closed
No pre check is done for existence of same component in the cluster
kind/bug priority/High triage/unresolved
/kind bug <!-- Welcome! - We kindly ask you to: 1. Fill out the issue template below 2. Use the Google group if you have a question rather than a bug or feature request. The group is at: https://groups.google.com/forum/#!forum/odo-users Thanks for understanding, and for contributing to the project! --> ## What versions of software are you using? **Operating System:** supported **Output of `odo version`:** master ## How did you run odo exactly? ``` $ odo create nodejs backend --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/nodejs/ --project test123 $ odo push --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/nodejs/ $ odo component list --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/nodejs/ APP NAME TYPE SOURCE STATE app backend nodejs file://./ Pushed -------------- Looks good $ odo create python backend --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/nodejs/ --project test123 $ odo push --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/python/ $ odo component list --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/nodejs/ APP NAME TYPE SOURCE STATE app backend python file://./ Pushed <----- nodejs component is replaced $ odo component list --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/python/ APP NAME TYPE SOURCE STATE app backend python file://./ Pushed <----- nodejs component is replaced ``` ## Actual behavior Replacing the deployed component of same name ## Expected behavior Should throw error of something like ```There is already a component of same name exist in the same app and in same namespace.``` ## Any logs, error output, etc?
1.0
No pre check is done for existence of same component in the cluster - /kind bug <!-- Welcome! - We kindly ask you to: 1. Fill out the issue template below 2. Use the Google group if you have a question rather than a bug or feature request. The group is at: https://groups.google.com/forum/#!forum/odo-users Thanks for understanding, and for contributing to the project! --> ## What versions of software are you using? **Operating System:** supported **Output of `odo version`:** master ## How did you run odo exactly? ``` $ odo create nodejs backend --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/nodejs/ --project test123 $ odo push --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/nodejs/ $ odo component list --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/nodejs/ APP NAME TYPE SOURCE STATE app backend nodejs file://./ Pushed -------------- Looks good $ odo create python backend --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/nodejs/ --project test123 $ odo push --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/python/ $ odo component list --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/nodejs/ APP NAME TYPE SOURCE STATE app backend python file://./ Pushed <----- nodejs component is replaced $ odo component list --context /Users/amit/go/src/github.com/openshift/odo/tests/examples/source/python/ APP NAME TYPE SOURCE STATE app backend python file://./ Pushed <----- nodejs component is replaced ``` ## Actual behavior Replacing the deployed component of same name ## Expected behavior Should throw error of something like ```There is already a component of same name exist in the same app and in same namespace.``` ## Any logs, error output, etc?
priority
no pre check is done for existence of same component in the cluster kind bug welcome we kindly ask you to fill out the issue template below use the google group if you have a question rather than a bug or feature request the group is at thanks for understanding and for contributing to the project what versions of software are you using operating system supported output of odo version master how did you run odo exactly odo create nodejs backend context users amit go src github com openshift odo tests examples source nodejs project odo push context users amit go src github com openshift odo tests examples source nodejs odo component list context users amit go src github com openshift odo tests examples source nodejs app name type source state app backend nodejs file pushed looks good odo create python backend context users amit go src github com openshift odo tests examples source nodejs project odo push context users amit go src github com openshift odo tests examples source python odo component list context users amit go src github com openshift odo tests examples source nodejs app name type source state app backend python file pushed nodejs component is replaced odo component list context users amit go src github com openshift odo tests examples source python app name type source state app backend python file pushed nodejs component is replaced actual behavior replacing the deployed component of same name expected behavior should throw error of something like there is already a component of same name exist in the same app and in same namespace any logs error output etc
1
17,972
6,532,879,524
IssuesEvent
2017-08-31 02:11:35
electron-userland/electron-packager
https://api.github.com/repos/electron-userland/electron-packager
closed
Electron win32 ia32 app is not working but x64 is
build-target:windows needs info
<!-- Thanks for filing an issue! Please check off all of the steps as they are completed by replacing [ ] with [x]. --> * [x] I have read the [contribution documentation](https://github.com/electron-userland/electron-packager/blob/master/CONTRIBUTING.md) for this project. * [x] I agree to follow the [code of conduct](https://github.com/electron/electron/blob/master/CODE_OF_CONDUCT.md) that this project follows, as appropriate. * [x] I have searched the issue tracker for an issue that matches the one I want to file, without success. Hi, I am using Windows 7 64bits and have used electron packager to build my project to both win32 ia32 and win32 x64 The x64 version is working perfectly on windows 64 bit machines but the ia32 version is not working on neither 32 bit or 64 bit machines. I click the 32bit executable and absolutely NOTHING happens. This is very frusturating because I haven't found a single person who's had this issue before. Please help! Thank you. **Console output when you run electron-packager with the environment variable `DEBUG=electron-packager`. Please include the stack trace if one exists.** ``` D:\GP>electron-packager . --arch=ia32 electron-packager Electron Packager 9.0.0 +0ms electron-packager Node v6.11.2 +15ms electron-packager Host Operating system: win32 (x64) +0ms electron-packager Packager Options: {"":["."],"all":false,"derefSymlinks":true ,"download":{"strictSSL":true},"overwrite":false,"prune":true,"quiet":false,"arc h":"ia32","DEBUG":"electron-packager","dir":".","protocols":[]} +0ms electron-packager Target Platforms: win32 +0ms electron-packager Target Architectures: ia32 +0ms electron-packager Inferring application name from name in D:\GP\package.json + 0ms electron-packager Inferring appVersion from version in D:\GP\package.json +0ms electron-packager Inferring target Electron version from electron in D:\GP\pac kage.json +16ms electron-packager Application name: gp +32ms electron-packager Target Electron version: 1.6.11 +0ms electron-packager Ignored path regular expressions: [ '/node_modules/electron( $|/)', '/node_modules/electron-prebuilt(-compile)?($|/)', '/node_modules/electron-packager($|/)', '/\\.git($|/)', '/node_modules/\\.bin($|/)', '\\.o(bj)?$' ] +0ms electron-packager Downloading Electron with options {"strictSSL":true,"platfor m":"win32","arch":"ia32","version":"1.6.11"} +0ms Skipping win32 ia32 (output dir already exists, use --overwrite to force) D:\GP>electron-packager . --arch=ia32 --overwrite --DEBUG=electron-packager electron-packager Electron Packager 9.0.0 +0ms electron-packager Node v6.11.2 +0ms electron-packager Host Operating system: win32 (x64) +0ms electron-packager Packager Options: {"":["."],"all":false,"derefSymlinks":true ,"download":{"strictSSL":true},"overwrite":true,"prune":true,"quiet":false,"arch ":"ia32","DEBUG":"electron-packager","dir":".","protocols":[]} +0ms electron-packager Target Platforms: win32 +0ms electron-packager Target Architectures: ia32 +0ms electron-packager Inferring application name from name in D:\GP\package.json + 0ms electron-packager Inferring appVersion from version in D:\GP\package.json +16m s electron-packager Inferring target Electron version from electron in D:\GP\pac kage.json +0ms electron-packager Application name: gp +31ms electron-packager Target Electron version: 1.6.11 +0ms electron-packager Ignored path regular expressions: [ '/node_modules/electron( $|/)', '/node_modules/electron-prebuilt(-compile)?($|/)', '/node_modules/electron-packager($|/)', '/\\.git($|/)', '/node_modules/\\.bin($|/)', '\\.o(bj)?$' ] +0ms electron-packager Downloading Electron with options {"strictSSL":true,"platfor m":"win32","arch":"ia32","version":"1.6.11"} +0ms Packaging app for platform win32 ia32 using electron v1.6.11 electron-packager Creating C:\Users\Taha\AppData\Local\Temp\electron-packager\ win32-ia32-template +2s electron-packager Extracting C:\Users\Taha\AppData\Local\electron\Cache\electr on-v1.6.11-win32-ia32.zip to C:\Users\Taha\AppData\Local\Temp\electron-packager\ win32-ia32-template +16ms electron-packager Initializing app in C:\Users\Taha\AppData\Local\Temp\electro n-packager\win32-ia32\gp-win32-ia32 from C:\Users\Taha\AppData\Local\Temp\electr on-packager\win32-ia32-template template +3s electron-packager Ignored paths based on the out param: [ 'D:\\GP\\gp-darwin-x 64', 'D:\\GP\\gp-linux-ia32', 'D:\\GP\\gp-linux-x64', 'D:\\GP\\gp-linux-armv7l', 'D:\\GP\\gp-linux-arm64', 'D:\\GP\\gp-mas-x64', 'D:\\GP\\gp-win32-ia32', 'D:\\GP\\gp-win32-x64' ] +3s electron-packager Pruning modules via: npm prune --production +0ms electron-packager Renaming electron.exe to gp.exe in C:\Users\Taha\AppData\Loc al\Temp\electron-packager\win32-ia32\gp-win32-ia32 +31s electron-packager Running rcedit with the options {"version-string":{"FileDesc ription":"gp","InternalName":"gp","OriginalFilename":"gp.exe","ProductName":"gp" },"file-version":"1.0.0","product-version":"1.0.0"} +0ms electron-packager Moving C:\Users\Taha\AppData\Local\Temp\electron-packager\wi n32-ia32\gp-win32-ia32 to D:\GP\gp-win32-ia32 +203ms Wrote new app to D:\GP\gp-win32-ia32```
1.0
Electron win32 ia32 app is not working but x64 is - <!-- Thanks for filing an issue! Please check off all of the steps as they are completed by replacing [ ] with [x]. --> * [x] I have read the [contribution documentation](https://github.com/electron-userland/electron-packager/blob/master/CONTRIBUTING.md) for this project. * [x] I agree to follow the [code of conduct](https://github.com/electron/electron/blob/master/CODE_OF_CONDUCT.md) that this project follows, as appropriate. * [x] I have searched the issue tracker for an issue that matches the one I want to file, without success. Hi, I am using Windows 7 64bits and have used electron packager to build my project to both win32 ia32 and win32 x64 The x64 version is working perfectly on windows 64 bit machines but the ia32 version is not working on neither 32 bit or 64 bit machines. I click the 32bit executable and absolutely NOTHING happens. This is very frusturating because I haven't found a single person who's had this issue before. Please help! Thank you. **Console output when you run electron-packager with the environment variable `DEBUG=electron-packager`. Please include the stack trace if one exists.** ``` D:\GP>electron-packager . --arch=ia32 electron-packager Electron Packager 9.0.0 +0ms electron-packager Node v6.11.2 +15ms electron-packager Host Operating system: win32 (x64) +0ms electron-packager Packager Options: {"":["."],"all":false,"derefSymlinks":true ,"download":{"strictSSL":true},"overwrite":false,"prune":true,"quiet":false,"arc h":"ia32","DEBUG":"electron-packager","dir":".","protocols":[]} +0ms electron-packager Target Platforms: win32 +0ms electron-packager Target Architectures: ia32 +0ms electron-packager Inferring application name from name in D:\GP\package.json + 0ms electron-packager Inferring appVersion from version in D:\GP\package.json +0ms electron-packager Inferring target Electron version from electron in D:\GP\pac kage.json +16ms electron-packager Application name: gp +32ms electron-packager Target Electron version: 1.6.11 +0ms electron-packager Ignored path regular expressions: [ '/node_modules/electron( $|/)', '/node_modules/electron-prebuilt(-compile)?($|/)', '/node_modules/electron-packager($|/)', '/\\.git($|/)', '/node_modules/\\.bin($|/)', '\\.o(bj)?$' ] +0ms electron-packager Downloading Electron with options {"strictSSL":true,"platfor m":"win32","arch":"ia32","version":"1.6.11"} +0ms Skipping win32 ia32 (output dir already exists, use --overwrite to force) D:\GP>electron-packager . --arch=ia32 --overwrite --DEBUG=electron-packager electron-packager Electron Packager 9.0.0 +0ms electron-packager Node v6.11.2 +0ms electron-packager Host Operating system: win32 (x64) +0ms electron-packager Packager Options: {"":["."],"all":false,"derefSymlinks":true ,"download":{"strictSSL":true},"overwrite":true,"prune":true,"quiet":false,"arch ":"ia32","DEBUG":"electron-packager","dir":".","protocols":[]} +0ms electron-packager Target Platforms: win32 +0ms electron-packager Target Architectures: ia32 +0ms electron-packager Inferring application name from name in D:\GP\package.json + 0ms electron-packager Inferring appVersion from version in D:\GP\package.json +16m s electron-packager Inferring target Electron version from electron in D:\GP\pac kage.json +0ms electron-packager Application name: gp +31ms electron-packager Target Electron version: 1.6.11 +0ms electron-packager Ignored path regular expressions: [ '/node_modules/electron( $|/)', '/node_modules/electron-prebuilt(-compile)?($|/)', '/node_modules/electron-packager($|/)', '/\\.git($|/)', '/node_modules/\\.bin($|/)', '\\.o(bj)?$' ] +0ms electron-packager Downloading Electron with options {"strictSSL":true,"platfor m":"win32","arch":"ia32","version":"1.6.11"} +0ms Packaging app for platform win32 ia32 using electron v1.6.11 electron-packager Creating C:\Users\Taha\AppData\Local\Temp\electron-packager\ win32-ia32-template +2s electron-packager Extracting C:\Users\Taha\AppData\Local\electron\Cache\electr on-v1.6.11-win32-ia32.zip to C:\Users\Taha\AppData\Local\Temp\electron-packager\ win32-ia32-template +16ms electron-packager Initializing app in C:\Users\Taha\AppData\Local\Temp\electro n-packager\win32-ia32\gp-win32-ia32 from C:\Users\Taha\AppData\Local\Temp\electr on-packager\win32-ia32-template template +3s electron-packager Ignored paths based on the out param: [ 'D:\\GP\\gp-darwin-x 64', 'D:\\GP\\gp-linux-ia32', 'D:\\GP\\gp-linux-x64', 'D:\\GP\\gp-linux-armv7l', 'D:\\GP\\gp-linux-arm64', 'D:\\GP\\gp-mas-x64', 'D:\\GP\\gp-win32-ia32', 'D:\\GP\\gp-win32-x64' ] +3s electron-packager Pruning modules via: npm prune --production +0ms electron-packager Renaming electron.exe to gp.exe in C:\Users\Taha\AppData\Loc al\Temp\electron-packager\win32-ia32\gp-win32-ia32 +31s electron-packager Running rcedit with the options {"version-string":{"FileDesc ription":"gp","InternalName":"gp","OriginalFilename":"gp.exe","ProductName":"gp" },"file-version":"1.0.0","product-version":"1.0.0"} +0ms electron-packager Moving C:\Users\Taha\AppData\Local\Temp\electron-packager\wi n32-ia32\gp-win32-ia32 to D:\GP\gp-win32-ia32 +203ms Wrote new app to D:\GP\gp-win32-ia32```
non_priority
electron app is not working but is thanks for filing an issue please check off all of the steps as they are completed by replacing with i have read the for this project i agree to follow the that this project follows as appropriate i have searched the issue tracker for an issue that matches the one i want to file without success hi i am using windows and have used electron packager to build my project to both and the version is working perfectly on windows bit machines but the version is not working on neither bit or bit machines i click the executable and absolutely nothing happens this is very frusturating because i haven t found a single person who s had this issue before please help thank you console output when you run electron packager with the environment variable debug electron packager please include the stack trace if one exists d gp electron packager arch electron packager electron packager electron packager node electron packager host operating system electron packager packager options all false derefsymlinks true download strictssl true overwrite false prune true quiet false arc h debug electron packager dir protocols electron packager target platforms electron packager target architectures electron packager inferring application name from name in d gp package json electron packager inferring appversion from version in d gp package json electron packager inferring target electron version from electron in d gp pac kage json electron packager application name gp electron packager target electron version electron packager ignored path regular expressions node modules electron node modules electron prebuilt compile node modules electron packager git node modules bin o bj electron packager downloading electron with options strictssl true platfor m arch version skipping output dir already exists use overwrite to force d gp electron packager arch overwrite debug electron packager electron packager electron packager electron packager node electron packager host operating system electron packager packager options all false derefsymlinks true download strictssl true overwrite true prune true quiet false arch debug electron packager dir protocols electron packager target platforms electron packager target architectures electron packager inferring application name from name in d gp package json electron packager inferring appversion from version in d gp package json s electron packager inferring target electron version from electron in d gp pac kage json electron packager application name gp electron packager target electron version electron packager ignored path regular expressions node modules electron node modules electron prebuilt compile node modules electron packager git node modules bin o bj electron packager downloading electron with options strictssl true platfor m arch version packaging app for platform using electron electron packager creating c users taha appdata local temp electron packager template electron packager extracting c users taha appdata local electron cache electr on zip to c users taha appdata local temp electron packager template electron packager initializing app in c users taha appdata local temp electro n packager gp from c users taha appdata local temp electr on packager template template electron packager ignored paths based on the out param d gp gp darwin x d gp gp linux d gp gp linux d gp gp linux d gp gp linux d gp gp mas d gp gp d gp gp electron packager pruning modules via npm prune production electron packager renaming electron exe to gp exe in c users taha appdata loc al temp electron packager gp electron packager running rcedit with the options version string filedesc ription gp internalname gp originalfilename gp exe productname gp file version product version electron packager moving c users taha appdata local temp electron packager wi gp to d gp gp wrote new app to d gp gp
0
48,520
5,962,121,684
IssuesEvent
2017-05-29 20:37:35
pubkey/rxdb
https://api.github.com/repos/pubkey/rxdb
closed
RxQuery.regex() will not produce the right toString()-representation
has test case
When `.regex()` is used in a query and toString is called, the regex-string is not in the resulting string. This creates broken behaviour on the _queryCache, because it will return the wrong query. Reproduce: [https://jsfiddle.net/h8n0awfc/1/](https://jsfiddle.net/h8n0awfc/1/)
1.0
RxQuery.regex() will not produce the right toString()-representation - When `.regex()` is used in a query and toString is called, the regex-string is not in the resulting string. This creates broken behaviour on the _queryCache, because it will return the wrong query. Reproduce: [https://jsfiddle.net/h8n0awfc/1/](https://jsfiddle.net/h8n0awfc/1/)
non_priority
rxquery regex will not produce the right tostring representation when regex is used in a query and tostring is called the regex string is not in the resulting string this creates broken behaviour on the querycache because it will return the wrong query reproduce
0
262,756
27,989,244,892
IssuesEvent
2023-03-27 01:13:39
DavidSpek/pipelines
https://api.github.com/repos/DavidSpek/pipelines
opened
CVE-2023-25666 (High) detected in tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl
Mend: dependency security vulnerability
## CVE-2023-25666 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/ec/98/f968caf5f65759e78873b900cbf0ae20b1699fb11268ecc0f892186419a7/tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/ec/98/f968caf5f65759e78873b900cbf0ae20b1699fb11268ecc0f892186419a7/tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl</a></p> <p>Path to dependency file: /contrib/components/openvino/ovms-deployer/containers/requirements.txt</p> <p>Path to vulnerable library: /contrib/components/openvino/ovms-deployer/containers/requirements.txt,/samples/core/ai_platform/training</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/DavidSpek/pipelines/commit/6f7433f006e282c4f25441e7502b80d73751e38f">6f7433f006e282c4f25441e7502b80d73751e38f</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a floating point exception in AudioSpectrogram. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. <p>Publish Date: 2023-03-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-25666>CVE-2023-25666</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f637-vh3r-vfh2">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f637-vh3r-vfh2</a></p> <p>Release Date: 2023-03-24</p> <p>Fix Resolution: tensorflow - 2.11.1,2.12.0, tensorflow-cpu - 2.11.1,2.12.0, tensorflow-gpu - 2.11.1,2.12.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2023-25666 (High) detected in tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl - ## CVE-2023-25666 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/ec/98/f968caf5f65759e78873b900cbf0ae20b1699fb11268ecc0f892186419a7/tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/ec/98/f968caf5f65759e78873b900cbf0ae20b1699fb11268ecc0f892186419a7/tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl</a></p> <p>Path to dependency file: /contrib/components/openvino/ovms-deployer/containers/requirements.txt</p> <p>Path to vulnerable library: /contrib/components/openvino/ovms-deployer/containers/requirements.txt,/samples/core/ai_platform/training</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/DavidSpek/pipelines/commit/6f7433f006e282c4f25441e7502b80d73751e38f">6f7433f006e282c4f25441e7502b80d73751e38f</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a floating point exception in AudioSpectrogram. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. <p>Publish Date: 2023-03-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-25666>CVE-2023-25666</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f637-vh3r-vfh2">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f637-vh3r-vfh2</a></p> <p>Release Date: 2023-03-24</p> <p>Fix Resolution: tensorflow - 2.11.1,2.12.0, tensorflow-cpu - 2.11.1,2.12.0, tensorflow-gpu - 2.11.1,2.12.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in tensorflow whl cve high severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file contrib components openvino ovms deployer containers requirements txt path to vulnerable library contrib components openvino ovms deployer containers requirements txt samples core ai platform training dependency hierarchy x tensorflow whl vulnerable library found in head commit a href found in base branch master vulnerability details tensorflow is an open source platform for machine learning prior to versions and there is a floating point exception in audiospectrogram a fix is included in tensorflow version and version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tensorflow tensorflow cpu tensorflow gpu step up your open source security game with mend
0
357,403
10,606,112,493
IssuesEvent
2019-10-10 22:12:26
kubernetes/website
https://api.github.com/repos/kubernetes/website
closed
Localising Stateless applications sub-section to Hindi
kind/feature language/hi lifecycle/rotten priority/backlog
**What would you like to be added** Markdown to be translated:- - https://github.com/kubernetes/website/edit/master/content/en/docs/tutorials/stateless-application/expose-external-ip-address.md - https://github.com/kubernetes/website/edit/master/content/en/docs/tutorials/stateless-application/guestbook.md
1.0
Localising Stateless applications sub-section to Hindi - **What would you like to be added** Markdown to be translated:- - https://github.com/kubernetes/website/edit/master/content/en/docs/tutorials/stateless-application/expose-external-ip-address.md - https://github.com/kubernetes/website/edit/master/content/en/docs/tutorials/stateless-application/guestbook.md
priority
localising stateless applications sub section to hindi what would you like to be added markdown to be translated
1
655,671
21,704,517,168
IssuesEvent
2022-05-10 08:25:24
bounswe/bounswe2022group2
https://api.github.com/repos/bounswe/bounswe2022group2
closed
Practice App: Implement the Signup Endpoint
priority-medium status-needreview practice-app practice-app:back-end
### Issue Description We determined the endpoints to be included in the practice app project in our [weekly meeting-9](https://github.com/bounswe/bounswe2022group2/wiki/Meeting-%239-(01.05.2022)). After the determination of the complete list, we divided the tasks within the team. I took the responsibility for the signup endpoint. To be able to implement the signup endpoint, we need the user model that will be created with issue #151. After the creation of the user model, I will implement the signup endpoint. ### Step Details Steps that will be performed: - [x] Check whether the incoming data is valid - [x] Check whether the user is already exists - [x] Hash the password - [x] Create and save the user - [x] Return the created user with a success message - [x] Return an error message if an error occurs in any of the previous steps - [x] Test the endpoint with Postman - [x] Save requests as a collection in Postman - [x] Document the endpoint ### Final Actions After I created the signup endpoint, I will test it by using Postman. While testing, I will save my successful and failed requests and I will create a collection in Postman. I will also give the link to the collection under this as a comment to enable anyone to test the endpoint. Finally, I will document the endpoint and will share the documentation as a comment under this issue to add it to the corresponding wiki page in the future. ### Deadline of the Issue 08.05.2022 - Sunday - 23:59 ### Reviewer Onur Kömürcü ### Deadline for the Review 09.05.2022 - Monday - 23:59
1.0
Practice App: Implement the Signup Endpoint - ### Issue Description We determined the endpoints to be included in the practice app project in our [weekly meeting-9](https://github.com/bounswe/bounswe2022group2/wiki/Meeting-%239-(01.05.2022)). After the determination of the complete list, we divided the tasks within the team. I took the responsibility for the signup endpoint. To be able to implement the signup endpoint, we need the user model that will be created with issue #151. After the creation of the user model, I will implement the signup endpoint. ### Step Details Steps that will be performed: - [x] Check whether the incoming data is valid - [x] Check whether the user is already exists - [x] Hash the password - [x] Create and save the user - [x] Return the created user with a success message - [x] Return an error message if an error occurs in any of the previous steps - [x] Test the endpoint with Postman - [x] Save requests as a collection in Postman - [x] Document the endpoint ### Final Actions After I created the signup endpoint, I will test it by using Postman. While testing, I will save my successful and failed requests and I will create a collection in Postman. I will also give the link to the collection under this as a comment to enable anyone to test the endpoint. Finally, I will document the endpoint and will share the documentation as a comment under this issue to add it to the corresponding wiki page in the future. ### Deadline of the Issue 08.05.2022 - Sunday - 23:59 ### Reviewer Onur Kömürcü ### Deadline for the Review 09.05.2022 - Monday - 23:59
priority
practice app implement the signup endpoint issue description we determined the endpoints to be included in the practice app project in our after the determination of the complete list we divided the tasks within the team i took the responsibility for the signup endpoint to be able to implement the signup endpoint we need the user model that will be created with issue after the creation of the user model i will implement the signup endpoint step details steps that will be performed check whether the incoming data is valid check whether the user is already exists hash the password create and save the user return the created user with a success message return an error message if an error occurs in any of the previous steps test the endpoint with postman save requests as a collection in postman document the endpoint final actions after i created the signup endpoint i will test it by using postman while testing i will save my successful and failed requests and i will create a collection in postman i will also give the link to the collection under this as a comment to enable anyone to test the endpoint finally i will document the endpoint and will share the documentation as a comment under this issue to add it to the corresponding wiki page in the future deadline of the issue sunday reviewer onur kömürcü deadline for the review monday
1
64,190
14,657,467,770
IssuesEvent
2020-12-28 15:39:45
fu1771695yongxie/yarn
https://api.github.com/repos/fu1771695yongxie/yarn
opened
CVE-2020-11022 (Medium) detected in multiple libraries
security vulnerability
## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.7.2.min.js</b>, <b>jquery-1.7.1.min.js</b>, <b>jquery-1.8.1.js</b>, <b>jquery-1.8.1.min.js</b></p></summary> <p> <details><summary><b>jquery-1.7.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p> <p>Path to dependency file: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/js-base64/test/index.html</p> <p>Path to vulnerable library: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/js-base64/test/index.html,yarn/__tests__/fixtures/install/prod-should-keep-subdeps/node_modules/js-base64/test/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.2.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.7.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p> <p>Path to dependency file: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/express/index.html</p> <p>Path to vulnerable library: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/express/index.html,yarn/node_modules/vm-browserify/example/run/index.html,yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/multiplex/index.html,yarn/__tests__/fixtures/install/lockfile-optimization/node_modules/vm-browserify/example/run/index.html,yarn/__tests__/fixtures/outdated/wanted-newer-than-current/node_modules/vm-browserify/example/run/index.html,yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/hapi/html/index.html,yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/vm-browserify/example/run/index.html,yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/express-3.x/index.html,yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/echo/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.8.1.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.js</a></p> <p>Path to vulnerable library: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/webpack-dev-server/client/web_modules/jquery/jquery-1.8.1.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.8.1.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.8.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js</a></p> <p>Path to dependency file: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/redeyed/examples/browser/index.html</p> <p>Path to vulnerable library: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/redeyed/examples/browser/index.html,yarn/__tests__/fixtures/add/no-mirror-remote-when-duplicates/node_modules/redeyed/examples/browser/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.8.1.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/fu1771695yongxie/yarn/commit/b0308a6bc0041ba9a7c0fefc30be7721760dfd37">b0308a6bc0041ba9a7c0fefc30be7721760dfd37</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11022 (Medium) detected in multiple libraries - ## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.7.2.min.js</b>, <b>jquery-1.7.1.min.js</b>, <b>jquery-1.8.1.js</b>, <b>jquery-1.8.1.min.js</b></p></summary> <p> <details><summary><b>jquery-1.7.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p> <p>Path to dependency file: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/js-base64/test/index.html</p> <p>Path to vulnerable library: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/js-base64/test/index.html,yarn/__tests__/fixtures/install/prod-should-keep-subdeps/node_modules/js-base64/test/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.2.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.7.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p> <p>Path to dependency file: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/express/index.html</p> <p>Path to vulnerable library: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/express/index.html,yarn/node_modules/vm-browserify/example/run/index.html,yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/multiplex/index.html,yarn/__tests__/fixtures/install/lockfile-optimization/node_modules/vm-browserify/example/run/index.html,yarn/__tests__/fixtures/outdated/wanted-newer-than-current/node_modules/vm-browserify/example/run/index.html,yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/hapi/html/index.html,yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/vm-browserify/example/run/index.html,yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/express-3.x/index.html,yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/sockjs/examples/echo/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.8.1.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.js</a></p> <p>Path to vulnerable library: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/webpack-dev-server/client/web_modules/jquery/jquery-1.8.1.js</p> <p> Dependency Hierarchy: - :x: **jquery-1.8.1.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.8.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js</a></p> <p>Path to dependency file: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/redeyed/examples/browser/index.html</p> <p>Path to vulnerable library: yarn/__tests__/fixtures/install/install-bin-links-eslint/node_modules/redeyed/examples/browser/index.html,yarn/__tests__/fixtures/add/no-mirror-remote-when-duplicates/node_modules/redeyed/examples/browser/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.8.1.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/fu1771695yongxie/yarn/commit/b0308a6bc0041ba9a7c0fefc30be7721760dfd37">b0308a6bc0041ba9a7c0fefc30be7721760dfd37</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries jquery min js jquery min js jquery js jquery min js jquery min js javascript library for dom operations library home page a href path to dependency file yarn tests fixtures install install bin links eslint node modules js test index html path to vulnerable library yarn tests fixtures install install bin links eslint node modules js test index html yarn tests fixtures install prod should keep subdeps node modules js test index html dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file yarn tests fixtures install install bin links eslint node modules sockjs examples express index html path to vulnerable library yarn tests fixtures install install bin links eslint node modules sockjs examples express index html yarn node modules vm browserify example run index html yarn tests fixtures install install bin links eslint node modules sockjs examples multiplex index html yarn tests fixtures install lockfile optimization node modules vm browserify example run index html yarn tests fixtures outdated wanted newer than current node modules vm browserify example run index html yarn tests fixtures install install bin links eslint node modules sockjs examples hapi html index html yarn tests fixtures install install bin links eslint node modules vm browserify example run index html yarn tests fixtures install install bin links eslint node modules sockjs examples express x index html yarn tests fixtures install install bin links eslint node modules sockjs examples echo index html dependency hierarchy x jquery min js vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library yarn tests fixtures install install bin links eslint node modules webpack dev server client web modules jquery jquery js dependency hierarchy x jquery js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file yarn tests fixtures install install bin links eslint node modules redeyed examples browser index html path to vulnerable library yarn tests fixtures install install bin links eslint node modules redeyed examples browser index html yarn tests fixtures add no mirror remote when duplicates node modules redeyed examples browser index html dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
210,771
16,115,720,407
IssuesEvent
2021-04-28 07:07:34
grub-n-go/grub-n-go
https://api.github.com/repos/grub-n-go/grub-n-go
closed
EXISTING TEST PAGES
TestCafe
Please do all work for this task in a branch named issue-22 - [x] Edit existing test pages **navbar** **landing** **signin/signout/signup** **filter** **addproject** - [x] skip tests on **profile** **home** **projects** **interests** - [x] System passes test
1.0
EXISTING TEST PAGES - Please do all work for this task in a branch named issue-22 - [x] Edit existing test pages **navbar** **landing** **signin/signout/signup** **filter** **addproject** - [x] skip tests on **profile** **home** **projects** **interests** - [x] System passes test
non_priority
existing test pages please do all work for this task in a branch named issue edit existing test pages navbar landing signin signout signup filter addproject skip tests on profile home projects interests system passes test
0
476,263
13,736,109,546
IssuesEvent
2020-10-05 11:13:47
stylelint/stylelint
https://api.github.com/repos/stylelint/stylelint
closed
Fix file paths that contain the `+` character being ignored
priority: high status: ready to implement type: bug
> Clearly describe the bug File paths that contain a `+` are either not linted or will fail with an error. If the glob pattern itself contains a `+` itself it will throw this error even if it's quoted or escaped: ``` Error: No files matching the pattern "src/app/+route" were found. at globby.then.filePaths (/.../node_modules/stylelint/lib/standalone.js:206:17) at process._tickCallback (internal/process/next_tick.js:68:7) error Command failed with exit code 1. ``` If the glob pattern does not contain a `+` but the pattern would match paths that do contain a `+` it will not error, but it also won't lint those files either. It seems to just ignore them. > Which rule, if any, is the bug related to? n/a > What CSS is needed to reproduce the bug? n/a > What stylelint configuration is needed to reproduce the bug? n/a > Which version of stylelint are you using? `10.1.0` > How are you running stylelint: CLI, PostCSS plugin, Node.js API? - `stylelint src/app/+route/styles.scss` - `stylelint src/app/+route` - `stylelint 'src/app/+route/styles.scss'` - `stylelint src/app/\+route/styles.scss` > Does the bug relate to non-standard syntax (e.g. SCSS, Less etc.)? n/a > What did you expect to happen? It will lint file paths that contain the `+` symbol it does not throw an error and also lints files that might be in paths that contain a `+`. > What actually happened (e.g. what warnings or errors did you get)? Doesn't lint the files or throws an error. <!-- Before posting, please check that the bug hasn't already been: 1. fixed in the next release (https://github.com/stylelint/stylelint/blob/master/CHANGELOG.md) 2. discussed previously (https://github.com/stylelint/stylelint/search) --> <!-- You can help us fix the bug more quickly by: 1. Figuring out what needs to be done and proposing it 2. Submitting a PR with failing tests. Once the bug has been confirmed, you can help out further by: 1. Writing the code and submitting a PR. --> Some initial investigation seems to suggest this might be an issue in `globby`. I tried updating `globby` to the latest version and it no longer threw the errors. However, it also didn't pick up actual linting errors for any files contained with paths that contain `+`. I've tried the same with other linters `TSLint` & `ESLint` and both seem to handle these paths fine. However, they also don't use `globby` either.
1.0
Fix file paths that contain the `+` character being ignored - > Clearly describe the bug File paths that contain a `+` are either not linted or will fail with an error. If the glob pattern itself contains a `+` itself it will throw this error even if it's quoted or escaped: ``` Error: No files matching the pattern "src/app/+route" were found. at globby.then.filePaths (/.../node_modules/stylelint/lib/standalone.js:206:17) at process._tickCallback (internal/process/next_tick.js:68:7) error Command failed with exit code 1. ``` If the glob pattern does not contain a `+` but the pattern would match paths that do contain a `+` it will not error, but it also won't lint those files either. It seems to just ignore them. > Which rule, if any, is the bug related to? n/a > What CSS is needed to reproduce the bug? n/a > What stylelint configuration is needed to reproduce the bug? n/a > Which version of stylelint are you using? `10.1.0` > How are you running stylelint: CLI, PostCSS plugin, Node.js API? - `stylelint src/app/+route/styles.scss` - `stylelint src/app/+route` - `stylelint 'src/app/+route/styles.scss'` - `stylelint src/app/\+route/styles.scss` > Does the bug relate to non-standard syntax (e.g. SCSS, Less etc.)? n/a > What did you expect to happen? It will lint file paths that contain the `+` symbol it does not throw an error and also lints files that might be in paths that contain a `+`. > What actually happened (e.g. what warnings or errors did you get)? Doesn't lint the files or throws an error. <!-- Before posting, please check that the bug hasn't already been: 1. fixed in the next release (https://github.com/stylelint/stylelint/blob/master/CHANGELOG.md) 2. discussed previously (https://github.com/stylelint/stylelint/search) --> <!-- You can help us fix the bug more quickly by: 1. Figuring out what needs to be done and proposing it 2. Submitting a PR with failing tests. Once the bug has been confirmed, you can help out further by: 1. Writing the code and submitting a PR. --> Some initial investigation seems to suggest this might be an issue in `globby`. I tried updating `globby` to the latest version and it no longer threw the errors. However, it also didn't pick up actual linting errors for any files contained with paths that contain `+`. I've tried the same with other linters `TSLint` & `ESLint` and both seem to handle these paths fine. However, they also don't use `globby` either.
priority
fix file paths that contain the character being ignored clearly describe the bug file paths that contain a are either not linted or will fail with an error if the glob pattern itself contains a itself it will throw this error even if it s quoted or escaped error no files matching the pattern src app route were found at globby then filepaths node modules stylelint lib standalone js at process tickcallback internal process next tick js error command failed with exit code if the glob pattern does not contain a but the pattern would match paths that do contain a it will not error but it also won t lint those files either it seems to just ignore them which rule if any is the bug related to n a what css is needed to reproduce the bug n a what stylelint configuration is needed to reproduce the bug n a which version of stylelint are you using how are you running stylelint cli postcss plugin node js api stylelint src app route styles scss stylelint src app route stylelint src app route styles scss stylelint src app route styles scss does the bug relate to non standard syntax e g scss less etc n a what did you expect to happen it will lint file paths that contain the symbol it does not throw an error and also lints files that might be in paths that contain a what actually happened e g what warnings or errors did you get doesn t lint the files or throws an error before posting please check that the bug hasn t already been fixed in the next release discussed previously you can help us fix the bug more quickly by figuring out what needs to be done and proposing it submitting a pr with failing tests once the bug has been confirmed you can help out further by writing the code and submitting a pr some initial investigation seems to suggest this might be an issue in globby i tried updating globby to the latest version and it no longer threw the errors however it also didn t pick up actual linting errors for any files contained with paths that contain i ve tried the same with other linters tslint eslint and both seem to handle these paths fine however they also don t use globby either
1
66,278
16,582,799,005
IssuesEvent
2021-05-31 14:05:43
VROOM-Project/vroom
https://api.github.com/repos/VROOM-Project/vroom
closed
Update CI build image to Ubuntu 20.04
CI builds enhancement
CI runs currently use Ubuntu bionic images, which means we are checking the build against compiler versions that are (much) older than the ones currently available out of the box in recent dev/production boxes. Switching to Ubuntu focal should enable updating: - gcc from version 8 to 9; - clang from version 6 to 10. The way to do this is somehow related to the outcome of #436 but I'm still filling a dedicated ticket as we'll need it in any case at some point.
1.0
Update CI build image to Ubuntu 20.04 - CI runs currently use Ubuntu bionic images, which means we are checking the build against compiler versions that are (much) older than the ones currently available out of the box in recent dev/production boxes. Switching to Ubuntu focal should enable updating: - gcc from version 8 to 9; - clang from version 6 to 10. The way to do this is somehow related to the outcome of #436 but I'm still filling a dedicated ticket as we'll need it in any case at some point.
non_priority
update ci build image to ubuntu ci runs currently use ubuntu bionic images which means we are checking the build against compiler versions that are much older than the ones currently available out of the box in recent dev production boxes switching to ubuntu focal should enable updating gcc from version to clang from version to the way to do this is somehow related to the outcome of but i m still filling a dedicated ticket as we ll need it in any case at some point
0
147,424
5,639,410,123
IssuesEvent
2017-04-06 14:17:45
vmware/harbor
https://api.github.com/repos/vmware/harbor
closed
Members action menu is clipped on last row in datagrid
area/clarity-ui priority/p1 UX
the members action menu for a project is clipped and a scroll bar shows up when clicking on the 3 dots. <img width="1054" alt="screen shot 2017-03-31 at 9 31 09 am" src="https://cloud.githubusercontent.com/assets/626032/24553183/4b56da42-15f7-11e7-871b-da1d0441fe59.png">
1.0
Members action menu is clipped on last row in datagrid - the members action menu for a project is clipped and a scroll bar shows up when clicking on the 3 dots. <img width="1054" alt="screen shot 2017-03-31 at 9 31 09 am" src="https://cloud.githubusercontent.com/assets/626032/24553183/4b56da42-15f7-11e7-871b-da1d0441fe59.png">
priority
members action menu is clipped on last row in datagrid the members action menu for a project is clipped and a scroll bar shows up when clicking on the dots img width alt screen shot at am src
1
667,359
22,468,112,775
IssuesEvent
2022-06-22 05:03:36
pipalacademy/engage
https://api.github.com/repos/pipalacademy/engage
closed
[Story] Code review for problem submissions
priority: high
As a trainer - [x] I should be able to see review comments left by me and other trainers - [ ] I should be able to see which comments are stale - [ ] ~~I should be able to see the submissions on which my review was requested~~ - [x] I should be able to add comments on problem submissions - [ ] I should be able to add a rating for correctness and clarity As a participant - [x] I should be able to see the comments on my submission - [x] I should be able to submit again and ask for a re-review
1.0
[Story] Code review for problem submissions - As a trainer - [x] I should be able to see review comments left by me and other trainers - [ ] I should be able to see which comments are stale - [ ] ~~I should be able to see the submissions on which my review was requested~~ - [x] I should be able to add comments on problem submissions - [ ] I should be able to add a rating for correctness and clarity As a participant - [x] I should be able to see the comments on my submission - [x] I should be able to submit again and ask for a re-review
priority
code review for problem submissions as a trainer i should be able to see review comments left by me and other trainers i should be able to see which comments are stale i should be able to see the submissions on which my review was requested i should be able to add comments on problem submissions i should be able to add a rating for correctness and clarity as a participant i should be able to see the comments on my submission i should be able to submit again and ask for a re review
1
9,282
6,197,283,341
IssuesEvent
2017-07-05 16:27:05
theodi/octopub
https://api.github.com/repos/theodi/octopub
closed
How to make a Private dataset Public?
f:question fn:Usability i:enhancement
I've been experimenting with Octopub and published a private dataset https://octopub.io/datasets/321/dataset_files I can't see how to make it public. Has this been implemented?
True
How to make a Private dataset Public? - I've been experimenting with Octopub and published a private dataset https://octopub.io/datasets/321/dataset_files I can't see how to make it public. Has this been implemented?
non_priority
how to make a private dataset public i ve been experimenting with octopub and published a private dataset i can t see how to make it public has this been implemented
0
172,992
21,090,307,054
IssuesEvent
2022-04-04 03:43:58
nautobot/nautobot
https://api.github.com/repos/nautobot/nautobot
closed
API provision tokens for user
type: feature group: security
<!-- NOTE: IF YOUR ISSUE DOES NOT FOLLOW THIS TEMPLATE, IT WILL BE CLOSED. This form is only for proposing specific new features or enhancements. If you have a general idea or question, please start a discussion instead: https://github.com/nautobot/nautobot/discussions Please describe the environment in which you are running Nautobot. --> ### Environment * Python version: n/a * Nautobot version: n/a <!-- Describe in detail the new functionality you are proposing. Include any specific changes to work flows, data models, or the user interface. --> ### Proposed Functionality Netbox 3.0 added a feature where you can generate a token using the API if pass along a user/pass - https://github.com/netbox-community/netbox/commit/b038b1f613becb0298d276fa453fe844ba9e6f1e Nautobot could enhance this feature by allowing the token generation to be more customisable (set the name and the permissions). But just having what Netbox has is a good base I think. <!-- Convey an example use case for your proposed feature. Write from the perspective of a Nautobot user who would benefit from the proposed functionality and describe how. ---> ### Use Case Would like to be able to generate tokens instead of saving people's passwords somewhere. <!-- Note any changes to the database schema necessary to support the new feature. For example, does the proposal require adding a new model or field? (Not all new features require database changes.) ---> ### Database Changes None. <!-- List any new dependencies on external libraries or services that this new feature would introduce. For example, does the proposal require the installation of a new Python package? (Not all new features introduce new dependencies.) --> ### External Dependencies None.
True
API provision tokens for user - <!-- NOTE: IF YOUR ISSUE DOES NOT FOLLOW THIS TEMPLATE, IT WILL BE CLOSED. This form is only for proposing specific new features or enhancements. If you have a general idea or question, please start a discussion instead: https://github.com/nautobot/nautobot/discussions Please describe the environment in which you are running Nautobot. --> ### Environment * Python version: n/a * Nautobot version: n/a <!-- Describe in detail the new functionality you are proposing. Include any specific changes to work flows, data models, or the user interface. --> ### Proposed Functionality Netbox 3.0 added a feature where you can generate a token using the API if pass along a user/pass - https://github.com/netbox-community/netbox/commit/b038b1f613becb0298d276fa453fe844ba9e6f1e Nautobot could enhance this feature by allowing the token generation to be more customisable (set the name and the permissions). But just having what Netbox has is a good base I think. <!-- Convey an example use case for your proposed feature. Write from the perspective of a Nautobot user who would benefit from the proposed functionality and describe how. ---> ### Use Case Would like to be able to generate tokens instead of saving people's passwords somewhere. <!-- Note any changes to the database schema necessary to support the new feature. For example, does the proposal require adding a new model or field? (Not all new features require database changes.) ---> ### Database Changes None. <!-- List any new dependencies on external libraries or services that this new feature would introduce. For example, does the proposal require the installation of a new Python package? (Not all new features introduce new dependencies.) --> ### External Dependencies None.
non_priority
api provision tokens for user note if your issue does not follow this template it will be closed this form is only for proposing specific new features or enhancements if you have a general idea or question please start a discussion instead please describe the environment in which you are running nautobot environment python version n a nautobot version n a describe in detail the new functionality you are proposing include any specific changes to work flows data models or the user interface proposed functionality netbox added a feature where you can generate a token using the api if pass along a user pass nautobot could enhance this feature by allowing the token generation to be more customisable set the name and the permissions but just having what netbox has is a good base i think convey an example use case for your proposed feature write from the perspective of a nautobot user who would benefit from the proposed functionality and describe how use case would like to be able to generate tokens instead of saving people s passwords somewhere note any changes to the database schema necessary to support the new feature for example does the proposal require adding a new model or field not all new features require database changes database changes none list any new dependencies on external libraries or services that this new feature would introduce for example does the proposal require the installation of a new python package not all new features introduce new dependencies external dependencies none
0
273,394
23,750,016,081
IssuesEvent
2022-08-31 19:40:06
Satellite-im/Core-PWA
https://api.github.com/repos/Satellite-im/Core-PWA
closed
AP-1409: Event not being triggered when using the same account on 2 different places
bug ready-to-test-in-dev
STR: use a account with a pending request on 2 browsers accept the request on one of the browsers the other browser still shows the request pending seems is missing an event to update the request being accepted [file id="36afa724-b40f-4bbc-bdc1-eef76bdc09bf"]
1.0
AP-1409: Event not being triggered when using the same account on 2 different places - STR: use a account with a pending request on 2 browsers accept the request on one of the browsers the other browser still shows the request pending seems is missing an event to update the request being accepted [file id="36afa724-b40f-4bbc-bdc1-eef76bdc09bf"]
non_priority
ap event not being triggered when using the same account on different places str use a account with a pending request on browsers accept the request on one of the browsers the other browser still shows the request pending seems is missing an event to update the request being accepted
0
114,164
4,614,986,610
IssuesEvent
2016-09-25 21:39:24
radiasoft/sirepo
https://api.github.com/repos/radiasoft/sirepo
closed
uwsgi and/or log output UserAgent
1st Priority
The uwsgi log doesn't give enough operational information. It should output the UserAgent and possibly the client IP (proxy must forward this).
1.0
uwsgi and/or log output UserAgent - The uwsgi log doesn't give enough operational information. It should output the UserAgent and possibly the client IP (proxy must forward this).
priority
uwsgi and or log output useragent the uwsgi log doesn t give enough operational information it should output the useragent and possibly the client ip proxy must forward this
1
131,184
18,245,471,265
IssuesEvent
2021-10-01 17:46:47
HTTPArchive/almanac.httparchive.org
https://api.github.com/repos/HTTPArchive/almanac.httparchive.org
closed
Chart UI accessibility
bug design accessibility
Some accessibility-related things I noticed with the colors + text applied - There are some instances where white text is used on green bars - for example [fonts chapter has a graph](https://almanac.httparchive.org/en/2020/http2#fig-19) where the % is shown as white on the green bar (failing text color contrast) vs [accessibility where it's black](https://almanac.httparchive.org/en/2020/http2#fig-19) <img width="656" alt="fonts chapter" src="https://user-images.githubusercontent.com/22671477/120258885-dae4aa80-c260-11eb-9f58-f5e3ff1a3d4b.png"> <img width="616" alt="accessibility chapter" src="https://user-images.githubusercontent.com/22671477/120258896-e041f500-c260-11eb-938c-a1e0189c19f9.png"> - Similar issues with white text on red bars - e.g. [media chapter](https://almanac.httparchive.org/en/2020/media#fig-4) (failing text contrast) <img width="644" alt="media" src="https://user-images.githubusercontent.com/22671477/120259261-9efe1500-c261-11eb-899c-a9e32c9eec7c.png"> - ["heatmap" on the web font page](https://almanac.httparchive.org/en/2020/fonts#fig-2) is using a red-green scale, which isn't a color blind friendly option. [Color brewer has a list of colour-blind friendly palettes](https://colorbrewer2.org/#type=diverging&scheme=RdBu&n=3) we can pick for a diverging scale, including red-blue <img width="727" alt="font" src="https://user-images.githubusercontent.com/22671477/120259655-601c8f00-c262-11eb-929d-a3c48d5b4a61.png"> - a lot of graphs have colors placed side by side which may not have sufficient contrast between them. If we add white dividers between the slices/bars/etc it should make it easier to see. E.g. [e-commerce chart today](https://almanac.httparchive.org/en/2020/ecommerce#fig-4). [WCAG has some sample techniques](https://www.w3.org/WAI/WCAG21/Understanding/non-text-contrast.html) on their site. <img width="713" alt="ecommerce" src="https://user-images.githubusercontent.com/22671477/120259915-da4d1380-c262-11eb-9a23-48600981a5cd.png"> - generally wondering how the categorial colors are selected, and if we want to use one of [color brewer's suggested ones](https://colorbrewer2.org/#type=qualitative&scheme=Dark2&n=3)
1.0
Chart UI accessibility - Some accessibility-related things I noticed with the colors + text applied - There are some instances where white text is used on green bars - for example [fonts chapter has a graph](https://almanac.httparchive.org/en/2020/http2#fig-19) where the % is shown as white on the green bar (failing text color contrast) vs [accessibility where it's black](https://almanac.httparchive.org/en/2020/http2#fig-19) <img width="656" alt="fonts chapter" src="https://user-images.githubusercontent.com/22671477/120258885-dae4aa80-c260-11eb-9f58-f5e3ff1a3d4b.png"> <img width="616" alt="accessibility chapter" src="https://user-images.githubusercontent.com/22671477/120258896-e041f500-c260-11eb-938c-a1e0189c19f9.png"> - Similar issues with white text on red bars - e.g. [media chapter](https://almanac.httparchive.org/en/2020/media#fig-4) (failing text contrast) <img width="644" alt="media" src="https://user-images.githubusercontent.com/22671477/120259261-9efe1500-c261-11eb-899c-a9e32c9eec7c.png"> - ["heatmap" on the web font page](https://almanac.httparchive.org/en/2020/fonts#fig-2) is using a red-green scale, which isn't a color blind friendly option. [Color brewer has a list of colour-blind friendly palettes](https://colorbrewer2.org/#type=diverging&scheme=RdBu&n=3) we can pick for a diverging scale, including red-blue <img width="727" alt="font" src="https://user-images.githubusercontent.com/22671477/120259655-601c8f00-c262-11eb-929d-a3c48d5b4a61.png"> - a lot of graphs have colors placed side by side which may not have sufficient contrast between them. If we add white dividers between the slices/bars/etc it should make it easier to see. E.g. [e-commerce chart today](https://almanac.httparchive.org/en/2020/ecommerce#fig-4). [WCAG has some sample techniques](https://www.w3.org/WAI/WCAG21/Understanding/non-text-contrast.html) on their site. <img width="713" alt="ecommerce" src="https://user-images.githubusercontent.com/22671477/120259915-da4d1380-c262-11eb-9a23-48600981a5cd.png"> - generally wondering how the categorial colors are selected, and if we want to use one of [color brewer's suggested ones](https://colorbrewer2.org/#type=qualitative&scheme=Dark2&n=3)
non_priority
chart ui accessibility some accessibility related things i noticed with the colors text applied there are some instances where white text is used on green bars for example where the is shown as white on the green bar failing text color contrast vs img width alt fonts chapter src img width alt accessibility chapter src similar issues with white text on red bars e g failing text contrast img width alt media src is using a red green scale which isn t a color blind friendly option we can pick for a diverging scale including red blue img width alt font src a lot of graphs have colors placed side by side which may not have sufficient contrast between them if we add white dividers between the slices bars etc it should make it easier to see e g on their site img width alt ecommerce src generally wondering how the categorial colors are selected and if we want to use one of
0
523,387
15,180,659,382
IssuesEvent
2021-02-15 00:46:20
blchelle/ribbit
https://api.github.com/repos/blchelle/ribbit
closed
Delete 'forgot password' token after a successful reset
Length: Less than 5 hours Priority: Medium Status: In Progress Type: Enhancement
## Description When a user successfully resets their password, delete their token from Redis. This isn't really a security vulnerability. It's more related to a better UX.
1.0
Delete 'forgot password' token after a successful reset - ## Description When a user successfully resets their password, delete their token from Redis. This isn't really a security vulnerability. It's more related to a better UX.
priority
delete forgot password token after a successful reset description when a user successfully resets their password delete their token from redis this isn t really a security vulnerability it s more related to a better ux
1
33,355
2,764,254,499
IssuesEvent
2015-04-29 14:37:15
dmwm/WMCore
https://api.github.com/repos/dmwm/WMCore
closed
Show the CE and Workernode in WMStats for jobs in failed and in cooloff
Medium Priority New Feature WMAgent WMStats
Hi, During the O&C week it was requested we need the pilot jobs to pass the CE to the WMAgent job and then this one should do the following: 1. Report the correct CE to dashboard 2. For failed and cooloff jobs it should correctly show in wmstats the workernode where it ran aswell as the CE.
1.0
Show the CE and Workernode in WMStats for jobs in failed and in cooloff - Hi, During the O&C week it was requested we need the pilot jobs to pass the CE to the WMAgent job and then this one should do the following: 1. Report the correct CE to dashboard 2. For failed and cooloff jobs it should correctly show in wmstats the workernode where it ran aswell as the CE.
priority
show the ce and workernode in wmstats for jobs in failed and in cooloff hi during the o c week it was requested we need the pilot jobs to pass the ce to the wmagent job and then this one should do the following report the correct ce to dashboard for failed and cooloff jobs it should correctly show in wmstats the workernode where it ran aswell as the ce
1
280,889
30,862,887,973
IssuesEvent
2023-08-03 05:32:55
momo-tong/struts2-core-2.5.16
https://api.github.com/repos/momo-tong/struts2-core-2.5.16
opened
struts2-core-2.5.16.jar: 10 vulnerabilities (highest severity is: 9.8)
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p></summary> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (struts2-core version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-31805](https://www.mend.io/vulnerability-database/CVE-2021-31805) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | struts2-core-2.5.16.jar | Direct | org.apache.struts:struts2-core:2.5.30 | &#10060; | | [CVE-2020-17530](https://www.mend.io/vulnerability-database/CVE-2020-17530) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | struts2-core-2.5.16.jar | Direct | 2.5.26 | &#10060; | | [CVE-2019-0230](https://www.mend.io/vulnerability-database/CVE-2019-0230) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | struts2-core-2.5.16.jar | Direct | 2.5.22 | &#10060; | | [CVE-2018-11776](https://www.mend.io/vulnerability-database/CVE-2018-11776) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | struts2-core-2.5.16.jar | Direct | 2.5.17 | &#10060; | | [CVE-2023-34396](https://www.mend.io/vulnerability-database/CVE-2023-34396) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | struts2-core-2.5.16.jar | Direct | 2.5.31 | &#10060; | | [WS-2014-0034](https://commons.apache.org/proper/commons-fileupload/changes-report.html) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | commons-fileupload-1.3.3.jar | Transitive | 2.5.20 | &#10060; | | [CVE-2023-24998](https://www.mend.io/vulnerability-database/CVE-2023-24998) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | commons-fileupload-1.3.3.jar | Transitive | 6.1.2 | &#10060; | | [CVE-2019-0233](https://www.mend.io/vulnerability-database/CVE-2019-0233) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | struts2-core-2.5.16.jar | Direct | 2.5.22 | &#10060; | | [CVE-2023-34149](https://www.mend.io/vulnerability-database/CVE-2023-34149) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.5 | struts2-core-2.5.16.jar | Direct | 2.5.31 | &#10060; | | [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 4.8 | commons-io-2.5.jar | Transitive | 6.1.2 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2021-31805</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation. <p>Publish Date: 2022-04-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-31805>CVE-2021-31805</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cwiki.apache.org/confluence/display/WW/S2-062">https://cwiki.apache.org/confluence/display/WW/S2-062</a></p> <p>Release Date: 2022-04-12</p> <p>Fix Resolution: org.apache.struts:struts2-core:2.5.30</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-17530</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-17530>CVE-2020-17530</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cwiki.apache.org/confluence/display/WW/S2-061">https://cwiki.apache.org/confluence/display/WW/S2-061</a></p> <p>Release Date: 2020-12-11</p> <p>Fix Resolution: 2.5.26</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-0230</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. <p>Publish Date: 2020-09-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-0230>CVE-2019-0230</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cwiki.apache.org/confluence/display/ww/s2-059">https://cwiki.apache.org/confluence/display/ww/s2-059</a></p> <p>Release Date: 2020-09-14</p> <p>Fix Resolution: 2.5.22</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2018-11776</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace. <p>Publish Date: 2018-08-22 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-11776>CVE-2018-11776</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-11776">https://nvd.nist.gov/vuln/detail/CVE-2018-11776</a></p> <p>Release Date: 2018-08-22</p> <p>Fix Resolution: 2.5.17</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2023-34396</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater <p>Publish Date: 2023-06-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-34396>CVE-2023-34396</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-4g42-gqrg-4633">https://github.com/advisories/GHSA-4g42-gqrg-4633</a></p> <p>Release Date: 2023-06-14</p> <p>Fix Resolution: 2.5.31</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> WS-2014-0034</summary> ### Vulnerable Library - <b>commons-fileupload-1.3.3.jar</b></p> <p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.3/commons-fileupload-1.3.3.jar</p> <p> Dependency Hierarchy: - struts2-core-2.5.16.jar (Root Library) - :x: **commons-fileupload-1.3.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The class FileUploadBase in Apache Commons Fileupload before 1.4 has potential resource leak - InputStream not closed on exception. <p>Publish Date: 2014-02-17 <p>URL: <a href=https://commons.apache.org/proper/commons-fileupload/changes-report.html>WS-2014-0034</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2014-02-17</p> <p>Fix Resolution (commons-fileupload:commons-fileupload): 1.4</p> <p>Direct dependency fix Resolution (org.apache.struts:struts2-core): 2.5.20</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2023-24998</summary> ### Vulnerable Library - <b>commons-fileupload-1.3.3.jar</b></p> <p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.3/commons-fileupload-1.3.3.jar</p> <p> Dependency Hierarchy: - struts2-core-2.5.16.jar (Root Library) - :x: **commons-fileupload-1.3.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. <p>Publish Date: 2023-02-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-24998>CVE-2023-24998</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tomcat.apache.org/security-10.html">https://tomcat.apache.org/security-10.html</a></p> <p>Release Date: 2023-02-20</p> <p>Fix Resolution (commons-fileupload:commons-fileupload): 1.5</p> <p>Direct dependency fix Resolution (org.apache.struts:struts2-core): 6.1.2</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2019-0233</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload. <p>Publish Date: 2020-09-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-0233>CVE-2019-0233</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cwiki.apache.org/confluence/display/ww/s2-060">https://cwiki.apache.org/confluence/display/ww/s2-060</a></p> <p>Release Date: 2020-09-14</p> <p>Fix Resolution: 2.5.22</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2023-34149</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater. <p>Publish Date: 2023-06-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-34149>CVE-2023-34149</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-8f6x-v685-g2xc">https://github.com/advisories/GHSA-8f6x-v685-g2xc</a></p> <p>Release Date: 2023-06-14</p> <p>Fix Resolution: 2.5.31</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-29425</summary> ### Vulnerable Library - <b>commons-io-2.5.jar</b></p> <p>The Apache Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-io/">http://commons.apache.org/proper/commons-io/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.5/commons-io-2.5.jar</p> <p> Dependency Hierarchy: - struts2-core-2.5.16.jar (Root Library) - commons-fileupload-1.3.3.jar - :x: **commons-io-2.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value. <p>Publish Date: 2021-04-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-29425>CVE-2021-29425</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>4.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425</a></p> <p>Release Date: 2021-04-13</p> <p>Fix Resolution (commons-io:commons-io): 2.7</p> <p>Direct dependency fix Resolution (org.apache.struts:struts2-core): 6.1.2</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
True
struts2-core-2.5.16.jar: 10 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p></summary> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (struts2-core version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-31805](https://www.mend.io/vulnerability-database/CVE-2021-31805) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | struts2-core-2.5.16.jar | Direct | org.apache.struts:struts2-core:2.5.30 | &#10060; | | [CVE-2020-17530](https://www.mend.io/vulnerability-database/CVE-2020-17530) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | struts2-core-2.5.16.jar | Direct | 2.5.26 | &#10060; | | [CVE-2019-0230](https://www.mend.io/vulnerability-database/CVE-2019-0230) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | struts2-core-2.5.16.jar | Direct | 2.5.22 | &#10060; | | [CVE-2018-11776](https://www.mend.io/vulnerability-database/CVE-2018-11776) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | struts2-core-2.5.16.jar | Direct | 2.5.17 | &#10060; | | [CVE-2023-34396](https://www.mend.io/vulnerability-database/CVE-2023-34396) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | struts2-core-2.5.16.jar | Direct | 2.5.31 | &#10060; | | [WS-2014-0034](https://commons.apache.org/proper/commons-fileupload/changes-report.html) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | commons-fileupload-1.3.3.jar | Transitive | 2.5.20 | &#10060; | | [CVE-2023-24998](https://www.mend.io/vulnerability-database/CVE-2023-24998) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | commons-fileupload-1.3.3.jar | Transitive | 6.1.2 | &#10060; | | [CVE-2019-0233](https://www.mend.io/vulnerability-database/CVE-2019-0233) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | struts2-core-2.5.16.jar | Direct | 2.5.22 | &#10060; | | [CVE-2023-34149](https://www.mend.io/vulnerability-database/CVE-2023-34149) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.5 | struts2-core-2.5.16.jar | Direct | 2.5.31 | &#10060; | | [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 4.8 | commons-io-2.5.jar | Transitive | 6.1.2 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2021-31805</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation. <p>Publish Date: 2022-04-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-31805>CVE-2021-31805</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cwiki.apache.org/confluence/display/WW/S2-062">https://cwiki.apache.org/confluence/display/WW/S2-062</a></p> <p>Release Date: 2022-04-12</p> <p>Fix Resolution: org.apache.struts:struts2-core:2.5.30</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-17530</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-17530>CVE-2020-17530</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cwiki.apache.org/confluence/display/WW/S2-061">https://cwiki.apache.org/confluence/display/WW/S2-061</a></p> <p>Release Date: 2020-12-11</p> <p>Fix Resolution: 2.5.26</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-0230</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. <p>Publish Date: 2020-09-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-0230>CVE-2019-0230</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cwiki.apache.org/confluence/display/ww/s2-059">https://cwiki.apache.org/confluence/display/ww/s2-059</a></p> <p>Release Date: 2020-09-14</p> <p>Fix Resolution: 2.5.22</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2018-11776</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace. <p>Publish Date: 2018-08-22 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-11776>CVE-2018-11776</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-11776">https://nvd.nist.gov/vuln/detail/CVE-2018-11776</a></p> <p>Release Date: 2018-08-22</p> <p>Fix Resolution: 2.5.17</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2023-34396</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater <p>Publish Date: 2023-06-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-34396>CVE-2023-34396</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-4g42-gqrg-4633">https://github.com/advisories/GHSA-4g42-gqrg-4633</a></p> <p>Release Date: 2023-06-14</p> <p>Fix Resolution: 2.5.31</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> WS-2014-0034</summary> ### Vulnerable Library - <b>commons-fileupload-1.3.3.jar</b></p> <p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.3/commons-fileupload-1.3.3.jar</p> <p> Dependency Hierarchy: - struts2-core-2.5.16.jar (Root Library) - :x: **commons-fileupload-1.3.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The class FileUploadBase in Apache Commons Fileupload before 1.4 has potential resource leak - InputStream not closed on exception. <p>Publish Date: 2014-02-17 <p>URL: <a href=https://commons.apache.org/proper/commons-fileupload/changes-report.html>WS-2014-0034</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2014-02-17</p> <p>Fix Resolution (commons-fileupload:commons-fileupload): 1.4</p> <p>Direct dependency fix Resolution (org.apache.struts:struts2-core): 2.5.20</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2023-24998</summary> ### Vulnerable Library - <b>commons-fileupload-1.3.3.jar</b></p> <p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.3/commons-fileupload-1.3.3.jar</p> <p> Dependency Hierarchy: - struts2-core-2.5.16.jar (Root Library) - :x: **commons-fileupload-1.3.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. <p>Publish Date: 2023-02-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-24998>CVE-2023-24998</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tomcat.apache.org/security-10.html">https://tomcat.apache.org/security-10.html</a></p> <p>Release Date: 2023-02-20</p> <p>Fix Resolution (commons-fileupload:commons-fileupload): 1.5</p> <p>Direct dependency fix Resolution (org.apache.struts:struts2-core): 6.1.2</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2019-0233</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload. <p>Publish Date: 2020-09-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-0233>CVE-2019-0233</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cwiki.apache.org/confluence/display/ww/s2-060">https://cwiki.apache.org/confluence/display/ww/s2-060</a></p> <p>Release Date: 2020-09-14</p> <p>Fix Resolution: 2.5.22</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2023-34149</summary> ### Vulnerable Library - <b>struts2-core-2.5.16.jar</b></p> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/">http://struts.apache.org/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.5.16/struts2-core-2.5.16.jar</p> <p> Dependency Hierarchy: - :x: **struts2-core-2.5.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater. <p>Publish Date: 2023-06-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-34149>CVE-2023-34149</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-8f6x-v685-g2xc">https://github.com/advisories/GHSA-8f6x-v685-g2xc</a></p> <p>Release Date: 2023-06-14</p> <p>Fix Resolution: 2.5.31</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-29425</summary> ### Vulnerable Library - <b>commons-io-2.5.jar</b></p> <p>The Apache Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-io/">http://commons.apache.org/proper/commons-io/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.5/commons-io-2.5.jar</p> <p> Dependency Hierarchy: - struts2-core-2.5.16.jar (Root Library) - commons-fileupload-1.3.3.jar - :x: **commons-io-2.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/struts2-core-2.5.16/commit/bab45b0cda5bbc717574c5e8f4c5447c2a784540">bab45b0cda5bbc717574c5e8f4c5447c2a784540</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value. <p>Publish Date: 2021-04-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-29425>CVE-2021-29425</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>4.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425</a></p> <p>Release Date: 2021-04-13</p> <p>Fix Resolution (commons-io:commons-io): 2.7</p> <p>Direct dependency fix Resolution (org.apache.struts:struts2-core): 6.1.2</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
non_priority
core jar vulnerabilities highest severity is vulnerable library core jar apache struts library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org apache struts core core jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in core version remediation available critical core jar direct org apache struts core critical core jar direct critical core jar direct high core jar direct high core jar direct high commons fileupload jar transitive high commons fileupload jar transitive high core jar direct medium core jar direct medium commons io jar transitive details cve vulnerable library core jar apache struts library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org apache struts core core jar dependency hierarchy x core jar vulnerable library found in head commit a href found in base branch master vulnerability details the fix issued for cve was incomplete so from apache struts to still some of the tag’s attributes could perform a double evaluation if a developer applied forced ognl evaluation by using the syntax using forced ognl evaluation on untrusted user input can lead to a remote code execution and security degradation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache struts core step up your open source security game with mend cve vulnerable library core jar apache struts library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org apache struts core core jar dependency hierarchy x core jar vulnerable library found in head commit a href found in base branch master vulnerability details forced ognl evaluation when evaluated on raw user input in tag attributes may lead to remote code execution affected software apache struts struts publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library core jar apache struts library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org apache struts core core jar dependency hierarchy x core jar vulnerable library found in head commit a href found in base branch master vulnerability details apache struts to forced double ognl evaluation when evaluated on raw user input in tag attributes may lead to remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library core jar apache struts library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org apache struts core core jar dependency hierarchy x core jar vulnerable library found in head commit a href found in base branch master vulnerability details apache struts versions to and to suffer from possible remote code execution when alwaysselectfullnamespace is true either by user or a plugin like convention plugin and then results are used with no namespace and in same time its upper package have no or wildcard namespace and similar to results same possibility when using url tag which doesn t have value and action set and in same time its upper package have no or wildcard namespace publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library core jar apache struts library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org apache struts core core jar dependency hierarchy x core jar vulnerable library found in head commit a href found in base branch master vulnerability details allocation of resources without limits or throttling vulnerability in apache software foundation apache struts this issue affects apache struts through through upgrade to struts or or greater publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend ws vulnerable library commons fileupload jar the apache commons fileupload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons fileupload commons fileupload commons fileupload jar dependency hierarchy core jar root library x commons fileupload jar vulnerable library found in head commit a href found in base branch master vulnerability details the class fileuploadbase in apache commons fileupload before has potential resource leak inputstream not closed on exception publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution commons fileupload commons fileupload direct dependency fix resolution org apache struts core step up your open source security game with mend cve vulnerable library commons fileupload jar the apache commons fileupload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons fileupload commons fileupload commons fileupload jar dependency hierarchy core jar root library x commons fileupload jar vulnerable library found in head commit a href found in base branch master vulnerability details apache commons fileupload before does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a dos with a malicious upload or series of uploads note that like all of the file upload limits the new configuration option fileuploadbase setfilecountmax is not enabled by default and must be explicitly configured publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons fileupload commons fileupload direct dependency fix resolution org apache struts core step up your open source security game with mend cve vulnerable library core jar apache struts library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org apache struts core core jar dependency hierarchy x core jar vulnerable library found in head commit a href found in base branch master vulnerability details an access permission override in apache struts to may cause a denial of service when performing a file upload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library core jar apache struts library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org apache struts core core jar dependency hierarchy x core jar vulnerable library found in head commit a href found in base branch master vulnerability details allocation of resources without limits or throttling vulnerability in apache software foundation apache struts this issue affects apache struts through through upgrade to struts or or greater publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library commons io jar the apache commons io library contains utility classes stream implementations file filters file comparators endian transformation classes and much more library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons io commons io commons io jar dependency hierarchy core jar root library commons fileupload jar x commons io jar vulnerable library found in head commit a href found in base branch master vulnerability details in apache commons io before when invoking the method filenameutils normalize with an improper input string like foo or foo the result would be the same value thus possibly providing access to files in the parent directory but not further above thus limited path traversal if the calling code would use the result to construct a path value publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons io commons io direct dependency fix resolution org apache struts core step up your open source security game with mend
0
139,324
18,850,332,442
IssuesEvent
2021-11-11 19:57:54
snowdensb/sonar-xanitizer
https://api.github.com/repos/snowdensb/sonar-xanitizer
opened
CVE-2019-0227 (High) detected in axis-1.4.jar
security vulnerability
## CVE-2019-0227 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axis-1.4.jar</b></p></summary> <p>An implementation of the SOAP ("Simple Object Access Protocol") submission to W3C.</p> <p>Library home page: <a href="http://ws.apache.org/axis">http://ws.apache.org/axis</a></p> <p>Path to vulnerable library: /src/test/resources/webgoat/WEB-INF/lib/axis-1.4.jar</p> <p> Dependency Hierarchy: - :x: **axis-1.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snowdensb/sonar-xanitizer/commit/e2144e84b1fdbf18c01c24e6ab9ade7b45b25283">e2144e84b1fdbf18c01c24e6ab9ade7b45b25283</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue. <p>Publish Date: 2019-05-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0227>CVE-2019-0227</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/">https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/</a></p> <p>Release Date: 2019-05-01</p> <p>Fix Resolution: org.apache.axis2:axis2:1.7.9</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"axis","packageName":"axis","packageVersion":"1.4","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"axis:axis:1.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.axis2:axis2:1.7.9"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-0227","vulnerabilityDetails":"A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0227","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Adjacent","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-0227 (High) detected in axis-1.4.jar - ## CVE-2019-0227 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axis-1.4.jar</b></p></summary> <p>An implementation of the SOAP ("Simple Object Access Protocol") submission to W3C.</p> <p>Library home page: <a href="http://ws.apache.org/axis">http://ws.apache.org/axis</a></p> <p>Path to vulnerable library: /src/test/resources/webgoat/WEB-INF/lib/axis-1.4.jar</p> <p> Dependency Hierarchy: - :x: **axis-1.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snowdensb/sonar-xanitizer/commit/e2144e84b1fdbf18c01c24e6ab9ade7b45b25283">e2144e84b1fdbf18c01c24e6ab9ade7b45b25283</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue. <p>Publish Date: 2019-05-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0227>CVE-2019-0227</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/">https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/</a></p> <p>Release Date: 2019-05-01</p> <p>Fix Resolution: org.apache.axis2:axis2:1.7.9</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"axis","packageName":"axis","packageVersion":"1.4","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"axis:axis:1.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.axis2:axis2:1.7.9"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-0227","vulnerabilityDetails":"A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-0227","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Adjacent","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in axis jar cve high severity vulnerability vulnerable library axis jar an implementation of the soap simple object access protocol submission to library home page a href path to vulnerable library src test resources webgoat web inf lib axis jar dependency hierarchy x axis jar vulnerable library found in head commit a href found in base branch master vulnerability details a server side request forgery ssrf vulnerability affected the apache axis distribution that was last released in security and bug commits commits continue in the projects axis x subversion repository legacy users are encouraged to build from source the successor to axis x is the latest version is and is not vulnerable to this issue publish date url a href cvss score details base score metrics exploitability metrics attack vector adjacent attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree axis axis isminimumfixversionavailable true minimumfixversion org apache basebranches vulnerabilityidentifier cve vulnerabilitydetails a server side request forgery ssrf vulnerability affected the apache axis distribution that was last released in security and bug commits commits continue in the projects axis x subversion repository legacy users are encouraged to build from source the successor to axis x is the latest version is and is not vulnerable to this issue vulnerabilityurl
0
644,285
20,972,829,348
IssuesEvent
2022-03-28 12:58:05
mito-ds/monorepo
https://api.github.com/repos/mito-ds/monorepo
closed
Pivot table aggregation methods like `median` should be disabled for non-number columns
type: mitosheet effort: 2 priority: low
**Describe the bug** Add a row to a pivot table, and then a value that is a string column. Set the aggregation method to `mean`, and get an error. **Expected behavior** The invalid options for the value aggregation should be disabled (with an error message) on non-number columns (e.g. everything but count, and count unique).
1.0
Pivot table aggregation methods like `median` should be disabled for non-number columns - **Describe the bug** Add a row to a pivot table, and then a value that is a string column. Set the aggregation method to `mean`, and get an error. **Expected behavior** The invalid options for the value aggregation should be disabled (with an error message) on non-number columns (e.g. everything but count, and count unique).
priority
pivot table aggregation methods like median should be disabled for non number columns describe the bug add a row to a pivot table and then a value that is a string column set the aggregation method to mean and get an error expected behavior the invalid options for the value aggregation should be disabled with an error message on non number columns e g everything but count and count unique
1
596,194
18,099,854,580
IssuesEvent
2021-09-22 13:11:53
Timonwa/pelumi-akintokun
https://api.github.com/repos/Timonwa/pelumi-akintokun
opened
Refactor projects section
enhancement Medium priority
Add a json file for projects details and write JavaScript that uses only one project card and updates or adds more depending on the projects in the json file to reduce the HTML code.
1.0
Refactor projects section - Add a json file for projects details and write JavaScript that uses only one project card and updates or adds more depending on the projects in the json file to reduce the HTML code.
priority
refactor projects section add a json file for projects details and write javascript that uses only one project card and updates or adds more depending on the projects in the json file to reduce the html code
1
339,563
10,256,197,883
IssuesEvent
2019-08-21 17:04:57
ngageoint/hootenanny-ui
https://api.github.com/repos/ngageoint/hootenanny-ui
closed
UI adv opts sends mismatching matcher/merger config strings to web service
Category: UI Defined Priority: High Type: Bug
**Don't start on this until https://github.com/ngageoint/hootenanny/pull/2148 is merged.** The hoot core settings "match.creators" and "merger.creators" are both a semicolon delimited string made of individual matchers/mergers and always must be of the same length. Currently, the UI adv opts sends strings with different numbers of inputs for each. As part of [2145](https://github.com/ngageoint/hootenanny/issues/2145) a check was added to core to throw an exception when this happens. When running on the ? branch now, you will see an error like this if a mismatch is sent to the web services: `22:05:43.787 DEBUG ...core/conflate/MatchFactory.cpp( 154) matchCreators: [5]{hoot::PoiPolygonMatchCreator, hoot::NetworkMatchCreator, hoot::BuildingMatchCreator, hoot::ScriptMatchCreator,PoiGeneric.js, hoot::ScriptMatchCreator,LinearWaterway.js} 22:05:43.788 DEBUG ...core/conflate/MatchFactory.cpp( 156) mergerCreators: [4]{hoot::PoiPolygonMergerCreator, hoot::NetworkMergerCreator, hoot::BuildingMergerCreator, hoot::ScriptMergerCreator} ], stderr=[Error running conflate: The number of configured match creators (5) does not equal the number of configured merger creators (4)` The adv opts UI needs to be corrected so that the number of matchers/creators is the same. The overall ordering of matchers/creators in both config strings is not important (e.g. match.creators="hoot::BuildingMatchCreator;hoot::NetworkMatchCreator" is equivalent to match.creators="hoot::NetworkMatchCreator;hoot::BuildingMatchCreator"), but each entry in the matchers list always needs to match in the correct order with the corresponding entry in the mergers list. (e.g. the following would be wrong: match.creators="hoot::BuildingMatchCreator;hoot::NetworkMatchCreator" and merger.creators=""hoot::NetworkMergerCreator;hoot::BuildingMergerCreator). Here is the current list of matchers and valid mergers: - hoot::BuildingMatchCreator/hoot::BuildingMergerCreator - hoot::HighwayMatchCreator/hoot::HighwaySnapMergerCreator - hoot::NetworkMatchCreator/hoot::NetworkMergerCreator - hoot::PoiPolygonMatchCreator/hoot::PoiPolygonMergerCreator - hoot::ScriptMatchCreator,Area.js/hoot::ScriptMergerCreator - hoot::ScriptMatchCreator,LinearWaterway.js/hoot::ScriptMergerCreator - hoot::ScriptMatchCreator,PoiGeneric.js/hoot::ScriptMergerCreator There must always be a separate hoot::ScriptMergerCreator entry for each hoot::ScriptMatchCreator,* entry. For more info on matchers/mergers, see [match creators](https://github.com/ngageoint/hootenanny/blob/develop/conf/core/ConfigOptions.asciidoc#matchcreators) and [merger creators](https://github.com/ngageoint/hootenanny/blob/develop/conf/core/ConfigOptions.asciidoc#mergercreators). When this and the following options are done, the autocorrect.options parameter can be removed from both the UI and the core: * #969 * #970 * #971
1.0
UI adv opts sends mismatching matcher/merger config strings to web service - **Don't start on this until https://github.com/ngageoint/hootenanny/pull/2148 is merged.** The hoot core settings "match.creators" and "merger.creators" are both a semicolon delimited string made of individual matchers/mergers and always must be of the same length. Currently, the UI adv opts sends strings with different numbers of inputs for each. As part of [2145](https://github.com/ngageoint/hootenanny/issues/2145) a check was added to core to throw an exception when this happens. When running on the ? branch now, you will see an error like this if a mismatch is sent to the web services: `22:05:43.787 DEBUG ...core/conflate/MatchFactory.cpp( 154) matchCreators: [5]{hoot::PoiPolygonMatchCreator, hoot::NetworkMatchCreator, hoot::BuildingMatchCreator, hoot::ScriptMatchCreator,PoiGeneric.js, hoot::ScriptMatchCreator,LinearWaterway.js} 22:05:43.788 DEBUG ...core/conflate/MatchFactory.cpp( 156) mergerCreators: [4]{hoot::PoiPolygonMergerCreator, hoot::NetworkMergerCreator, hoot::BuildingMergerCreator, hoot::ScriptMergerCreator} ], stderr=[Error running conflate: The number of configured match creators (5) does not equal the number of configured merger creators (4)` The adv opts UI needs to be corrected so that the number of matchers/creators is the same. The overall ordering of matchers/creators in both config strings is not important (e.g. match.creators="hoot::BuildingMatchCreator;hoot::NetworkMatchCreator" is equivalent to match.creators="hoot::NetworkMatchCreator;hoot::BuildingMatchCreator"), but each entry in the matchers list always needs to match in the correct order with the corresponding entry in the mergers list. (e.g. the following would be wrong: match.creators="hoot::BuildingMatchCreator;hoot::NetworkMatchCreator" and merger.creators=""hoot::NetworkMergerCreator;hoot::BuildingMergerCreator). Here is the current list of matchers and valid mergers: - hoot::BuildingMatchCreator/hoot::BuildingMergerCreator - hoot::HighwayMatchCreator/hoot::HighwaySnapMergerCreator - hoot::NetworkMatchCreator/hoot::NetworkMergerCreator - hoot::PoiPolygonMatchCreator/hoot::PoiPolygonMergerCreator - hoot::ScriptMatchCreator,Area.js/hoot::ScriptMergerCreator - hoot::ScriptMatchCreator,LinearWaterway.js/hoot::ScriptMergerCreator - hoot::ScriptMatchCreator,PoiGeneric.js/hoot::ScriptMergerCreator There must always be a separate hoot::ScriptMergerCreator entry for each hoot::ScriptMatchCreator,* entry. For more info on matchers/mergers, see [match creators](https://github.com/ngageoint/hootenanny/blob/develop/conf/core/ConfigOptions.asciidoc#matchcreators) and [merger creators](https://github.com/ngageoint/hootenanny/blob/develop/conf/core/ConfigOptions.asciidoc#mergercreators). When this and the following options are done, the autocorrect.options parameter can be removed from both the UI and the core: * #969 * #970 * #971
priority
ui adv opts sends mismatching matcher merger config strings to web service don t start on this until is merged the hoot core settings match creators and merger creators are both a semicolon delimited string made of individual matchers mergers and always must be of the same length currently the ui adv opts sends strings with different numbers of inputs for each as part of a check was added to core to throw an exception when this happens when running on the branch now you will see an error like this if a mismatch is sent to the web services debug core conflate matchfactory cpp matchcreators hoot poipolygonmatchcreator hoot networkmatchcreator hoot buildingmatchcreator hoot scriptmatchcreator poigeneric js hoot scriptmatchcreator linearwaterway js debug core conflate matchfactory cpp mergercreators hoot poipolygonmergercreator hoot networkmergercreator hoot buildingmergercreator hoot scriptmergercreator stderr error running conflate the number of configured match creators does not equal the number of configured merger creators the adv opts ui needs to be corrected so that the number of matchers creators is the same the overall ordering of matchers creators in both config strings is not important e g match creators hoot buildingmatchcreator hoot networkmatchcreator is equivalent to match creators hoot networkmatchcreator hoot buildingmatchcreator but each entry in the matchers list always needs to match in the correct order with the corresponding entry in the mergers list e g the following would be wrong match creators hoot buildingmatchcreator hoot networkmatchcreator and merger creators hoot networkmergercreator hoot buildingmergercreator here is the current list of matchers and valid mergers hoot buildingmatchcreator hoot buildingmergercreator hoot highwaymatchcreator hoot highwaysnapmergercreator hoot networkmatchcreator hoot networkmergercreator hoot poipolygonmatchcreator hoot poipolygonmergercreator hoot scriptmatchcreator area js hoot scriptmergercreator hoot scriptmatchcreator linearwaterway js hoot scriptmergercreator hoot scriptmatchcreator poigeneric js hoot scriptmergercreator there must always be a separate hoot scriptmergercreator entry for each hoot scriptmatchcreator entry for more info on matchers mergers see and when this and the following options are done the autocorrect options parameter can be removed from both the ui and the core
1
80,409
30,273,686,249
IssuesEvent
2023-07-07 17:32:44
H-uru/Plasma
https://api.github.com/repos/H-uru/Plasma
closed
Game is pixelated when using HiDPI Scaling on Windows
Client Hacktoberfest Defect
Conversation with @cwalther on IRC 2020-02-29 indicates problems with playing the game when Windows scaling is enabled. He reports the image is improperly scaled using nearest neighbor interpolation when playing in full screen. There is a [previous report](https://forum.guildofwriters.org/viewtopic.php?f=117&t=7062) of chicanery as well. ```[17:16:20] <CWalther> Hi everyone! I’m just trying out Gehn 27, and it’s not looking as good as it should on my 4K display when I choose the full 3840x2160 resolution. Things are scaled as if it was rendering for 3840x2160 (e.g. the cursor is tiny), but the view is rendered at 1920x2160 and pixel-doubled, so it looks blocky. Is that the way it’s supposed to be? It may have been that way before, I don’t remember exactly. Do I need to [17:16:21] <CWalther> tweak anything in my Windows display settings? It’s set to 200%, “fix scaling” off and no custom scaling. [17:16:53] <CWalther> *rendered at 1920x1080 [17:26:27] <Doobes> Hoikas would probably have the best answer for that as he's been able to grab high res screenshots of things. [17:27:24] <Doobes> He may currently be AFK or busy with something though. [17:27:27] <CWalther> Yeah, I remembered that so it seems odd. [17:28:30] <Doobes> Wish I could help, but I'm still stuck in 1080p land. :D [17:32:30] <CWalther> Chiso is looking fantastic in 1080p! :) [17:47:03] <Hoikas> I haven't seen any issues on my 3840x1600 display, CWalther [17:47:42] <CWalther> I almost suspected as much, otherwise you’d have fixed them :) [17:48:47] <CWalther> I can try playing with the Windows settings. [17:50:03] <Hoikas> I know we had a complaint recently from someone playing with scaling enabled, but I think that was a case of the UI being offscreen [17:51:18] <CWalther> With 100% scale it looks good (but I don't want my Windows desktop that tiny). [17:51:33] <Hoikas> :) [17:52:27] <Hoikas> I don't touch scaling myself. I invariantly use programs that look terrible with it on. Instead, I "just" (a year ago) bought an ultrawide monitor [17:54:44] <CWalther> With 200% and “fix scaling for apps” enabled (whatever that is), no difference, still blocky. [17:57:06] <CWalther> With “custom scaling” 300%, pixel-tripled blocky. [17:57:32] <Hoikas> I'm not sure I understand "pixel-doubled" and "pixel-tripled" [17:58:01] <CWalther> What I mean is that groups of 2x2 or 3x3 physical pixels have the same color to make one image pixel. [17:58:17] <Hoikas> ok [17:58:41] <CWalther> As if you scaled up a lower-res image using nearest neighbor interpolation. [17:59:07] <Hoikas> that very well could be what is actually happening [18:00:24] <CWalther> I guess so. MOULa by the way does not do that, so it probably has to do with resolution-awareness added in newer WIndows SDKs or somesuch. [18:00:53] <Hoikas> or that "fullscreen" is just a borderless window for us [18:01:25] <CWalther> Good point, I haven't tried what happens in windowed mode. [18:02:40] <Hoikas> "Desktop applications must tell Windows if they support DPI scaling. By default, the system considers desktop applications DPI unaware and bitmap-stretches their windows." [18:03:22] <Hoikas> I believe wingdi uses a crummy nearest-neighbor type filter by default [18:03:43] <Hoikas> (but dwm should be DX, not gdi...) [18:04:46] <CWalther> I read those docs once when I was working on a Windows app… it's horribly complicated. There are multiple stages of awareness. [18:05:11] <Hoikas> I've skimmed them before and am currently filled with dread. [18:11:50] <Hoikas> This actually does not look too hard to fix for Windows 10 1703 and later [18:12:30] <Hoikas> As for anything earlier than that... "update to a recent OS" [18:15:35] <CWalther> In windowed mode (with my original 200% setting) it looks like it renders either at the chosen resolution, or if that is larger than 1920x1080 squished down to that (not even preserving aspect ratio), and then pixel-doubles it. [18:16:16] <CWalther> “update to a recent OS” – I’m fine with that as far as Windows is concerned [18:16:56] <Hoikas> strange stuff. I'll have to look at this when my screen isn't full [18:17:09] * Hoikas shivers at the idea of playing with the Windows scaling features [18:17:34] <CWalther> Eh, no pressure. I was just wondering if it was a known problem. [18:19:05] <Hoikas> it wasn't--thanks for bringing it up! [18:19:52] <CWalther> (Of course, going further it would also be nice if it would take into account the Windows scaling factor for things like the cursor and the mouseover player name text (was that “plates” too?), so these wouldn’t be tiny for me.) [18:21:12] <Hoikas> from what I see, windows will provide client RECT if we opt into dpi awareness v2, so hopefully if we resize to that rect, everything should be fine [18:21:58] <Hoikas> of course, my understanding might be completely wrong as well ^_^ [18:22:43] <CWalther> I don't remember how you opt in - was it a manifest setting, or a function to call? [18:24:27] <Hoikas> in Windows 8 it was the former, but in Windows 10 1607, we can use SetThreadDpiAwarenessContext [18:25:02] <CWalther> Ugh, thread-specific? [18:25:46] <Hoikas> SetProcessDpiAwarenessContext was added in 1703, it seems [18:26:03] <Hoikas> "It is recommended that you set the process-default DPI awareness via application manifest. See Setting the default DPI awareness for a process for more information. Setting the process-default DPI awareness via API call can lead to unexpected application behavior." [18:27:08] <Hoikas> the per-thread function seems to be more flexible. Windows are generally bound to a specific thread, so it makes sense to use that ```
1.0
Game is pixelated when using HiDPI Scaling on Windows - Conversation with @cwalther on IRC 2020-02-29 indicates problems with playing the game when Windows scaling is enabled. He reports the image is improperly scaled using nearest neighbor interpolation when playing in full screen. There is a [previous report](https://forum.guildofwriters.org/viewtopic.php?f=117&t=7062) of chicanery as well. ```[17:16:20] <CWalther> Hi everyone! I’m just trying out Gehn 27, and it’s not looking as good as it should on my 4K display when I choose the full 3840x2160 resolution. Things are scaled as if it was rendering for 3840x2160 (e.g. the cursor is tiny), but the view is rendered at 1920x2160 and pixel-doubled, so it looks blocky. Is that the way it’s supposed to be? It may have been that way before, I don’t remember exactly. Do I need to [17:16:21] <CWalther> tweak anything in my Windows display settings? It’s set to 200%, “fix scaling” off and no custom scaling. [17:16:53] <CWalther> *rendered at 1920x1080 [17:26:27] <Doobes> Hoikas would probably have the best answer for that as he's been able to grab high res screenshots of things. [17:27:24] <Doobes> He may currently be AFK or busy with something though. [17:27:27] <CWalther> Yeah, I remembered that so it seems odd. [17:28:30] <Doobes> Wish I could help, but I'm still stuck in 1080p land. :D [17:32:30] <CWalther> Chiso is looking fantastic in 1080p! :) [17:47:03] <Hoikas> I haven't seen any issues on my 3840x1600 display, CWalther [17:47:42] <CWalther> I almost suspected as much, otherwise you’d have fixed them :) [17:48:47] <CWalther> I can try playing with the Windows settings. [17:50:03] <Hoikas> I know we had a complaint recently from someone playing with scaling enabled, but I think that was a case of the UI being offscreen [17:51:18] <CWalther> With 100% scale it looks good (but I don't want my Windows desktop that tiny). [17:51:33] <Hoikas> :) [17:52:27] <Hoikas> I don't touch scaling myself. I invariantly use programs that look terrible with it on. Instead, I "just" (a year ago) bought an ultrawide monitor [17:54:44] <CWalther> With 200% and “fix scaling for apps” enabled (whatever that is), no difference, still blocky. [17:57:06] <CWalther> With “custom scaling” 300%, pixel-tripled blocky. [17:57:32] <Hoikas> I'm not sure I understand "pixel-doubled" and "pixel-tripled" [17:58:01] <CWalther> What I mean is that groups of 2x2 or 3x3 physical pixels have the same color to make one image pixel. [17:58:17] <Hoikas> ok [17:58:41] <CWalther> As if you scaled up a lower-res image using nearest neighbor interpolation. [17:59:07] <Hoikas> that very well could be what is actually happening [18:00:24] <CWalther> I guess so. MOULa by the way does not do that, so it probably has to do with resolution-awareness added in newer WIndows SDKs or somesuch. [18:00:53] <Hoikas> or that "fullscreen" is just a borderless window for us [18:01:25] <CWalther> Good point, I haven't tried what happens in windowed mode. [18:02:40] <Hoikas> "Desktop applications must tell Windows if they support DPI scaling. By default, the system considers desktop applications DPI unaware and bitmap-stretches their windows." [18:03:22] <Hoikas> I believe wingdi uses a crummy nearest-neighbor type filter by default [18:03:43] <Hoikas> (but dwm should be DX, not gdi...) [18:04:46] <CWalther> I read those docs once when I was working on a Windows app… it's horribly complicated. There are multiple stages of awareness. [18:05:11] <Hoikas> I've skimmed them before and am currently filled with dread. [18:11:50] <Hoikas> This actually does not look too hard to fix for Windows 10 1703 and later [18:12:30] <Hoikas> As for anything earlier than that... "update to a recent OS" [18:15:35] <CWalther> In windowed mode (with my original 200% setting) it looks like it renders either at the chosen resolution, or if that is larger than 1920x1080 squished down to that (not even preserving aspect ratio), and then pixel-doubles it. [18:16:16] <CWalther> “update to a recent OS” – I’m fine with that as far as Windows is concerned [18:16:56] <Hoikas> strange stuff. I'll have to look at this when my screen isn't full [18:17:09] * Hoikas shivers at the idea of playing with the Windows scaling features [18:17:34] <CWalther> Eh, no pressure. I was just wondering if it was a known problem. [18:19:05] <Hoikas> it wasn't--thanks for bringing it up! [18:19:52] <CWalther> (Of course, going further it would also be nice if it would take into account the Windows scaling factor for things like the cursor and the mouseover player name text (was that “plates” too?), so these wouldn’t be tiny for me.) [18:21:12] <Hoikas> from what I see, windows will provide client RECT if we opt into dpi awareness v2, so hopefully if we resize to that rect, everything should be fine [18:21:58] <Hoikas> of course, my understanding might be completely wrong as well ^_^ [18:22:43] <CWalther> I don't remember how you opt in - was it a manifest setting, or a function to call? [18:24:27] <Hoikas> in Windows 8 it was the former, but in Windows 10 1607, we can use SetThreadDpiAwarenessContext [18:25:02] <CWalther> Ugh, thread-specific? [18:25:46] <Hoikas> SetProcessDpiAwarenessContext was added in 1703, it seems [18:26:03] <Hoikas> "It is recommended that you set the process-default DPI awareness via application manifest. See Setting the default DPI awareness for a process for more information. Setting the process-default DPI awareness via API call can lead to unexpected application behavior." [18:27:08] <Hoikas> the per-thread function seems to be more flexible. Windows are generally bound to a specific thread, so it makes sense to use that ```
non_priority
game is pixelated when using hidpi scaling on windows conversation with cwalther on irc indicates problems with playing the game when windows scaling is enabled he reports the image is improperly scaled using nearest neighbor interpolation when playing in full screen there is a of chicanery as well hi everyone i’m just trying out gehn and it’s not looking as good as it should on my display when i choose the full resolution things are scaled as if it was rendering for e g the cursor is tiny but the view is rendered at and pixel doubled so it looks blocky is that the way it’s supposed to be it may have been that way before i don’t remember exactly do i need to tweak anything in my windows display settings it’s set to “fix scaling” off and no custom scaling rendered at hoikas would probably have the best answer for that as he s been able to grab high res screenshots of things he may currently be afk or busy with something though yeah i remembered that so it seems odd wish i could help but i m still stuck in land d chiso is looking fantastic in i haven t seen any issues on my display cwalther i almost suspected as much otherwise you’d have fixed them i can try playing with the windows settings i know we had a complaint recently from someone playing with scaling enabled but i think that was a case of the ui being offscreen with scale it looks good but i don t want my windows desktop that tiny i don t touch scaling myself i invariantly use programs that look terrible with it on instead i just a year ago bought an ultrawide monitor with and “fix scaling for apps” enabled whatever that is no difference still blocky with “custom scaling” pixel tripled blocky i m not sure i understand pixel doubled and pixel tripled what i mean is that groups of or physical pixels have the same color to make one image pixel ok as if you scaled up a lower res image using nearest neighbor interpolation that very well could be what is actually happening i guess so moula by the way does not do that so it probably has to do with resolution awareness added in newer windows sdks or somesuch or that fullscreen is just a borderless window for us good point i haven t tried what happens in windowed mode desktop applications must tell windows if they support dpi scaling by default the system considers desktop applications dpi unaware and bitmap stretches their windows i believe wingdi uses a crummy nearest neighbor type filter by default but dwm should be dx not gdi i read those docs once when i was working on a windows app… it s horribly complicated there are multiple stages of awareness i ve skimmed them before and am currently filled with dread this actually does not look too hard to fix for windows and later as for anything earlier than that update to a recent os in windowed mode with my original setting it looks like it renders either at the chosen resolution or if that is larger than squished down to that not even preserving aspect ratio and then pixel doubles it “update to a recent os” – i’m fine with that as far as windows is concerned strange stuff i ll have to look at this when my screen isn t full hoikas shivers at the idea of playing with the windows scaling features eh no pressure i was just wondering if it was a known problem it wasn t thanks for bringing it up of course going further it would also be nice if it would take into account the windows scaling factor for things like the cursor and the mouseover player name text was that “plates” too so these wouldn’t be tiny for me from what i see windows will provide client rect if we opt into dpi awareness so hopefully if we resize to that rect everything should be fine of course my understanding might be completely wrong as well i don t remember how you opt in was it a manifest setting or a function to call in windows it was the former but in windows we can use setthreaddpiawarenesscontext ugh thread specific setprocessdpiawarenesscontext was added in it seems it is recommended that you set the process default dpi awareness via application manifest see setting the default dpi awareness for a process for more information setting the process default dpi awareness via api call can lead to unexpected application behavior the per thread function seems to be more flexible windows are generally bound to a specific thread so it makes sense to use that
0
56,099
3,078,216,071
IssuesEvent
2015-08-21 08:43:38
pavel-pimenov/flylinkdc-r5xx
https://api.github.com/repos/pavel-pimenov/flylinkdc-r5xx
closed
Папки с медиафайлами в шаре имеют "качество звука"
enhancement imported Priority-Low
_From [reaor...@gmail.com](https://code.google.com/u/102418317896447533964/) on March 11, 2011 19:29:43_ Скрин ниже **Attachment:** [Безымянный.JPG](http://code.google.com/p/flylinkdc/issues/detail?id=392) _Original issue: http://code.google.com/p/flylinkdc/issues/detail?id=392_
1.0
Папки с медиафайлами в шаре имеют "качество звука" - _From [reaor...@gmail.com](https://code.google.com/u/102418317896447533964/) on March 11, 2011 19:29:43_ Скрин ниже **Attachment:** [Безымянный.JPG](http://code.google.com/p/flylinkdc/issues/detail?id=392) _Original issue: http://code.google.com/p/flylinkdc/issues/detail?id=392_
priority
папки с медиафайлами в шаре имеют качество звука from on march скрин ниже attachment original issue
1
392,086
26,923,486,370
IssuesEvent
2023-02-07 12:11:53
DanielAraldi/clean-node-api
https://api.github.com/repos/DanielAraldi/clean-node-api
closed
Add Refresh Token
documentation enhancement
### Refresh Token Currently, the API does not have an `endpoint` to update the user's `token`, that is, a `refresh token`. This should be added with the best user experience in mind. I emphasize that documentation must be written for this new API flow.
1.0
Add Refresh Token - ### Refresh Token Currently, the API does not have an `endpoint` to update the user's `token`, that is, a `refresh token`. This should be added with the best user experience in mind. I emphasize that documentation must be written for this new API flow.
non_priority
add refresh token refresh token currently the api does not have an endpoint to update the user s token that is a refresh token this should be added with the best user experience in mind i emphasize that documentation must be written for this new api flow
0
411,340
12,017,129,859
IssuesEvent
2020-04-10 17:40:35
geomstats/geomstats
https://api.github.com/repos/geomstats/geomstats
opened
Remove warnings with nose2
high priority
Running nose2 with np, pytorch and tf prints a lot of warnings, specifically for the examples with np. We should fix the issue, or prevent these warnings to be printed when using nose2.
1.0
Remove warnings with nose2 - Running nose2 with np, pytorch and tf prints a lot of warnings, specifically for the examples with np. We should fix the issue, or prevent these warnings to be printed when using nose2.
priority
remove warnings with running with np pytorch and tf prints a lot of warnings specifically for the examples with np we should fix the issue or prevent these warnings to be printed when using
1
196,177
22,441,052,089
IssuesEvent
2022-06-21 01:20:24
utopikkad/my-blog-vuejs
https://api.github.com/repos/utopikkad/my-blog-vuejs
closed
CVE-2020-8203 (High) detected in lodash-4.17.15.tgz - autoclosed
security vulnerability
## CVE-2020-8203 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p> <p>Path to dependency file: my-blog-vuejs/package.json</p> <p>Path to vulnerable library: my-blog-vuejs/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - nuxt-2.11.0.tgz (Root Library) - builder-2.11.0.tgz - :x: **lodash-4.17.15.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/utopikkad/my-blog-vuejs/commit/f3e8a4d9e82da6e74534fd6912d6644a8fdf93d6">f3e8a4d9e82da6e74534fd6912d6644a8fdf93d6</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20. <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p> <p>Release Date: 2020-10-21</p> <p>Fix Resolution: lodash - 4.17.19</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-8203 (High) detected in lodash-4.17.15.tgz - autoclosed - ## CVE-2020-8203 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p> <p>Path to dependency file: my-blog-vuejs/package.json</p> <p>Path to vulnerable library: my-blog-vuejs/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - nuxt-2.11.0.tgz (Root Library) - builder-2.11.0.tgz - :x: **lodash-4.17.15.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/utopikkad/my-blog-vuejs/commit/f3e8a4d9e82da6e74534fd6912d6644a8fdf93d6">f3e8a4d9e82da6e74534fd6912d6644a8fdf93d6</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20. <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p> <p>Release Date: 2020-10-21</p> <p>Fix Resolution: lodash - 4.17.19</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in lodash tgz autoclosed cve high severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file my blog vuejs package json path to vulnerable library my blog vuejs node modules lodash package json dependency hierarchy nuxt tgz root library builder tgz x lodash tgz vulnerable library found in head commit a href vulnerability details prototype pollution attack when using zipobjectdeep in lodash before publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash step up your open source security game with whitesource
0
41,645
10,757,833,951
IssuesEvent
2019-10-31 13:59:52
paritytech/parity-ethereum
https://api.github.com/repos/paritytech/parity-ethereum
closed
Docker centos build fails
M0-build 🏗
- **Parity Ethereum version**: 2.7.0-nightly - **Operating system**: Linux - **Installation**: docker built from source I'm trying to build the centos docker version of Parity, based on the template in the master branch repo: https://github.com/paritytech/parity-ethereum/tree/master/scripts/docker. The README.md seems to be outdated after move `docker` directory to `scripts` directory. After run the `build.sh` in the right directory: ``` git clone https://github.com/paritytech/parity-ethereum.git cd parity-ethereum/scripts ./docker/centos/build.sh ``` I got the following cmake error: ``` cmake version 3.12.0 CMake suite maintained and supported by Kitware (kitware.com/cmake). error: could not find `Cargo.toml` in `/build/parity-ethereum` or any parent directory The command '/bin/sh -c yum -y update && yum install -y systemd-devel git make gcc-c++ gcc file binutils && curl -L "https://cmake.org/files/v3.12/cmake-3.12.0-Linux-x86_64.tar.gz" -o cmake.tar.gz && tar -xzf cmake.tar.gz && cp -r cmake-3.12.0-Linux-x86_64/* /usr/ && curl https://sh.rustup.rs -sSf | sh -s -- -y && PATH=/root/.cargo/bin:$PATH && RUST_BACKTRACE=1 && rustc -vV && cargo -V && gcc -v && g++ -v && cmake --version && cd parity-ethereum && cargo build --verbose --release --features final && strip /build/parity-ethereum/target/release/parity && file /build/parity-ethereum/target/release/parity' returned a non-zero code: 101 ``` This is because the [Dockerfile.build](https://github.com/paritytech/parity-ethereum/blob/master/scripts/docker/centos/Dockerfile.build#L5) is adding from the scripts directory instead from the previous path with the parity source code. ## How to fix Update [build.sh](https://github.com/paritytech/parity-ethereum/blob/master/scripts/docker/centos/build.sh) shell script replacing the old path `docker/centos` to the new one `scripts/docker/centos`: ``` sed -i 's,docker/centos,scripts/docker/centos,g' build.sh ``` Run from `parity-ethereum` directory: ``` git clone https://github.com/paritytech/parity-ethereum.git cd parity-ethereum/ ./scripts/docker/centos/build.sh ```
1.0
Docker centos build fails - - **Parity Ethereum version**: 2.7.0-nightly - **Operating system**: Linux - **Installation**: docker built from source I'm trying to build the centos docker version of Parity, based on the template in the master branch repo: https://github.com/paritytech/parity-ethereum/tree/master/scripts/docker. The README.md seems to be outdated after move `docker` directory to `scripts` directory. After run the `build.sh` in the right directory: ``` git clone https://github.com/paritytech/parity-ethereum.git cd parity-ethereum/scripts ./docker/centos/build.sh ``` I got the following cmake error: ``` cmake version 3.12.0 CMake suite maintained and supported by Kitware (kitware.com/cmake). error: could not find `Cargo.toml` in `/build/parity-ethereum` or any parent directory The command '/bin/sh -c yum -y update && yum install -y systemd-devel git make gcc-c++ gcc file binutils && curl -L "https://cmake.org/files/v3.12/cmake-3.12.0-Linux-x86_64.tar.gz" -o cmake.tar.gz && tar -xzf cmake.tar.gz && cp -r cmake-3.12.0-Linux-x86_64/* /usr/ && curl https://sh.rustup.rs -sSf | sh -s -- -y && PATH=/root/.cargo/bin:$PATH && RUST_BACKTRACE=1 && rustc -vV && cargo -V && gcc -v && g++ -v && cmake --version && cd parity-ethereum && cargo build --verbose --release --features final && strip /build/parity-ethereum/target/release/parity && file /build/parity-ethereum/target/release/parity' returned a non-zero code: 101 ``` This is because the [Dockerfile.build](https://github.com/paritytech/parity-ethereum/blob/master/scripts/docker/centos/Dockerfile.build#L5) is adding from the scripts directory instead from the previous path with the parity source code. ## How to fix Update [build.sh](https://github.com/paritytech/parity-ethereum/blob/master/scripts/docker/centos/build.sh) shell script replacing the old path `docker/centos` to the new one `scripts/docker/centos`: ``` sed -i 's,docker/centos,scripts/docker/centos,g' build.sh ``` Run from `parity-ethereum` directory: ``` git clone https://github.com/paritytech/parity-ethereum.git cd parity-ethereum/ ./scripts/docker/centos/build.sh ```
non_priority
docker centos build fails parity ethereum version nightly operating system linux installation docker built from source i m trying to build the centos docker version of parity based on the template in the master branch repo the readme md seems to be outdated after move docker directory to scripts directory after run the build sh in the right directory git clone cd parity ethereum scripts docker centos build sh i got the following cmake error cmake version cmake suite maintained and supported by kitware kitware com cmake error could not find cargo toml in build parity ethereum or any parent directory the command bin sh c yum y update yum install y systemd devel git make gcc c gcc file binutils curl l o cmake tar gz tar xzf cmake tar gz cp r cmake linux usr curl ssf sh s y path root cargo bin path rust backtrace rustc vv cargo v gcc v g v cmake version cd parity ethereum cargo build verbose release features final strip build parity ethereum target release parity file build parity ethereum target release parity returned a non zero code this is because the is adding from the scripts directory instead from the previous path with the parity source code how to fix update shell script replacing the old path docker centos to the new one scripts docker centos sed i s docker centos scripts docker centos g build sh run from parity ethereum directory git clone cd parity ethereum scripts docker centos build sh
0
49,975
20,984,575,260
IssuesEvent
2022-03-29 00:44:21
Azure/azure-sdk-for-go
https://api.github.com/repos/Azure/azure-sdk-for-go
closed
[azservicebus] Sessions detach can be inconsistent
bug Service Bus Client
After a link detach it seems like there's a delay between the session lock expiring and me being able to reconnect to it. This makes it so recovery is difficult - our current error code just assumes that attempting to open a session either works because we obtain the lock, or fails because the session is already locked. It doesn't attempt to account for a potential delay until the session becomes available again. I need to investigate this a bit more - I have a simple test that just does a detach on an entity and then attempts to recover the link. This is related to me wanting to fix the issue with message completion retrying unnecessarily when the lock has expired.
1.0
[azservicebus] Sessions detach can be inconsistent - After a link detach it seems like there's a delay between the session lock expiring and me being able to reconnect to it. This makes it so recovery is difficult - our current error code just assumes that attempting to open a session either works because we obtain the lock, or fails because the session is already locked. It doesn't attempt to account for a potential delay until the session becomes available again. I need to investigate this a bit more - I have a simple test that just does a detach on an entity and then attempts to recover the link. This is related to me wanting to fix the issue with message completion retrying unnecessarily when the lock has expired.
non_priority
sessions detach can be inconsistent after a link detach it seems like there s a delay between the session lock expiring and me being able to reconnect to it this makes it so recovery is difficult our current error code just assumes that attempting to open a session either works because we obtain the lock or fails because the session is already locked it doesn t attempt to account for a potential delay until the session becomes available again i need to investigate this a bit more i have a simple test that just does a detach on an entity and then attempts to recover the link this is related to me wanting to fix the issue with message completion retrying unnecessarily when the lock has expired
0
148,411
23,348,213,472
IssuesEvent
2022-08-09 20:12:57
carbon-design-system/carbon-for-ibm-dotcom
https://api.github.com/repos/carbon-design-system/carbon-for-ibm-dotcom
closed
[Cards] audit & synthesis continued
design design: visual design: study
## User story As a designer, I need to perform an audit of the Card components across IBM.com in order to identify inconsistencies, and synthesize findings into recommendations Continuation of #9061 ## Additional information ### Differentiating from the background Thy explored adding a stroke around selectable tiles in Carbon to pass accessibility requirements, however we don't _need_ to add a stroke. We want to determine if there are other ways to show that a card is clickable (interactive), other than adding a stroke around the entire tile, so that I can update the tile guidance. - Are there other ways we could separate cards from the background? - How would this effect current card usage? - Example: Gatsby resource cards and IBM.com use condensed cards often, would the drop shadow work in this scenario? **Drop shadow** - Grid usage for single vs group of cards - [ ] default - [ ] narrow - [ ] condensed - Tile color - ui-01 / layer-01 - ui-02 / background or layer-02(possibly messes up logic) - can marketing use white tiles on white background) - Themes - Does the solution work for dark themes? **Lighter stroke** previous explorations used gray50 to pass 3:1 contrast. Could we use a lighter stroke like `border-subtle`? - Grid usage for single vs group of cards - [ ] default - [ ] narrow - [ ] condensed - Tile color - `ui-01` / `layer-01` - `ui-02` / `background` or `layer-02`(possibly messes up logic) - can marketing use white tiles on white background) - Themes - Does the solution work for dark themes? ### Establish icon consistency We would like to establish clear rules for icon consistency within Cards, this is a partial continuation from the previous sprint. 1. Be consistent with icon color treatment in a UI a. CTA icon is blue if stand alone b. CTA icon is gray or white If there are colorful elements on a card (images, icons, pictograms, other logos) 2. Consistent placement a. If one icon aligned left b. If multiple icons: arrows aligned left; other aligned right - Identify where we are breaking this rule - Themes - Does the solution work for dark themes? ![Screen Shot 2022-07-18 at 3 33 40 PM](https://user-images.githubusercontent.com/45692622/179603065-dedcf7fc-ff58-418c-8bd7-261bd7cc34f9.png) ![Screen Shot 2022-07-18 at 3 33 20 PM](https://user-images.githubusercontent.com/45692622/179603080-dd67dfc5-e18e-4d01-b965-dbfe72044230.png) ![Screen Shot 2022-07-18 at 3 33 08 PM](https://user-images.githubusercontent.com/45692622/179603089-2850deec-26f4-42a3-945d-f364a9bfcafc.png) ![Screen Shot 2022-07-18 at 3 41 15 PM](https://user-images.githubusercontent.com/45692622/179606576-cd106fbb-9431-4d6e-8be3-928469f620c5.png) ### Resources Previous ticket for Selectable tiles [Carbon repo] Previous ticket reviewing Carbon for IBM.com cards #9061 ### Acceptance criteria - [ ] explorations documented in Figma file - [ ] Share findings with Carbon and Carbon for IBM.com team - [ ] Synthesis of recommendations provided
3.0
[Cards] audit & synthesis continued - ## User story As a designer, I need to perform an audit of the Card components across IBM.com in order to identify inconsistencies, and synthesize findings into recommendations Continuation of #9061 ## Additional information ### Differentiating from the background Thy explored adding a stroke around selectable tiles in Carbon to pass accessibility requirements, however we don't _need_ to add a stroke. We want to determine if there are other ways to show that a card is clickable (interactive), other than adding a stroke around the entire tile, so that I can update the tile guidance. - Are there other ways we could separate cards from the background? - How would this effect current card usage? - Example: Gatsby resource cards and IBM.com use condensed cards often, would the drop shadow work in this scenario? **Drop shadow** - Grid usage for single vs group of cards - [ ] default - [ ] narrow - [ ] condensed - Tile color - ui-01 / layer-01 - ui-02 / background or layer-02(possibly messes up logic) - can marketing use white tiles on white background) - Themes - Does the solution work for dark themes? **Lighter stroke** previous explorations used gray50 to pass 3:1 contrast. Could we use a lighter stroke like `border-subtle`? - Grid usage for single vs group of cards - [ ] default - [ ] narrow - [ ] condensed - Tile color - `ui-01` / `layer-01` - `ui-02` / `background` or `layer-02`(possibly messes up logic) - can marketing use white tiles on white background) - Themes - Does the solution work for dark themes? ### Establish icon consistency We would like to establish clear rules for icon consistency within Cards, this is a partial continuation from the previous sprint. 1. Be consistent with icon color treatment in a UI a. CTA icon is blue if stand alone b. CTA icon is gray or white If there are colorful elements on a card (images, icons, pictograms, other logos) 2. Consistent placement a. If one icon aligned left b. If multiple icons: arrows aligned left; other aligned right - Identify where we are breaking this rule - Themes - Does the solution work for dark themes? ![Screen Shot 2022-07-18 at 3 33 40 PM](https://user-images.githubusercontent.com/45692622/179603065-dedcf7fc-ff58-418c-8bd7-261bd7cc34f9.png) ![Screen Shot 2022-07-18 at 3 33 20 PM](https://user-images.githubusercontent.com/45692622/179603080-dd67dfc5-e18e-4d01-b965-dbfe72044230.png) ![Screen Shot 2022-07-18 at 3 33 08 PM](https://user-images.githubusercontent.com/45692622/179603089-2850deec-26f4-42a3-945d-f364a9bfcafc.png) ![Screen Shot 2022-07-18 at 3 41 15 PM](https://user-images.githubusercontent.com/45692622/179606576-cd106fbb-9431-4d6e-8be3-928469f620c5.png) ### Resources Previous ticket for Selectable tiles [Carbon repo] Previous ticket reviewing Carbon for IBM.com cards #9061 ### Acceptance criteria - [ ] explorations documented in Figma file - [ ] Share findings with Carbon and Carbon for IBM.com team - [ ] Synthesis of recommendations provided
non_priority
audit synthesis continued user story as a designer i need to perform an audit of the card components across ibm com in order to identify inconsistencies and synthesize findings into recommendations continuation of additional information differentiating from the background thy explored adding a stroke around selectable tiles in carbon to pass accessibility requirements however we don t need to add a stroke we want to determine if there are other ways to show that a card is clickable interactive other than adding a stroke around the entire tile so that i can update the tile guidance are there other ways we could separate cards from the background how would this effect current card usage example gatsby resource cards and ibm com use condensed cards often would the drop shadow work in this scenario drop shadow grid usage for single vs group of cards default narrow condensed tile color ui layer ui background or layer possibly messes up logic can marketing use white tiles on white background themes does the solution work for dark themes lighter stroke previous explorations used to pass contrast could we use a lighter stroke like border subtle grid usage for single vs group of cards default narrow condensed tile color ui layer ui background or layer possibly messes up logic can marketing use white tiles on white background themes does the solution work for dark themes establish icon consistency we would like to establish clear rules for icon consistency within cards this is a partial continuation from the previous sprint be consistent with icon color treatment in a ui a cta icon is blue if stand alone b cta icon is gray or white if there are colorful elements on a card images icons pictograms other logos consistent placement a if one icon aligned left b if multiple icons arrows aligned left other aligned right identify where we are breaking this rule themes does the solution work for dark themes resources previous ticket for selectable tiles previous ticket reviewing carbon for ibm com cards acceptance criteria explorations documented in figma file share findings with carbon and carbon for ibm com team synthesis of recommendations provided
0
137,108
18,752,635,541
IssuesEvent
2021-11-05 05:42:23
madhans23/linux-4.15
https://api.github.com/repos/madhans23/linux-4.15
opened
CVE-2018-5814 (High) detected in multiple libraries
security vulnerability
## CVE-2018-5814 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>linuxv4.15</b>, <b>linuxv4.15</b>, <b>linuxv4.15</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets. <p>Publish Date: 2018-06-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-5814>CVE-2018-5814</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-5814">https://nvd.nist.gov/vuln/detail/CVE-2018-5814</a></p> <p>Release Date: 2018-06-12</p> <p>Fix Resolution: 4.16.11,4.14.43,4.9.102,4.4.133</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-5814 (High) detected in multiple libraries - ## CVE-2018-5814 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>linuxv4.15</b>, <b>linuxv4.15</b>, <b>linuxv4.15</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets. <p>Publish Date: 2018-06-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-5814>CVE-2018-5814</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-5814">https://nvd.nist.gov/vuln/detail/CVE-2018-5814</a></p> <p>Release Date: 2018-06-12</p> <p>Fix Resolution: 4.16.11,4.14.43,4.9.102,4.4.133</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries vulnerability details in the linux kernel before version and multiple race condition errors when handling probe disconnect and rebind operations can be exploited to trigger a use after free condition or a null pointer dereference by sending multiple usb over ip packets publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
111,372
24,119,498,652
IssuesEvent
2022-09-20 17:22:41
sourcegraph/sourcegraph
https://api.github.com/repos/sourcegraph/sourcegraph
opened
[Accessibility]: Code Insights — context menu doesn't announce items within menu
accessibility estimate/3d team/code-insights team/frontend-platform wcag/2.1/fixing wcag/2.1
### Audit type Screen reader navigation ### User journey audit issue https://github.com/sourcegraph/sourcegraph/issues/33502 ### Problem description If you open the code insight context menu (three dot menu) on the dashboard page screen reader doesn't announce focused item and therefore you can't figure out on which item you're currently focused ![Uploading Screenshot 2022-09-20 at 20.19.29.png…]() ### Expected behavior Screen reader should announce available (not disabled) and focused item in the context menu. ### Additional details I'm tagging frontend platform team because we use MenuButton component for this means which is part of the wildcard. It seems if it doesn't work for code insights it shouldn't work for all other places in the app and we should fix it on the wildcard level. ### Assigning labels - [X] Please give this issue an estimate by applying a label like `estimate/Xd`, where X is the estimated number of days it will take to complete. - [X] If this issue is specific to a specific Sourcegraph product, please assign the appropriate team label to this issue. - [X] If this issue will require input from designers in order to complete, please assign the label `needs-design`. - [X] If you are confident that this issue should be fixed by GitStart, please assign the label `gitstart`. ### Owner I'm unsure who should work on this issue or if it needs more clarification. I will let the Frontend Platform team triage this.
1.0
[Accessibility]: Code Insights — context menu doesn't announce items within menu - ### Audit type Screen reader navigation ### User journey audit issue https://github.com/sourcegraph/sourcegraph/issues/33502 ### Problem description If you open the code insight context menu (three dot menu) on the dashboard page screen reader doesn't announce focused item and therefore you can't figure out on which item you're currently focused ![Uploading Screenshot 2022-09-20 at 20.19.29.png…]() ### Expected behavior Screen reader should announce available (not disabled) and focused item in the context menu. ### Additional details I'm tagging frontend platform team because we use MenuButton component for this means which is part of the wildcard. It seems if it doesn't work for code insights it shouldn't work for all other places in the app and we should fix it on the wildcard level. ### Assigning labels - [X] Please give this issue an estimate by applying a label like `estimate/Xd`, where X is the estimated number of days it will take to complete. - [X] If this issue is specific to a specific Sourcegraph product, please assign the appropriate team label to this issue. - [X] If this issue will require input from designers in order to complete, please assign the label `needs-design`. - [X] If you are confident that this issue should be fixed by GitStart, please assign the label `gitstart`. ### Owner I'm unsure who should work on this issue or if it needs more clarification. I will let the Frontend Platform team triage this.
non_priority
code insights — context menu doesn t announce items within menu audit type screen reader navigation user journey audit issue problem description if you open the code insight context menu three dot menu on the dashboard page screen reader doesn t announce focused item and therefore you can t figure out on which item you re currently focused expected behavior screen reader should announce available not disabled and focused item in the context menu additional details i m tagging frontend platform team because we use menubutton component for this means which is part of the wildcard it seems if it doesn t work for code insights it shouldn t work for all other places in the app and we should fix it on the wildcard level assigning labels please give this issue an estimate by applying a label like estimate xd where x is the estimated number of days it will take to complete if this issue is specific to a specific sourcegraph product please assign the appropriate team label to this issue if this issue will require input from designers in order to complete please assign the label needs design if you are confident that this issue should be fixed by gitstart please assign the label gitstart owner i m unsure who should work on this issue or if it needs more clarification i will let the frontend platform team triage this
0
219,045
7,333,086,593
IssuesEvent
2018-03-05 18:16:13
NCEAS/metacat
https://api.github.com/repos/NCEAS/metacat
closed
Add ONEDCX stylesheet for D1 view service
Category: metacat Component: Bugzilla-Id Priority: Normal Status: Resolved Tracker: Bug
--- Author Name: **ben leinfelder** (ben leinfelder) Original Redmine Issue: 7032, https://projects.ecoinformatics.org/ecoinfo/issues/7032 Original Date: 2016-05-24 Original Assignee: ben leinfelder --- see https://redmine.dataone.org/issues/7686
1.0
Add ONEDCX stylesheet for D1 view service - --- Author Name: **ben leinfelder** (ben leinfelder) Original Redmine Issue: 7032, https://projects.ecoinformatics.org/ecoinfo/issues/7032 Original Date: 2016-05-24 Original Assignee: ben leinfelder --- see https://redmine.dataone.org/issues/7686
priority
add onedcx stylesheet for view service author name ben leinfelder ben leinfelder original redmine issue original date original assignee ben leinfelder see
1
513,249
14,918,461,791
IssuesEvent
2021-01-22 21:44:23
3YOURMIND/kotti
https://api.github.com/repos/3YOURMIND/kotti
closed
Re-enable Jest for KtForm
package:kotti-ui priority:4-high scope:linting state:help wanted type:enhancement
We have unit tests for the KtForm that were disabled since moving to Lerna. We should re-enable them. --- Split from #241
1.0
Re-enable Jest for KtForm - We have unit tests for the KtForm that were disabled since moving to Lerna. We should re-enable them. --- Split from #241
priority
re enable jest for ktform we have unit tests for the ktform that were disabled since moving to lerna we should re enable them split from
1
224,790
7,472,906,599
IssuesEvent
2018-04-03 14:00:43
edenlabllc/ehealth.api
https://api.github.com/repos/edenlabllc/ehealth.api
closed
Problem on IL
kind/bug priority/medium status/todo
From logs: ``` ** (MatchError) no match of right hand side value: %{} (ehealth) lib/ehealth/persons/validator.ex:13: EHealth.Persons.Validator.validate/1 (ehealth) lib/ehealth/declaration_requests/declaration_requests.ex:140: EHealth.DeclarationRequests.create_offline/2 (ehealth) lib/ehealth/web/controllers/declaration_request_controller.ex:30: EHealth.Web.DeclarationRequestController.create/2 (ehealth) lib/ehealth/web/controllers/declaration_request_controller.ex:1: EHealth.Web.DeclarationRequestController.action/2 (ehealth) lib/ehealth/web/controllers/declaration_request_controller.ex:1: EHealth.Web.DeclarationRequestController.phoenix_controller_pipeline/2 (ehealth) lib/ehealth/endpoint.ex:1: EHealth.Web.Endpoint.instrument/4 (phoenix) lib/phoenix/router.ex:278: Phoenix.Router.__call__/1 (ehealth) lib/plug/error_handler.ex:64: EHealthWeb.Router.call/2 ```
1.0
Problem on IL - From logs: ``` ** (MatchError) no match of right hand side value: %{} (ehealth) lib/ehealth/persons/validator.ex:13: EHealth.Persons.Validator.validate/1 (ehealth) lib/ehealth/declaration_requests/declaration_requests.ex:140: EHealth.DeclarationRequests.create_offline/2 (ehealth) lib/ehealth/web/controllers/declaration_request_controller.ex:30: EHealth.Web.DeclarationRequestController.create/2 (ehealth) lib/ehealth/web/controllers/declaration_request_controller.ex:1: EHealth.Web.DeclarationRequestController.action/2 (ehealth) lib/ehealth/web/controllers/declaration_request_controller.ex:1: EHealth.Web.DeclarationRequestController.phoenix_controller_pipeline/2 (ehealth) lib/ehealth/endpoint.ex:1: EHealth.Web.Endpoint.instrument/4 (phoenix) lib/phoenix/router.ex:278: Phoenix.Router.__call__/1 (ehealth) lib/plug/error_handler.ex:64: EHealthWeb.Router.call/2 ```
priority
problem on il from logs matcherror no match of right hand side value ehealth lib ehealth persons validator ex ehealth persons validator validate ehealth lib ehealth declaration requests declaration requests ex ehealth declarationrequests create offline ehealth lib ehealth web controllers declaration request controller ex ehealth web declarationrequestcontroller create ehealth lib ehealth web controllers declaration request controller ex ehealth web declarationrequestcontroller action ehealth lib ehealth web controllers declaration request controller ex ehealth web declarationrequestcontroller phoenix controller pipeline ehealth lib ehealth endpoint ex ehealth web endpoint instrument phoenix lib phoenix router ex phoenix router call ehealth lib plug error handler ex ehealthweb router call
1
491,427
14,163,820,106
IssuesEvent
2020-11-12 03:20:55
momentum-mod/game
https://api.github.com/repos/momentum-mod/game
closed
info_particle_systems with "start_active 1" don't appear on map load
Priority: Low Size: Medium Type: Bug
**Describe the bug** Any info_particle_system with the "start_active" keyvalue doesn't appear unless restarted via entity inputs. **To Reproduce** Steps to reproduce the behavior: - Load a [map](https://github.com/momentum-mod/game/files/4366426/firetest.zip) with the aforementioned info_particle_system. - Do `ent_fire particle stop` followed by `ent_fire particle start`, now the particle appears.
1.0
info_particle_systems with "start_active 1" don't appear on map load - **Describe the bug** Any info_particle_system with the "start_active" keyvalue doesn't appear unless restarted via entity inputs. **To Reproduce** Steps to reproduce the behavior: - Load a [map](https://github.com/momentum-mod/game/files/4366426/firetest.zip) with the aforementioned info_particle_system. - Do `ent_fire particle stop` followed by `ent_fire particle start`, now the particle appears.
priority
info particle systems with start active don t appear on map load describe the bug any info particle system with the start active keyvalue doesn t appear unless restarted via entity inputs to reproduce steps to reproduce the behavior load a with the aforementioned info particle system do ent fire particle stop followed by ent fire particle start now the particle appears
1
349,101
10,458,788,375
IssuesEvent
2019-09-20 09:22:58
chef/chef
https://api.github.com/repos/chef/chef
closed
knife ssh looking for key with --ssh-user and --ssh-password specified
Priority: Medium Status: Needs Replication Status: Sustaining Backlog Type: Bug
Expected: Use my password and don't look for a key. Actual: ``` [@gazoo:~/rcf-chef]↥ master+ ± knife ssh 'roles:*jenkins*' 'git --version' --no-host-key-verify --ssh-user jblaine --ssh-password Enter your password: WARNING: Failed to connect to jenkins-rhel6-slave.our.org -- Errno::ENOENT: No such file or directory @ rb_sysopen - /home/jblaine/.ssh/id_rsa WARNING: Failed to connect to jenkins-rhel6-slave-w.our.org -- Errno::ENOENT: No such file or directory @ rb_sysopen - /home/jblaine/.ssh/id_rsa [@gazoo:~/rcf-chef]↥ master+ ± knife --version Chef: 12.3.0 [@gazoo:~/rcf-chef]↥ master+ ± ```
1.0
knife ssh looking for key with --ssh-user and --ssh-password specified - Expected: Use my password and don't look for a key. Actual: ``` [@gazoo:~/rcf-chef]↥ master+ ± knife ssh 'roles:*jenkins*' 'git --version' --no-host-key-verify --ssh-user jblaine --ssh-password Enter your password: WARNING: Failed to connect to jenkins-rhel6-slave.our.org -- Errno::ENOENT: No such file or directory @ rb_sysopen - /home/jblaine/.ssh/id_rsa WARNING: Failed to connect to jenkins-rhel6-slave-w.our.org -- Errno::ENOENT: No such file or directory @ rb_sysopen - /home/jblaine/.ssh/id_rsa [@gazoo:~/rcf-chef]↥ master+ ± knife --version Chef: 12.3.0 [@gazoo:~/rcf-chef]↥ master+ ± ```
priority
knife ssh looking for key with ssh user and ssh password specified expected use my password and don t look for a key actual ↥ master ± knife ssh roles jenkins git version no host key verify ssh user jblaine ssh password enter your password warning failed to connect to jenkins slave our org errno enoent no such file or directory rb sysopen home jblaine ssh id rsa warning failed to connect to jenkins slave w our org errno enoent no such file or directory rb sysopen home jblaine ssh id rsa ↥ master ± knife version chef ↥ master ±
1
19,734
3,488,348,597
IssuesEvent
2016-01-02 21:44:52
socallinuxexpo/SCALE-Design
https://api.github.com/repos/socallinuxexpo/SCALE-Design
closed
SCALE Stickers
design
We've had a sponsor sign up to provide stickers to SCALE this year. We just need to provide artwork. I'd suggest starting with the same stickermule templates as last year. @hriday @ScislaC
1.0
SCALE Stickers - We've had a sponsor sign up to provide stickers to SCALE this year. We just need to provide artwork. I'd suggest starting with the same stickermule templates as last year. @hriday @ScislaC
non_priority
scale stickers we ve had a sponsor sign up to provide stickers to scale this year we just need to provide artwork i d suggest starting with the same stickermule templates as last year hriday scislac
0
152,016
5,831,629,238
IssuesEvent
2017-05-08 19:49:30
VulcanDev/FinalProjectICS4U
https://api.github.com/repos/VulcanDev/FinalProjectICS4U
closed
Completion of planet generation code.
enhancement high priority
Need to complete the code for planet generation to allow for modular spawning of planets based on climateID. This way we can add and removal planets at will and it won't change the core function when generating planets.
1.0
Completion of planet generation code. - Need to complete the code for planet generation to allow for modular spawning of planets based on climateID. This way we can add and removal planets at will and it won't change the core function when generating planets.
priority
completion of planet generation code need to complete the code for planet generation to allow for modular spawning of planets based on climateid this way we can add and removal planets at will and it won t change the core function when generating planets
1
428,238
29,935,098,142
IssuesEvent
2023-06-22 12:14:54
Safe-DS/Stdlib
https://api.github.com/repos/Safe-DS/Stdlib
opened
Standardize Optional Type in docstrings
documentation :book:
Currently a parameter or return type of `some_type | None` is described in the docstring as either `some_type | None` or `Optional[some_type]`. We should set our standard for this case and change all other cases to this new standard. Additionally there are cases where the parameter allows a None type but the docstring type does not show this. We should add this information to all those cases. ## Examples `Optional[type]` in the `Imputer` ```py def fit(self, table: Table, column_names: list[str] | None) -> Imputer: """ [...] Parameters ---------- [...] column_names : Optional[list[str]] The list of columns from the table used to fit the transformer. If `None`, all columns are used. [...] """ ``` `type | None` in `Table`: ```py def __init__(self, data: Mapping[str, Sequence[Any]] | None = None) -> None: """ Create a table from a mapping of column names to their values. Parameters ---------- data : Mapping[str, Sequence[Any]] | None The data. If None, an empty table is created. [...] """ ``` Example of a method without this information in `Table.py`: ```py def slice_rows( self, start: int | None = None, end: int | None = None, step: int = 1, ) -> Table: """ Slice a part of the table into a new table. This table is not modified. Parameters ---------- start : int The first index of the range to be copied into a new table, None by default. end : int The last index of the range to be copied into a new table, None by default. [...] """ ```
1.0
Standardize Optional Type in docstrings - Currently a parameter or return type of `some_type | None` is described in the docstring as either `some_type | None` or `Optional[some_type]`. We should set our standard for this case and change all other cases to this new standard. Additionally there are cases where the parameter allows a None type but the docstring type does not show this. We should add this information to all those cases. ## Examples `Optional[type]` in the `Imputer` ```py def fit(self, table: Table, column_names: list[str] | None) -> Imputer: """ [...] Parameters ---------- [...] column_names : Optional[list[str]] The list of columns from the table used to fit the transformer. If `None`, all columns are used. [...] """ ``` `type | None` in `Table`: ```py def __init__(self, data: Mapping[str, Sequence[Any]] | None = None) -> None: """ Create a table from a mapping of column names to their values. Parameters ---------- data : Mapping[str, Sequence[Any]] | None The data. If None, an empty table is created. [...] """ ``` Example of a method without this information in `Table.py`: ```py def slice_rows( self, start: int | None = None, end: int | None = None, step: int = 1, ) -> Table: """ Slice a part of the table into a new table. This table is not modified. Parameters ---------- start : int The first index of the range to be copied into a new table, None by default. end : int The last index of the range to be copied into a new table, None by default. [...] """ ```
non_priority
standardize optional type in docstrings currently a parameter or return type of some type none is described in the docstring as either some type none or optional we should set our standard for this case and change all other cases to this new standard additionally there are cases where the parameter allows a none type but the docstring type does not show this we should add this information to all those cases examples optional in the imputer py def fit self table table column names list none imputer parameters column names optional the list of columns from the table used to fit the transformer if none all columns are used type none in table py def init self data mapping none none none create a table from a mapping of column names to their values parameters data mapping none the data if none an empty table is created example of a method without this information in table py py def slice rows self start int none none end int none none step int table slice a part of the table into a new table this table is not modified parameters start int the first index of the range to be copied into a new table none by default end int the last index of the range to be copied into a new table none by default
0
66,130
14,767,355,985
IssuesEvent
2021-01-10 06:14:20
shiriivtsan/bebo
https://api.github.com/repos/shiriivtsan/bebo
opened
CVE-2018-14721 (High) detected in jackson-databind-2.8.6.jar
security vulnerability
## CVE-2018-14721 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.6.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: bebo/jackson-databind-2.8.6.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.6.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/bebo/commit/8eb42e349cd3aded1eab4b65b59788a7e934dd99">8eb42e349cd3aded1eab4b65b59788a7e934dd99</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization. <p>Publish Date: 2019-01-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14721>CVE-2018-14721</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721</a></p> <p>Release Date: 2019-01-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.7,2.8.11.3,2.7.9.5,2.6.7.3</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.6","isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.8.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.7,2.8.11.3,2.7.9.5,2.6.7.3"}],"vulnerabilityIdentifier":"CVE-2018-14721","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14721","cvss3Severity":"high","cvss3Score":"10.0","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2018-14721 (High) detected in jackson-databind-2.8.6.jar - ## CVE-2018-14721 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.6.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: bebo/jackson-databind-2.8.6.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.6.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shiriivtsan/bebo/commit/8eb42e349cd3aded1eab4b65b59788a7e934dd99">8eb42e349cd3aded1eab4b65b59788a7e934dd99</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization. <p>Publish Date: 2019-01-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14721>CVE-2018-14721</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721</a></p> <p>Release Date: 2019-01-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.7,2.8.11.3,2.7.9.5,2.6.7.3</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.6","isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.8.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.7,2.8.11.3,2.7.9.5,2.6.7.3"}],"vulnerabilityIdentifier":"CVE-2018-14721","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14721","cvss3Severity":"high","cvss3Score":"10.0","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library bebo jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before might allow remote attackers to conduct server side request forgery ssrf attacks by leveraging failure to block the jaxws class from polymorphic deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before might allow remote attackers to conduct server side request forgery ssrf attacks by leveraging failure to block the jaxws class from polymorphic deserialization vulnerabilityurl
0
342,725
10,320,899,153
IssuesEvent
2019-08-30 22:14:39
kubeflow/pipelines
https://api.github.com/repos/kubeflow/pipelines
closed
persistence agent should delete successful runs right after sync
area/back-end area/pipelines priority/p1
**What happened:** Argo workflow CRD pileup (100K+) caused GKE cluster API times out, causing issues for all namespaces in the cluster. Excessive workflows (5K+) also caused significant UI slow down. **What did you expect to happen:** Persistence Agent deleted successful workflows right after sync. Failed workflow can be GCed per workflow TTL since users may want to rerun the pipeline by skipping successful steps. **What steps did you take:** [A clear and concise description of what the bug is.] **Anything else you would like to add:** [Miscellaneous information that will assist in solving the issue.]
1.0
persistence agent should delete successful runs right after sync - **What happened:** Argo workflow CRD pileup (100K+) caused GKE cluster API times out, causing issues for all namespaces in the cluster. Excessive workflows (5K+) also caused significant UI slow down. **What did you expect to happen:** Persistence Agent deleted successful workflows right after sync. Failed workflow can be GCed per workflow TTL since users may want to rerun the pipeline by skipping successful steps. **What steps did you take:** [A clear and concise description of what the bug is.] **Anything else you would like to add:** [Miscellaneous information that will assist in solving the issue.]
priority
persistence agent should delete successful runs right after sync what happened argo workflow crd pileup caused gke cluster api times out causing issues for all namespaces in the cluster excessive workflows also caused significant ui slow down what did you expect to happen persistence agent deleted successful workflows right after sync failed workflow can be gced per workflow ttl since users may want to rerun the pipeline by skipping successful steps what steps did you take anything else you would like to add
1
21,997
10,708,664,764
IssuesEvent
2019-10-24 20:12:54
nicktombeur/artificialcolors
https://api.github.com/repos/nicktombeur/artificialcolors
opened
CVE-2019-17531 (High) detected in jackson-databind-2.9.9.jar
security vulnerability
## CVE-2019-17531 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/artificialcolors/back-end/pom.xml</p> <p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.6.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.6.RELEASE.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/nicktombeur/artificialcolors/commit/5fbe189d2d404af1fb2e57723fa5987ddd8376cb">5fbe189d2d404af1fb2e57723fa5987ddd8376cb</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-10-12 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531>CVE-2019-17531</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p> <p>Release Date: 2019-10-12</p> <p>Fix Resolution: 2.10</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-17531 (High) detected in jackson-databind-2.9.9.jar - ## CVE-2019-17531 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/artificialcolors/back-end/pom.xml</p> <p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.6.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.6.RELEASE.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/nicktombeur/artificialcolors/commit/5fbe189d2d404af1fb2e57723fa5987ddd8376cb">5fbe189d2d404af1fb2e57723fa5987ddd8376cb</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-10-12 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531>CVE-2019-17531</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p> <p>Release Date: 2019-10-12</p> <p>Fix Resolution: 2.10</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm artificialcolors back end pom xml path to vulnerable library root repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the apache extra version x jar in the classpath and an attacker can provide a jndi service to access it is possible to make the service execute a malicious payload publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
178,800
14,679,590,200
IssuesEvent
2020-12-31 07:25:34
rasatmaja/links-barnacle
https://api.github.com/repos/rasatmaja/links-barnacle
closed
Add logging on repository, cors, and server
documentation
# **Add logging on repository, cors, and server** **Issue type** : - [x] 🤴 Code style update (formatting, renaming) - [x] 🏇🏼 Refactoring (no functional changes, no api changes)
1.0
Add logging on repository, cors, and server - # **Add logging on repository, cors, and server** **Issue type** : - [x] 🤴 Code style update (formatting, renaming) - [x] 🏇🏼 Refactoring (no functional changes, no api changes)
non_priority
add logging on repository cors and server add logging on repository cors and server issue type 🤴 code style update formatting renaming 🏇🏼 refactoring no functional changes no api changes
0
477,684
13,766,373,003
IssuesEvent
2020-10-07 14:29:47
ansible/awx
https://api.github.com/repos/ansible/awx
opened
Host details variables showing JSON format without indentation on load
component:ui_next priority:low state:needs_devel type:bug
<!-- Issues are for **concrete, actionable bugs and feature requests** only - if you're just asking for debugging help or technical support, please use: - http://webchat.freenode.net/?channels=ansible-awx - https://groups.google.com/forum/#!forum/awx-project We have to limit this because of limited volunteer time to respond to issues! --> ##### ISSUE TYPE - Bug Report ##### SUMMARY Host details variables showing JSON format without indentation on load ##### ENVIRONMENT * AWX version: 15.0.0 * AWX install method:docker for mac * Ansible version: 2.9.13 * Operating System: Catalina * Web Browser: Chrome ##### STEPS TO REPRODUCE 1. Navigate to Hosts 2. Select a host which has variables ##### EXPECTED RESULTS The CodeMirror should show the JSON indented ##### ACTUAL RESULTS The JSON is displayed without indentation ##### ADDITIONAL INFORMATION ![host](https://user-images.githubusercontent.com/12464858/95344624-3ad0b000-0890-11eb-9b4a-11f00ac154fd.gif)
1.0
Host details variables showing JSON format without indentation on load - <!-- Issues are for **concrete, actionable bugs and feature requests** only - if you're just asking for debugging help or technical support, please use: - http://webchat.freenode.net/?channels=ansible-awx - https://groups.google.com/forum/#!forum/awx-project We have to limit this because of limited volunteer time to respond to issues! --> ##### ISSUE TYPE - Bug Report ##### SUMMARY Host details variables showing JSON format without indentation on load ##### ENVIRONMENT * AWX version: 15.0.0 * AWX install method:docker for mac * Ansible version: 2.9.13 * Operating System: Catalina * Web Browser: Chrome ##### STEPS TO REPRODUCE 1. Navigate to Hosts 2. Select a host which has variables ##### EXPECTED RESULTS The CodeMirror should show the JSON indented ##### ACTUAL RESULTS The JSON is displayed without indentation ##### ADDITIONAL INFORMATION ![host](https://user-images.githubusercontent.com/12464858/95344624-3ad0b000-0890-11eb-9b4a-11f00ac154fd.gif)
priority
host details variables showing json format without indentation on load issues are for concrete actionable bugs and feature requests only if you re just asking for debugging help or technical support please use we have to limit this because of limited volunteer time to respond to issues issue type bug report summary host details variables showing json format without indentation on load environment awx version awx install method docker for mac ansible version operating system catalina web browser chrome steps to reproduce navigate to hosts select a host which has variables expected results the codemirror should show the json indented actual results the json is displayed without indentation additional information
1
125,780
4,964,696,571
IssuesEvent
2016-12-03 22:25:43
yairodriguez/uxmyths
https://api.github.com/repos/yairodriguez/uxmyths
opened
Myth 9
[priority] high [status] accepted [type] feature
### Description Create the **Myth 9**, *Design has to be original*. --- ### Issue Checklist - [ ] Write the needed tests. - [ ] Create the markup for the component. - [ ] Add the correct styles. - [ ] Use the lint to clean `CSS` code. - [ ] Document all things. --- ### Assignees - [ ] Final assign @yairodriguez
1.0
Myth 9 - ### Description Create the **Myth 9**, *Design has to be original*. --- ### Issue Checklist - [ ] Write the needed tests. - [ ] Create the markup for the component. - [ ] Add the correct styles. - [ ] Use the lint to clean `CSS` code. - [ ] Document all things. --- ### Assignees - [ ] Final assign @yairodriguez
priority
myth description create the myth design has to be original issue checklist write the needed tests create the markup for the component add the correct styles use the lint to clean css code document all things assignees final assign yairodriguez
1
134,166
12,566,684,307
IssuesEvent
2020-06-08 11:40:21
20-1-SKKU-OSS/2020-1-OSS-8
https://api.github.com/repos/20-1-SKKU-OSS/2020-1-OSS-8
opened
[번역수정요청] imdb_fasttext.md
documentation
번역 미완성: - 첫 번째 표에서 -> Embedding : 임베딩 -> Accuracy, 5 epochs : 정확도, 5에폭 -> Speed (s/epoch) : 속도(초/에폭) -> Hardware : 하드웨어 - 효율적인 embedding 층부터 시작 : 효율적인 임베딩 층부터 시작 - embeddings를 평균 낼 GlobalAveragePooling1D를 더하라 : 임베딩을 평균 낼 GlobalAveragePooling1D를 추가 번역 스타일: - 단일 단위 출력 레이어에 반영하여 S자형으로 압착한다 : 단일 단위 출력 레이어에 반영하여 S자형 으로 압착
1.0
[번역수정요청] imdb_fasttext.md - 번역 미완성: - 첫 번째 표에서 -> Embedding : 임베딩 -> Accuracy, 5 epochs : 정확도, 5에폭 -> Speed (s/epoch) : 속도(초/에폭) -> Hardware : 하드웨어 - 효율적인 embedding 층부터 시작 : 효율적인 임베딩 층부터 시작 - embeddings를 평균 낼 GlobalAveragePooling1D를 더하라 : 임베딩을 평균 낼 GlobalAveragePooling1D를 추가 번역 스타일: - 단일 단위 출력 레이어에 반영하여 S자형으로 압착한다 : 단일 단위 출력 레이어에 반영하여 S자형 으로 압착
non_priority
imdb fasttext md 번역 미완성 첫 번째 표에서 embedding 임베딩 accuracy epochs 정확도 speed s epoch 속도 초 에폭 hardware 하드웨어 효율적인 embedding 층부터 시작 효율적인 임베딩 층부터 시작 embeddings를 평균 낼 더하라 임베딩을 평균 낼 추가 번역 스타일 단일 단위 출력 레이어에 반영하여 s자형으로 압착한다 단일 단위 출력 레이어에 반영하여 s자형 으로 압착
0
41,989
5,413,677,503
IssuesEvent
2017-03-01 17:15:12
openshift/origin
https://api.github.com/repos/openshift/origin
closed
flake: OVS generic should add and remove flows when nodes are added and removed
component/networking kind/test-flake priority/P1
https://ci.openshift.redhat.com/jenkins/job/test_pr_origin_extended/1073/ /data/src/github.com/openshift/origin/test/extended/networking/ovs.go:150 Flows after deleting node should be same as before creating it Expected <bool>: false to be true /data/src/github.com/openshift/origin/test/extended/networking/ovs.go:149
1.0
flake: OVS generic should add and remove flows when nodes are added and removed - https://ci.openshift.redhat.com/jenkins/job/test_pr_origin_extended/1073/ /data/src/github.com/openshift/origin/test/extended/networking/ovs.go:150 Flows after deleting node should be same as before creating it Expected <bool>: false to be true /data/src/github.com/openshift/origin/test/extended/networking/ovs.go:149
non_priority
flake ovs generic should add and remove flows when nodes are added and removed data src github com openshift origin test extended networking ovs go flows after deleting node should be same as before creating it expected false to be true data src github com openshift origin test extended networking ovs go
0
748,090
26,106,618,763
IssuesEvent
2022-12-27 14:01:29
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.britannica.com - design is broken
browser-firefox priority-important engine-gecko
<!-- @browser: Firefox 108.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 Firefox/108.0 --> <!-- @reported_with: unknown --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/115895 --> **URL**: https://www.britannica.com/topic/Flying-Spaghetti-Monster **Browser / Version**: Firefox 108.0 **Operating System**: Windows 10 **Tested Another Browser**: Yes Edge **Problem type**: Design is broken **Description**: Images not loaded **Steps to Reproduce**: Just opened the page (problem is also on some other sites). Some elements on the page (buttons made from images) are not shown as buttons but as alternate text. <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2022/12/da183dd7-a917-43c0-b501-ee7030c1e446.jpg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
www.britannica.com - design is broken - <!-- @browser: Firefox 108.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 Firefox/108.0 --> <!-- @reported_with: unknown --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/115895 --> **URL**: https://www.britannica.com/topic/Flying-Spaghetti-Monster **Browser / Version**: Firefox 108.0 **Operating System**: Windows 10 **Tested Another Browser**: Yes Edge **Problem type**: Design is broken **Description**: Images not loaded **Steps to Reproduce**: Just opened the page (problem is also on some other sites). Some elements on the page (buttons made from images) are not shown as buttons but as alternate text. <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2022/12/da183dd7-a917-43c0-b501-ee7030c1e446.jpg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
priority
design is broken url browser version firefox operating system windows tested another browser yes edge problem type design is broken description images not loaded steps to reproduce just opened the page problem is also on some other sites some elements on the page buttons made from images are not shown as buttons but as alternate text view the screenshot img alt screenshot src browser configuration none from with ❤️
1
342,631
10,319,846,460
IssuesEvent
2019-08-30 18:41:13
dasaderi/PIT_fellows_workgroup
https://api.github.com/repos/dasaderi/PIT_fellows_workgroup
closed
Steering committee members personal outreach
MozFest high_priority_level outreach
Everyone from the committee should reach out to their personal networks to share the survey. Please add bullet points as you plan your personal outreach. - [x] Daniela to post on MoFo fellows' Slack - [x] Reach out to Amel, Moz Science Fellow - [x] Jen to send info out to Tech Exchange fellows - [x] Becca to email the 2017-18 Mozilla fellows cohort
1.0
Steering committee members personal outreach - Everyone from the committee should reach out to their personal networks to share the survey. Please add bullet points as you plan your personal outreach. - [x] Daniela to post on MoFo fellows' Slack - [x] Reach out to Amel, Moz Science Fellow - [x] Jen to send info out to Tech Exchange fellows - [x] Becca to email the 2017-18 Mozilla fellows cohort
priority
steering committee members personal outreach everyone from the committee should reach out to their personal networks to share the survey please add bullet points as you plan your personal outreach daniela to post on mofo fellows slack reach out to amel moz science fellow jen to send info out to tech exchange fellows becca to email the mozilla fellows cohort
1
42,487
2,870,846,344
IssuesEvent
2015-06-07 15:44:47
FLEXIcontent/flexicontent-cck
https://api.github.com/repos/FLEXIcontent/flexicontent-cck
closed
Make search query parameters language independent
enhancement Priority Normal
As a suggestion, maybe the query parameter "searchword" could be something shorter and independent from any language, in order to avoid mixed languages urls. Maybe you can use the letter "q", such as used by Google: www.site.com/search?q=example This was originally asked here: http://www.flexicontent.org/forum/21-troubleshooting/53661-search-issues-with-languages-and-sef.html Where you also commented: "we would also want to possible replace our filter_NN= with e.g. q_fieldname in regards of field filters too"
1.0
Make search query parameters language independent - As a suggestion, maybe the query parameter "searchword" could be something shorter and independent from any language, in order to avoid mixed languages urls. Maybe you can use the letter "q", such as used by Google: www.site.com/search?q=example This was originally asked here: http://www.flexicontent.org/forum/21-troubleshooting/53661-search-issues-with-languages-and-sef.html Where you also commented: "we would also want to possible replace our filter_NN= with e.g. q_fieldname in regards of field filters too"
priority
make search query parameters language independent as a suggestion maybe the query parameter searchword could be something shorter and independent from any language in order to avoid mixed languages urls maybe you can use the letter q such as used by google this was originally asked here where you also commented we would also want to possible replace our filter nn with e g q fieldname in regards of field filters too
1
443,340
30,885,600,838
IssuesEvent
2023-08-03 21:28:19
AsmSafone/SafoneAPI
https://api.github.com/repos/AsmSafone/SafoneAPI
closed
Api call failed
bug documentation
Traceback (most recent call last): File "/app/Mr.Stark/Stark/__init__.py", line 83, in wrapper return await func(client, message, *args, **kwargs) File "/app/Mr.Stark/Stark/Plugins/translater.py", line 21, in translate_me output = await api.translate(text, target=lang) File "/opt/venv/lib/python3.8/site-packages/SafoneAPI/__init__.py", line 913, in translate return await self._fetch("translate", text=text, origin=origin, target=target) File "/opt/venv/lib/python3.8/site-packages/SafoneAPI/__init__.py", line 68, in _fetch raise GenericApiError( SafoneAPI.GenericApiError: Api Call Failed, Please report this: https://api.safone.me/report
1.0
Api call failed - Traceback (most recent call last): File "/app/Mr.Stark/Stark/__init__.py", line 83, in wrapper return await func(client, message, *args, **kwargs) File "/app/Mr.Stark/Stark/Plugins/translater.py", line 21, in translate_me output = await api.translate(text, target=lang) File "/opt/venv/lib/python3.8/site-packages/SafoneAPI/__init__.py", line 913, in translate return await self._fetch("translate", text=text, origin=origin, target=target) File "/opt/venv/lib/python3.8/site-packages/SafoneAPI/__init__.py", line 68, in _fetch raise GenericApiError( SafoneAPI.GenericApiError: Api Call Failed, Please report this: https://api.safone.me/report
non_priority
api call failed traceback most recent call last file app mr stark stark init py line in wrapper return await func client message args kwargs file app mr stark stark plugins translater py line in translate me output await api translate text target lang file opt venv lib site packages safoneapi init py line in translate return await self fetch translate text text origin origin target target file opt venv lib site packages safoneapi init py line in fetch raise genericapierror safoneapi genericapierror api call failed please report this
0
12,867
8,026,063,006
IssuesEvent
2018-07-27 01:35:22
tensorflow/tensorflow
https://api.github.com/repos/tensorflow/tensorflow
closed
TF hangs with distributed mode
stat:awaiting response type:bug/performance
### System information - **Have I written custom code (as opposed to using a stock example script provided in TensorFlow)**: No - **OS Platform and Distribution (e.g., Linux Ubuntu 16.04)**: Linux Ubuntu 16.04 - **TensorFlow installed from (source or binary)**: source - **TensorFlow version (use command below)**: 1.5 - **Python version**: 2.7 - **Bazel version (if compiling from source)**: 0.5.4 - **GCC/Compiler version (if compiling from source)**: 5.4.0 - **CUDA/cuDNN version**: 9.0/7 - **GPU model and memory**: TitanXP, 12G - **Exact command to reproduce**: ### Describe the problem When I run skip_thoughts model with distributed mode(2 workers in a machine, 2 GPUs per worker), tf hangs with linux condition variable error. ### Source code / logs Below is the gdb log. `Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". pthread_cond_wait@@GLIBC_2.3.2 () at ../sysdeps/unix/sysv/linux/x86_64/pthread_cond_wait.S:185 185 ../sysdeps/unix/sysv/linux/x86_64/pthread_cond_wait.S: No such file or directory. (gdb) bt #0 pthread_cond_wait@@GLIBC_2.3.2 () at ../sysdeps/unix/sysv/linux/x86_64/pthread_cond_wait.S:185 #1 0x00007fd44d2e891c in std::condition_variable::wait(std::unique_lock<std::mutex>&) () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #2 0x00007fd45b021ecb in nsync::nsync_mu_semaphore_p_with_deadline(nsync::nsync_semaphore_s_*, timespec) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so #3 0x00007fd45b0217a1 in nsync::nsync_sem_wait_with_cancel_(nsync::waiter*, timespec, nsync::nsync_note_s_*) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so #4 0x00007fd45b01ec12 in nsync::nsync_cv_wait_with_deadline_generic(nsync::nsync_cv_s_*, void*, void (*)(void*), void (*)(void*), timespec, nsync::nsync_note_s_*) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so #5 0x00007fd45b01f0f3 in nsync::nsync_cv_wait_with_deadline(nsync::nsync_cv_s_*, nsync::nsync_mu_s_*, timespec, nsync::nsync_note_s_*) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so #6 0x00007fd45879da1b in tensorflow::(anonymous namespace)::WaitForNotification(tensorflow::CallOptions*, long long, tensorflow::Notification*) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so #7 0x00007fd45879e313 in tensorflow::LocalMaster::RunStep(tensorflow::CallOptions*, tensorflow::RunStepRequestWrapper*, tensorflow::MutableRunStepResponseWrapper*) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so`
True
TF hangs with distributed mode - ### System information - **Have I written custom code (as opposed to using a stock example script provided in TensorFlow)**: No - **OS Platform and Distribution (e.g., Linux Ubuntu 16.04)**: Linux Ubuntu 16.04 - **TensorFlow installed from (source or binary)**: source - **TensorFlow version (use command below)**: 1.5 - **Python version**: 2.7 - **Bazel version (if compiling from source)**: 0.5.4 - **GCC/Compiler version (if compiling from source)**: 5.4.0 - **CUDA/cuDNN version**: 9.0/7 - **GPU model and memory**: TitanXP, 12G - **Exact command to reproduce**: ### Describe the problem When I run skip_thoughts model with distributed mode(2 workers in a machine, 2 GPUs per worker), tf hangs with linux condition variable error. ### Source code / logs Below is the gdb log. `Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". pthread_cond_wait@@GLIBC_2.3.2 () at ../sysdeps/unix/sysv/linux/x86_64/pthread_cond_wait.S:185 185 ../sysdeps/unix/sysv/linux/x86_64/pthread_cond_wait.S: No such file or directory. (gdb) bt #0 pthread_cond_wait@@GLIBC_2.3.2 () at ../sysdeps/unix/sysv/linux/x86_64/pthread_cond_wait.S:185 #1 0x00007fd44d2e891c in std::condition_variable::wait(std::unique_lock<std::mutex>&) () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #2 0x00007fd45b021ecb in nsync::nsync_mu_semaphore_p_with_deadline(nsync::nsync_semaphore_s_*, timespec) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so #3 0x00007fd45b0217a1 in nsync::nsync_sem_wait_with_cancel_(nsync::waiter*, timespec, nsync::nsync_note_s_*) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so #4 0x00007fd45b01ec12 in nsync::nsync_cv_wait_with_deadline_generic(nsync::nsync_cv_s_*, void*, void (*)(void*), void (*)(void*), timespec, nsync::nsync_note_s_*) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so #5 0x00007fd45b01f0f3 in nsync::nsync_cv_wait_with_deadline(nsync::nsync_cv_s_*, nsync::nsync_mu_s_*, timespec, nsync::nsync_note_s_*) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so #6 0x00007fd45879da1b in tensorflow::(anonymous namespace)::WaitForNotification(tensorflow::CallOptions*, long long, tensorflow::Notification*) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so #7 0x00007fd45879e313 in tensorflow::LocalMaster::RunStep(tensorflow::CallOptions*, tensorflow::RunStepRequestWrapper*, tensorflow::MutableRunStepResponseWrapper*) () from /home/soojeong/expdir_parallax/venv/local/lib/python2.7/site-packages/tensorflow/python/_pywrap_tensorflow_internal.so`
non_priority
tf hangs with distributed mode system information have i written custom code as opposed to using a stock example script provided in tensorflow no os platform and distribution e g linux ubuntu linux ubuntu tensorflow installed from source or binary source tensorflow version use command below python version bazel version if compiling from source gcc compiler version if compiling from source cuda cudnn version gpu model and memory titanxp exact command to reproduce describe the problem when i run skip thoughts model with distributed mode workers in a machine gpus per worker tf hangs with linux condition variable error source code logs below is the gdb log using host libthread db library lib linux gnu libthread db so pthread cond wait glibc at sysdeps unix sysv linux pthread cond wait s sysdeps unix sysv linux pthread cond wait s no such file or directory gdb bt pthread cond wait glibc at sysdeps unix sysv linux pthread cond wait s in std condition variable wait std unique lock from usr lib linux gnu libstdc so in nsync nsync mu semaphore p with deadline nsync nsync semaphore s timespec from home soojeong expdir parallax venv local lib site packages tensorflow python pywrap tensorflow internal so in nsync nsync sem wait with cancel nsync waiter timespec nsync nsync note s from home soojeong expdir parallax venv local lib site packages tensorflow python pywrap tensorflow internal so in nsync nsync cv wait with deadline generic nsync nsync cv s void void void void void timespec nsync nsync note s from home soojeong expdir parallax venv local lib site packages tensorflow python pywrap tensorflow internal so in nsync nsync cv wait with deadline nsync nsync cv s nsync nsync mu s timespec nsync nsync note s from home soojeong expdir parallax venv local lib site packages tensorflow python pywrap tensorflow internal so in tensorflow anonymous namespace waitfornotification tensorflow calloptions long long tensorflow notification from home soojeong expdir parallax venv local lib site packages tensorflow python pywrap tensorflow internal so in tensorflow localmaster runstep tensorflow calloptions tensorflow runsteprequestwrapper tensorflow mutablerunstepresponsewrapper from home soojeong expdir parallax venv local lib site packages tensorflow python pywrap tensorflow internal so
0
66,575
14,788,934,074
IssuesEvent
2021-01-12 09:53:42
andygonzalez2010/store
https://api.github.com/repos/andygonzalez2010/store
opened
CVE-2020-13822 (High) detected in elliptic-6.4.1.tgz
security vulnerability
## CVE-2020-13822 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.4.1.tgz</b></p></summary> <p>EC cryptography</p> <p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.4.1.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.4.1.tgz</a></p> <p>Path to dependency file: store/package.json</p> <p>Path to vulnerable library: store/node_modules/elliptic/package.json</p> <p> Dependency Hierarchy: - webpack-4.28.4.tgz (Root Library) - node-libs-browser-2.2.0.tgz - crypto-browserify-3.12.0.tgz - browserify-sign-4.0.4.tgz - :x: **elliptic-6.4.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/andygonzalez2010/store/commit/3f6d614029f4d6cfdddfcef8468949cb7822503c">3f6d614029f4d6cfdddfcef8468949cb7822503c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature. <p>Publish Date: 2020-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13822>CVE-2020-13822</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/indutny/elliptic/tree/v6.5.3">https://github.com/indutny/elliptic/tree/v6.5.3</a></p> <p>Release Date: 2020-06-04</p> <p>Fix Resolution: v6.5.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-13822 (High) detected in elliptic-6.4.1.tgz - ## CVE-2020-13822 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.4.1.tgz</b></p></summary> <p>EC cryptography</p> <p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.4.1.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.4.1.tgz</a></p> <p>Path to dependency file: store/package.json</p> <p>Path to vulnerable library: store/node_modules/elliptic/package.json</p> <p> Dependency Hierarchy: - webpack-4.28.4.tgz (Root Library) - node-libs-browser-2.2.0.tgz - crypto-browserify-3.12.0.tgz - browserify-sign-4.0.4.tgz - :x: **elliptic-6.4.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/andygonzalez2010/store/commit/3f6d614029f4d6cfdddfcef8468949cb7822503c">3f6d614029f4d6cfdddfcef8468949cb7822503c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature. <p>Publish Date: 2020-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13822>CVE-2020-13822</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/indutny/elliptic/tree/v6.5.3">https://github.com/indutny/elliptic/tree/v6.5.3</a></p> <p>Release Date: 2020-06-04</p> <p>Fix Resolution: v6.5.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in elliptic tgz cve high severity vulnerability vulnerable library elliptic tgz ec cryptography library home page a href path to dependency file store package json path to vulnerable library store node modules elliptic package json dependency hierarchy webpack tgz root library node libs browser tgz crypto browserify tgz browserify sign tgz x elliptic tgz vulnerable library found in head commit a href found in base branch master vulnerability details the elliptic package for node js allows ecdsa signature malleability via variations in encoding leading bytes or integer overflows this could conceivably have a security relevant impact if an application relied on a single canonical signature publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
235,446
7,738,595,807
IssuesEvent
2018-05-28 12:40:11
Ybalrid/virtual-air-hockey
https://api.github.com/repos/Ybalrid/virtual-air-hockey
closed
Fix falcon collision feedback for player 2
1st priority Networking Novint related Physics stuff bug
Right now the player 2 doesn't get proper collision. I suggest adding the collision information to the packets stent by the server. Since we trust server's physics.
1.0
Fix falcon collision feedback for player 2 - Right now the player 2 doesn't get proper collision. I suggest adding the collision information to the packets stent by the server. Since we trust server's physics.
priority
fix falcon collision feedback for player right now the player doesn t get proper collision i suggest adding the collision information to the packets stent by the server since we trust server s physics
1
690,054
23,644,410,986
IssuesEvent
2022-08-25 20:24:31
WarwickAI/wai-platform-v2
https://api.github.com/repos/WarwickAI/wai-platform-v2
closed
Add date field to events
enhancement high-priority
For Tutorials and Talks, this will be the date of the event. For Courses and Project, this will be the starting date of the event. Can be shown in the `extraInfo` section on the cards, and beneath the heading on the page.
1.0
Add date field to events - For Tutorials and Talks, this will be the date of the event. For Courses and Project, this will be the starting date of the event. Can be shown in the `extraInfo` section on the cards, and beneath the heading on the page.
priority
add date field to events for tutorials and talks this will be the date of the event for courses and project this will be the starting date of the event can be shown in the extrainfo section on the cards and beneath the heading on the page
1
610,393
18,906,447,922
IssuesEvent
2021-11-16 09:35:44
craftercms/craftercms
https://api.github.com/repos/craftercms/craftercms
closed
[studio-ui] Icons are being displayed larger than intended
bug priority: medium
### Bug Report #### Crafter CMS Version ``` Studio Version Number: 4.0.0-SNAPSHOT-7c6989 Build Number: 7c69897050e62b929364876f4f1cb0e6f9c191bc Build Date: 29/10/2021, 1:36 pm ``` #### Describe the bug Icons on PathNav and AddressBar components (possibly other places, please review thoroughly) are displayed larger than intended. #### To Reproduce Compare the sizes of the icons on the PathNav or the AddressBar with the PathNavTree. The intended size is the one on the PathNavTree (e.g. templates). #### Screenshots <img width="239" alt="image" src="https://user-images.githubusercontent.com/3928341/140478446-ef1ca3c6-89d1-477d-b543-bcdd03a76075.png">
1.0
[studio-ui] Icons are being displayed larger than intended - ### Bug Report #### Crafter CMS Version ``` Studio Version Number: 4.0.0-SNAPSHOT-7c6989 Build Number: 7c69897050e62b929364876f4f1cb0e6f9c191bc Build Date: 29/10/2021, 1:36 pm ``` #### Describe the bug Icons on PathNav and AddressBar components (possibly other places, please review thoroughly) are displayed larger than intended. #### To Reproduce Compare the sizes of the icons on the PathNav or the AddressBar with the PathNavTree. The intended size is the one on the PathNavTree (e.g. templates). #### Screenshots <img width="239" alt="image" src="https://user-images.githubusercontent.com/3928341/140478446-ef1ca3c6-89d1-477d-b543-bcdd03a76075.png">
priority
icons are being displayed larger than intended bug report crafter cms version studio version number snapshot build number build date pm describe the bug icons on pathnav and addressbar components possibly other places please review thoroughly are displayed larger than intended to reproduce compare the sizes of the icons on the pathnav or the addressbar with the pathnavtree the intended size is the one on the pathnavtree e g templates screenshots img width alt image src
1
499,218
14,443,176,587
IssuesEvent
2020-12-07 19:14:59
cloudfoundry-incubator/kubecf
https://api.github.com/repos/cloudfoundry-incubator/kubecf
closed
Enabling the autoscaler feature restarts credhub and uaa
Priority: Medium Status: Not A Bug Type: Bug
**Describe the bug** I installed kubecf with `make kubecf-apply` (uses Diego). Pushed and tested 12factor sample app. Then upgraded via `FEATURE_AUTOSCALER=1 make kubecf-apply`. This first restarted both `bosh-dns` pods, which may be necessary (I don't know). But then it also stopped `credhub` and `uaa`, which should not be affected. Eventually `credhub` and `uaa` come back, and all autoscaler pods start, and everything seems fine. The 12factor app remained accessible during the whole time. **Expected behavior** I expect `credhub` and `uaa` not to be restarted when the only requested change is enabling autoscaler.
1.0
Enabling the autoscaler feature restarts credhub and uaa - **Describe the bug** I installed kubecf with `make kubecf-apply` (uses Diego). Pushed and tested 12factor sample app. Then upgraded via `FEATURE_AUTOSCALER=1 make kubecf-apply`. This first restarted both `bosh-dns` pods, which may be necessary (I don't know). But then it also stopped `credhub` and `uaa`, which should not be affected. Eventually `credhub` and `uaa` come back, and all autoscaler pods start, and everything seems fine. The 12factor app remained accessible during the whole time. **Expected behavior** I expect `credhub` and `uaa` not to be restarted when the only requested change is enabling autoscaler.
priority
enabling the autoscaler feature restarts credhub and uaa describe the bug i installed kubecf with make kubecf apply uses diego pushed and tested sample app then upgraded via feature autoscaler make kubecf apply this first restarted both bosh dns pods which may be necessary i don t know but then it also stopped credhub and uaa which should not be affected eventually credhub and uaa come back and all autoscaler pods start and everything seems fine the app remained accessible during the whole time expected behavior i expect credhub and uaa not to be restarted when the only requested change is enabling autoscaler
1
196,972
22,572,025,280
IssuesEvent
2022-06-28 01:47:49
xlizaluizax/datocms-Vue.js---DatoCMS---DatingWIKI
https://api.github.com/repos/xlizaluizax/datocms-Vue.js---DatoCMS---DatingWIKI
opened
CVE-2021-42740 (High) detected in shell-quote-1.7.2.tgz
security vulnerability
## CVE-2021-42740 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>shell-quote-1.7.2.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/shell-quote/package.json</p> <p> Dependency Hierarchy: - cli-plugin-babel-4.2.3.tgz (Root Library) - cli-shared-utils-4.2.3.tgz - launch-editor-2.2.1.tgz - :x: **shell-quote-1.7.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/xlizaluizax/datocms-Vue.js---DatoCMS---DatingWIKI/commit/4bd03db9e49918a230ca87828b997a7380cb1b7e">4bd03db9e49918a230ca87828b997a7380cb1b7e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character. <p>Publish Date: 2021-10-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42740>CVE-2021-42740</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740</a></p> <p>Release Date: 2021-10-21</p> <p>Fix Resolution: shell-quote - 1.7.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-42740 (High) detected in shell-quote-1.7.2.tgz - ## CVE-2021-42740 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>shell-quote-1.7.2.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/shell-quote/package.json</p> <p> Dependency Hierarchy: - cli-plugin-babel-4.2.3.tgz (Root Library) - cli-shared-utils-4.2.3.tgz - launch-editor-2.2.1.tgz - :x: **shell-quote-1.7.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/xlizaluizax/datocms-Vue.js---DatoCMS---DatingWIKI/commit/4bd03db9e49918a230ca87828b997a7380cb1b7e">4bd03db9e49918a230ca87828b997a7380cb1b7e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character. <p>Publish Date: 2021-10-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42740>CVE-2021-42740</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740</a></p> <p>Release Date: 2021-10-21</p> <p>Fix Resolution: shell-quote - 1.7.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in shell quote tgz cve high severity vulnerability vulnerable library shell quote tgz quote and parse shell commands library home page a href path to dependency file package json path to vulnerable library node modules shell quote package json dependency hierarchy cli plugin babel tgz root library cli shared utils tgz launch editor tgz x shell quote tgz vulnerable library found in head commit a href vulnerability details the shell quote package before for node js allows command injection an attacker can inject unescaped shell metacharacters through a regex designed to support windows drive letters if the output of this package is passed to a real shell as a quoted argument to a command with exec an attacker can inject arbitrary commands this is because the windows drive letter regex character class is a z instead of the correct a za z several shell metacharacters exist in the space between capital letter z and lower case letter a such as the backtick character publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution shell quote step up your open source security game with mend
0
343,332
30,658,508,809
IssuesEvent
2023-07-25 13:39:32
stockOneQ/back
https://api.github.com/repos/stockOneQ/back
closed
제품 목록 조회 API 구현 및 제품 CRUD 쿼리를 픽스한다
🐞 BugFix 📬 API 🔨 Refactor ✅ Test ✨ Feature
## Description 🖊️ - 제품 목록 조회 API를 구현한다 - 모든 조회는 가나다순 및 빈도순 두 가지 경우로 나뉘며, 기본 정렬은 가나다순으로 한다 ## To-do 🧑‍💻 - [ ] 전체 목록 조회 - [ ] 유통기한 경과 목록 조회 - [ ] 유통기한 임박 목록 조회 - [ ] 재고 부족 목록 조회 - [ ] 분류 기준별 제품 갯수 조회
1.0
제품 목록 조회 API 구현 및 제품 CRUD 쿼리를 픽스한다 - ## Description 🖊️ - 제품 목록 조회 API를 구현한다 - 모든 조회는 가나다순 및 빈도순 두 가지 경우로 나뉘며, 기본 정렬은 가나다순으로 한다 ## To-do 🧑‍💻 - [ ] 전체 목록 조회 - [ ] 유통기한 경과 목록 조회 - [ ] 유통기한 임박 목록 조회 - [ ] 재고 부족 목록 조회 - [ ] 분류 기준별 제품 갯수 조회
non_priority
제품 목록 조회 api 구현 및 제품 crud 쿼리를 픽스한다 description 🖊️ 제품 목록 조회 api를 구현한다 모든 조회는 가나다순 및 빈도순 두 가지 경우로 나뉘며 기본 정렬은 가나다순으로 한다 to do 🧑‍💻 전체 목록 조회 유통기한 경과 목록 조회 유통기한 임박 목록 조회 재고 부족 목록 조회 분류 기준별 제품 갯수 조회
0
709,032
24,365,653,485
IssuesEvent
2022-10-03 14:58:49
NCAR/wrfcloud
https://api.github.com/repos/NCAR/wrfcloud
opened
Add workflow manager to runtime components
priority: low alert: NEED MORE DEFINITION component: NWP components
## Describe the New Feature ## Consider adding a workflow manager, e.g. ecflow or rocoto, to the runtime components to help manage the monitoring and job dependencies. ### Acceptance Testing ### *List input data types and sources.* *Describe tests required for new functionality.* ### Time Estimate ### *Estimate the amount of work required here.* *Issues should represent approximately 1 to 3 days of work.* ### Sub-Issues ### Consider breaking the new feature down into sub-issues. - [ ] *Add a checkbox for each sub-issue here.* ### Relevant Deadlines ### *List relevant project deadlines here or state NONE.* ## Define the Metadata ## ### Assignee ### - [ ] Select **engineer(s)** or **no engineer** required - [ ] Select **scientist(s)** or **no scientist** required ### Labels ### - [ ] Select **component(s)** - [ ] Select **priority** ### Projects and Milestone ### - [ ] Select **Project** - [ ] Select **Milestone** as the next official version or **Backlog of Development Ideas** ## New Feature Checklist ## - [ ] Complete the issue definition above, including the **Time Estimate** and **Funding source**. - [ ] Fork this repository or create a branch of **develop**. Branch name: `feature_<Issue Number>/<Description>` - [ ] Complete the development and test your changes. - [ ] Add/update log messages for easier debugging. - [ ] Add/update tests. - [ ] Add/update documentation. - [ ] Push local changes to GitHub. - [ ] Submit a pull request to merge into **develop**. Pull request: `feature <Issue Number> <Description>` - [ ] Define the pull request metadata, as permissions allow. Select: **Reviewer(s)**, **Project**, and **Development** issue Select: **Milestone** as the next official version - [ ] Iterate until the reviewer(s) accept and merge your changes. - [ ] Delete your fork or branch. - [ ] Close this issue.
1.0
Add workflow manager to runtime components - ## Describe the New Feature ## Consider adding a workflow manager, e.g. ecflow or rocoto, to the runtime components to help manage the monitoring and job dependencies. ### Acceptance Testing ### *List input data types and sources.* *Describe tests required for new functionality.* ### Time Estimate ### *Estimate the amount of work required here.* *Issues should represent approximately 1 to 3 days of work.* ### Sub-Issues ### Consider breaking the new feature down into sub-issues. - [ ] *Add a checkbox for each sub-issue here.* ### Relevant Deadlines ### *List relevant project deadlines here or state NONE.* ## Define the Metadata ## ### Assignee ### - [ ] Select **engineer(s)** or **no engineer** required - [ ] Select **scientist(s)** or **no scientist** required ### Labels ### - [ ] Select **component(s)** - [ ] Select **priority** ### Projects and Milestone ### - [ ] Select **Project** - [ ] Select **Milestone** as the next official version or **Backlog of Development Ideas** ## New Feature Checklist ## - [ ] Complete the issue definition above, including the **Time Estimate** and **Funding source**. - [ ] Fork this repository or create a branch of **develop**. Branch name: `feature_<Issue Number>/<Description>` - [ ] Complete the development and test your changes. - [ ] Add/update log messages for easier debugging. - [ ] Add/update tests. - [ ] Add/update documentation. - [ ] Push local changes to GitHub. - [ ] Submit a pull request to merge into **develop**. Pull request: `feature <Issue Number> <Description>` - [ ] Define the pull request metadata, as permissions allow. Select: **Reviewer(s)**, **Project**, and **Development** issue Select: **Milestone** as the next official version - [ ] Iterate until the reviewer(s) accept and merge your changes. - [ ] Delete your fork or branch. - [ ] Close this issue.
priority
add workflow manager to runtime components describe the new feature consider adding a workflow manager e g ecflow or rocoto to the runtime components to help manage the monitoring and job dependencies acceptance testing list input data types and sources describe tests required for new functionality time estimate estimate the amount of work required here issues should represent approximately to days of work sub issues consider breaking the new feature down into sub issues add a checkbox for each sub issue here relevant deadlines list relevant project deadlines here or state none define the metadata assignee select engineer s or no engineer required select scientist s or no scientist required labels select component s select priority projects and milestone select project select milestone as the next official version or backlog of development ideas new feature checklist complete the issue definition above including the time estimate and funding source fork this repository or create a branch of develop branch name feature complete the development and test your changes add update log messages for easier debugging add update tests add update documentation push local changes to github submit a pull request to merge into develop pull request feature define the pull request metadata as permissions allow select reviewer s project and development issue select milestone as the next official version iterate until the reviewer s accept and merge your changes delete your fork or branch close this issue
1
103,903
22,498,693,413
IssuesEvent
2022-06-23 09:49:03
Onelinerhub/onelinerhub
https://api.github.com/repos/Onelinerhub/onelinerhub
closed
Short solution needed: "How to convert yyyymmdd string to datetime" (python-pandas)
help wanted good first issue code python-pandas
Please help us write most modern and shortest code solution for this issue: **How to convert yyyymmdd string to datetime** (technology: [python-pandas](https://onelinerhub.com/python-pandas)) ### Fast way Just write the code solution in the comments. ### Prefered way 1. Create pull request with a new code file inside [inbox folder](https://github.com/Onelinerhub/onelinerhub/tree/main/inbox). 2. Don't forget to use comments to make solution explained. 3. Link to this issue in comments of pull request.
1.0
Short solution needed: "How to convert yyyymmdd string to datetime" (python-pandas) - Please help us write most modern and shortest code solution for this issue: **How to convert yyyymmdd string to datetime** (technology: [python-pandas](https://onelinerhub.com/python-pandas)) ### Fast way Just write the code solution in the comments. ### Prefered way 1. Create pull request with a new code file inside [inbox folder](https://github.com/Onelinerhub/onelinerhub/tree/main/inbox). 2. Don't forget to use comments to make solution explained. 3. Link to this issue in comments of pull request.
non_priority
short solution needed how to convert yyyymmdd string to datetime python pandas please help us write most modern and shortest code solution for this issue how to convert yyyymmdd string to datetime technology fast way just write the code solution in the comments prefered way create pull request with a new code file inside don t forget to use comments to make solution explained link to this issue in comments of pull request
0
306,326
9,383,995,024
IssuesEvent
2019-04-05 06:29:07
ntop/ntopng
https://api.github.com/repos/ntop/ntopng
opened
(Almost) Useless SSL Alerts Certificate Mismatch
bug priority ticket
![image](https://user-images.githubusercontent.com/4493366/55607516-ace8a600-577c-11e9-9216-27f6970cd1e0.png) The above alert is almost useless as it is not clear what is the problem being reported. Please list - requested client certificate - offered server certificates
1.0
(Almost) Useless SSL Alerts Certificate Mismatch - ![image](https://user-images.githubusercontent.com/4493366/55607516-ace8a600-577c-11e9-9216-27f6970cd1e0.png) The above alert is almost useless as it is not clear what is the problem being reported. Please list - requested client certificate - offered server certificates
priority
almost useless ssl alerts certificate mismatch the above alert is almost useless as it is not clear what is the problem being reported please list requested client certificate offered server certificates
1
804,733
29,498,670,325
IssuesEvent
2023-06-02 19:23:28
googleapis/nodejs-pubsub
https://api.github.com/repos/googleapis/nodejs-pubsub
closed
Add sample for pubsub_commit_avro_schema
type: feature request api: pubsub priority: p3 samples
This is a Node sample for schema revisions. ref: 266567049
1.0
Add sample for pubsub_commit_avro_schema - This is a Node sample for schema revisions. ref: 266567049
priority
add sample for pubsub commit avro schema this is a node sample for schema revisions ref
1
385,125
11,413,015,669
IssuesEvent
2020-02-01 16:55:51
elninotech/uppload
https://api.github.com/repos/elninotech/uppload
closed
Uppload hangs while uploading PDFs
bug good first issue high-priority
When I upload images, everything works. But, when I upload pdfs of any size, it hangs on the "uploading" screen. ![image](https://user-images.githubusercontent.com/962281/73140745-f2df6500-4041-11ea-8610-d3d902b8ea15.png) The `before-upload` event does fire. No error event fires. No error message is ever displayed. No XHR request is ever made to the backend. The `settingsFunction` never fires. I have the following configuration ```ts const uppload = new Uppload({ lang: en, defaultService: "local", uploader: xhrUploader({ responseKey: "file", endpoint: `${process.env.API_URL}/attachments`, settingsFunction(xmlHttp) { console.log("do i get to settingsFunc"); xmlHttp.setRequestHeader("authorization", Auth.getToken()); }, }) }); uppload.use([ new Local({ mimeTypes: ["image/png", "image/jpeg", "image/gif", "application/pdf"] }) ]); uppload.on("*", console.log); ``` I attached an event emitter to all events and got the following console output ![image](https://user-images.githubusercontent.com/962281/73140874-4900d800-4043-11ea-86ec-652a9d7a00cb.png)
1.0
Uppload hangs while uploading PDFs - When I upload images, everything works. But, when I upload pdfs of any size, it hangs on the "uploading" screen. ![image](https://user-images.githubusercontent.com/962281/73140745-f2df6500-4041-11ea-8610-d3d902b8ea15.png) The `before-upload` event does fire. No error event fires. No error message is ever displayed. No XHR request is ever made to the backend. The `settingsFunction` never fires. I have the following configuration ```ts const uppload = new Uppload({ lang: en, defaultService: "local", uploader: xhrUploader({ responseKey: "file", endpoint: `${process.env.API_URL}/attachments`, settingsFunction(xmlHttp) { console.log("do i get to settingsFunc"); xmlHttp.setRequestHeader("authorization", Auth.getToken()); }, }) }); uppload.use([ new Local({ mimeTypes: ["image/png", "image/jpeg", "image/gif", "application/pdf"] }) ]); uppload.on("*", console.log); ``` I attached an event emitter to all events and got the following console output ![image](https://user-images.githubusercontent.com/962281/73140874-4900d800-4043-11ea-86ec-652a9d7a00cb.png)
priority
uppload hangs while uploading pdfs when i upload images everything works but when i upload pdfs of any size it hangs on the uploading screen the before upload event does fire no error event fires no error message is ever displayed no xhr request is ever made to the backend the settingsfunction never fires i have the following configuration ts const uppload new uppload lang en defaultservice local uploader xhruploader responsekey file endpoint process env api url attachments settingsfunction xmlhttp console log do i get to settingsfunc xmlhttp setrequestheader authorization auth gettoken uppload use new local mimetypes uppload on console log i attached an event emitter to all events and got the following console output
1
111,110
17,012,566,050
IssuesEvent
2021-07-02 07:31:26
longhorn/longhorn
https://api.github.com/repos/longhorn/longhorn
opened
[TASK] Regularly rebuild with the updated package/security patch to catch vulnerability issues earlier
area/package area/security kind/task
**What's the task? Please describe.** As titled, one of the best practices to protect the images from exposure of vulnerabilities is to regularly update the install packages from the base image. Need to make sure we update the packages when building new images. **Describe the items of the task (DoD, definition of done) you'd like.** - [ ] update the installed packages when building images for all components **Additional context** N/A
True
[TASK] Regularly rebuild with the updated package/security patch to catch vulnerability issues earlier - **What's the task? Please describe.** As titled, one of the best practices to protect the images from exposure of vulnerabilities is to regularly update the install packages from the base image. Need to make sure we update the packages when building new images. **Describe the items of the task (DoD, definition of done) you'd like.** - [ ] update the installed packages when building images for all components **Additional context** N/A
non_priority
regularly rebuild with the updated package security patch to catch vulnerability issues earlier what s the task please describe as titled one of the best practices to protect the images from exposure of vulnerabilities is to regularly update the install packages from the base image need to make sure we update the packages when building new images describe the items of the task dod definition of done you d like update the installed packages when building images for all components additional context n a
0
157,577
6,008,757,547
IssuesEvent
2017-06-06 08:46:16
lxde/lxqt
https://api.github.com/repos/lxde/lxqt
closed
Some widgets can not be themed
low-priority lxqt-panel qss/themes
Maybe Im missing something, but this are some little issues I have found while theming: **LXQT Runner** The searh results (QListView or "commandList") use the system theme, but still refuses to be styled with the lxqt-runner.qss. The last update did not change this, or I did not notice how to do it. **Panel Plugins** Show Desktop, Screen Saver, Volume and Mount seems to have a fixed size. If you change the size of the panel to 60px you will see that this widgets stay in a same size while all the others expand with the panel. This leads to them having non clickable areas. This happen also with the old themes. ![rect4613](https://cloud.githubusercontent.com/assets/7544231/4964509/cd7a1e68-672f-11e4-8031-3c829bb915e6.png) I have been lurking the code searching for a way to change this behavior. From the stylesheets the only thing that seems to work is to put "height: 100%" but this is not necesary with other widgets (and this lead to other glitches), so I think that there must be something wrong with this plugins.
1.0
Some widgets can not be themed - Maybe Im missing something, but this are some little issues I have found while theming: **LXQT Runner** The searh results (QListView or "commandList") use the system theme, but still refuses to be styled with the lxqt-runner.qss. The last update did not change this, or I did not notice how to do it. **Panel Plugins** Show Desktop, Screen Saver, Volume and Mount seems to have a fixed size. If you change the size of the panel to 60px you will see that this widgets stay in a same size while all the others expand with the panel. This leads to them having non clickable areas. This happen also with the old themes. ![rect4613](https://cloud.githubusercontent.com/assets/7544231/4964509/cd7a1e68-672f-11e4-8031-3c829bb915e6.png) I have been lurking the code searching for a way to change this behavior. From the stylesheets the only thing that seems to work is to put "height: 100%" but this is not necesary with other widgets (and this lead to other glitches), so I think that there must be something wrong with this plugins.
priority
some widgets can not be themed maybe im missing something but this are some little issues i have found while theming lxqt runner the searh results qlistview or commandlist use the system theme but still refuses to be styled with the lxqt runner qss the last update did not change this or i did not notice how to do it panel plugins show desktop screen saver volume and mount seems to have a fixed size if you change the size of the panel to you will see that this widgets stay in a same size while all the others expand with the panel this leads to them having non clickable areas this happen also with the old themes i have been lurking the code searching for a way to change this behavior from the stylesheets the only thing that seems to work is to put height but this is not necesary with other widgets and this lead to other glitches so i think that there must be something wrong with this plugins
1
405,006
27,500,831,771
IssuesEvent
2023-03-05 17:23:18
hotosm/fmtm
https://api.github.com/repos/hotosm/fmtm
opened
Add documentation for React frontend
documentation Priority: Should have
Currently the React frontend is undocumented. We should describe: - The Microfrontend configuration. - How to set up the development environment. - How to contribute to the frontend. - How it is deployed in production. Pages should be added to the /docs directory via PR. They will be automatically published on the Wiki via CI.
1.0
Add documentation for React frontend - Currently the React frontend is undocumented. We should describe: - The Microfrontend configuration. - How to set up the development environment. - How to contribute to the frontend. - How it is deployed in production. Pages should be added to the /docs directory via PR. They will be automatically published on the Wiki via CI.
non_priority
add documentation for react frontend currently the react frontend is undocumented we should describe the microfrontend configuration how to set up the development environment how to contribute to the frontend how it is deployed in production pages should be added to the docs directory via pr they will be automatically published on the wiki via ci
0
433,376
12,505,736,366
IssuesEvent
2020-06-02 11:17:35
gitcoinco/web
https://api.github.com/repos/gitcoinco/web
closed
UX when an issue is kicked back to open
Gitcoin Bounties To Define priority: ungroomed
(not ready to be worked on) From Seiron on chat: > What about the issues where someone started working but they got reopened due to lack of progress? They have usually an unrealistic rest period of time to finish them. Is there a solution to add some more time to it? There are some issues with only some days left. What happens with this issues? Gone forever? (edited)
1.0
UX when an issue is kicked back to open - (not ready to be worked on) From Seiron on chat: > What about the issues where someone started working but they got reopened due to lack of progress? They have usually an unrealistic rest period of time to finish them. Is there a solution to add some more time to it? There are some issues with only some days left. What happens with this issues? Gone forever? (edited)
priority
ux when an issue is kicked back to open not ready to be worked on from seiron on chat what about the issues where someone started working but they got reopened due to lack of progress they have usually an unrealistic rest period of time to finish them is there a solution to add some more time to it there are some issues with only some days left what happens with this issues gone forever edited
1
108,649
4,348,901,515
IssuesEvent
2016-07-30 06:49:04
k-bx/boilerpipe
https://api.github.com/repos/k-bx/boilerpipe
closed
Featurerequest: Run boilerpipe as a command line tool
auto-migrated Priority-Medium Type-Enhancement
``` Is it possible to use Boilerpipe as a CLI app together with other bash commands, e.g. extract the text of an entire website with a command like: wget -p http://mysite.com | boilerplate -options > file#.html ``` Original issue reported on code.google.com by `haraldgr...@gmail.com` on 22 Mar 2011 at 3:26
1.0
Featurerequest: Run boilerpipe as a command line tool - ``` Is it possible to use Boilerpipe as a CLI app together with other bash commands, e.g. extract the text of an entire website with a command like: wget -p http://mysite.com | boilerplate -options > file#.html ``` Original issue reported on code.google.com by `haraldgr...@gmail.com` on 22 Mar 2011 at 3:26
priority
featurerequest run boilerpipe as a command line tool is it possible to use boilerpipe as a cli app together with other bash commands e g extract the text of an entire website with a command like wget p  boilerplate options file html original issue reported on code google com by haraldgr gmail com on mar at
1
209,098
7,165,224,819
IssuesEvent
2018-01-29 13:51:18
dkpro/dkpro-tc
https://api.github.com/repos/dkpro/dkpro-tc
closed
Handling "empty" predictions in the evaluation module
Priority-Medium bug
Originally reported on Google Code with ID 231 ``` In several places, the evaluation module currently assumes that, for each instance, there is one or more labels (strings or integers) for both gold standard and prediction. Due to particularities in the machine learning frameworks (see Issue 228), this might not always be the case. One solution might be to check for empty predictions right when the evaluation file (id2outcome) is first read, and replace empty strings with a dedicated constant and integer (e.g. "-1"). ``` Reported by `daxenberger.j` on 2015-01-26 08:48:04
1.0
Handling "empty" predictions in the evaluation module - Originally reported on Google Code with ID 231 ``` In several places, the evaluation module currently assumes that, for each instance, there is one or more labels (strings or integers) for both gold standard and prediction. Due to particularities in the machine learning frameworks (see Issue 228), this might not always be the case. One solution might be to check for empty predictions right when the evaluation file (id2outcome) is first read, and replace empty strings with a dedicated constant and integer (e.g. "-1"). ``` Reported by `daxenberger.j` on 2015-01-26 08:48:04
priority
handling empty predictions in the evaluation module originally reported on google code with id in several places the evaluation module currently assumes that for each instance there is one or more labels strings or integers for both gold standard and prediction due to particularities in the machine learning frameworks see issue this might not always be the case one solution might be to check for empty predictions right when the evaluation file is first read and replace empty strings with a dedicated constant and integer e g reported by daxenberger j on
1
566,633
16,825,839,923
IssuesEvent
2021-06-17 18:26:45
GoogleCloudPlatform/golang-samples
https://api.github.com/repos/GoogleCloudPlatform/golang-samples
closed
asset/quickstart/export-assets-bigquery: TestMain failed
api: cloudasset flakybot: flaky flakybot: issue priority: p2 samples type: bug
This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/master/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: 8106ae9058e916342aa0a1e376a7729d429ec1b9 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/5d07e974-6f4e-46d7-8871-db32fe18673c), [Sponge](http://sponge2/5d07e974-6f4e-46d7-8871-db32fe18673c) status: failed
1.0
asset/quickstart/export-assets-bigquery: TestMain failed - This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/master/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: 8106ae9058e916342aa0a1e376a7729d429ec1b9 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/5d07e974-6f4e-46d7-8871-db32fe18673c), [Sponge](http://sponge2/5d07e974-6f4e-46d7-8871-db32fe18673c) status: failed
priority
asset quickstart export assets bigquery testmain failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed
1
114,421
4,630,881,727
IssuesEvent
2016-09-28 14:06:10
mantidproject/mantid
https://api.github.com/repos/mantidproject/mantid
closed
Fix ISIS Indirect Inelastic system tests for GSL2
Component: Fitting Component: Indirect Inelastic Priority: High
Tests failing with GSL2: http://builds.mantidproject.org/job/master_systemtests-ubuntu-16.04/21/testReport/ Fix the Indirect Inelastic related ones (or split into more issues/tickets): - SystemTests.ISISIndirectInelastic.IRISIqtAndIqtFit - SystemTests.ISISIndirectInelastic.OSIRISIqtAndIqtFit - SystemTests.ISISIndirectInelastic.IRISConvFit - SystemTests.ISISIndirectInelastic.IRISIqtAndIqtFitMulti - SystemTests.ISISIndirectInelastic.OSIRISConvFit - SystemTests.ISISIndirectInelastic.OSIRISIqtAndIqtFitMulti
1.0
Fix ISIS Indirect Inelastic system tests for GSL2 - Tests failing with GSL2: http://builds.mantidproject.org/job/master_systemtests-ubuntu-16.04/21/testReport/ Fix the Indirect Inelastic related ones (or split into more issues/tickets): - SystemTests.ISISIndirectInelastic.IRISIqtAndIqtFit - SystemTests.ISISIndirectInelastic.OSIRISIqtAndIqtFit - SystemTests.ISISIndirectInelastic.IRISConvFit - SystemTests.ISISIndirectInelastic.IRISIqtAndIqtFitMulti - SystemTests.ISISIndirectInelastic.OSIRISConvFit - SystemTests.ISISIndirectInelastic.OSIRISIqtAndIqtFitMulti
priority
fix isis indirect inelastic system tests for tests failing with fix the indirect inelastic related ones or split into more issues tickets systemtests isisindirectinelastic irisiqtandiqtfit systemtests isisindirectinelastic osirisiqtandiqtfit systemtests isisindirectinelastic irisconvfit systemtests isisindirectinelastic irisiqtandiqtfitmulti systemtests isisindirectinelastic osirisconvfit systemtests isisindirectinelastic osirisiqtandiqtfitmulti
1
206,216
16,022,104,330
IssuesEvent
2021-04-21 02:05:31
ChessAdventure/client
https://api.github.com/repos/ChessAdventure/client
closed
Back to dashboard button on game screen
documentation
**Description:** - Add a button that leaves the game and redirects to the dashboard - This will probably have to clear the extension (gameId) from state because the existence of that redirects to dashboard
1.0
Back to dashboard button on game screen - **Description:** - Add a button that leaves the game and redirects to the dashboard - This will probably have to clear the extension (gameId) from state because the existence of that redirects to dashboard
non_priority
back to dashboard button on game screen description add a button that leaves the game and redirects to the dashboard this will probably have to clear the extension gameid from state because the existence of that redirects to dashboard
0
217,802
16,889,449,403
IssuesEvent
2021-06-23 07:24:52
WoWManiaUK/Redemption
https://api.github.com/repos/WoWManiaUK/Redemption
closed
Unkillable High Priest Hawinni
Fixed on PTR - Ready to Test
**Links:** https://www.wow-mania.com/armory/?quest=12674 **What is Happening:** After being subjected to the [Quetz'lun's Hexxing Stick], and having the animation of "Exploding", he stays immortal and keeps attacking the player. After walking away from the mob, he instantly resets his position, and returns to before being affected by the quest item. **What Should happen:** The mob should be considered "Dead" and have it's corpose dissapear properly ![WoWScrnShot_061621_163443](https://user-images.githubusercontent.com/71805677/122290056-bf68d900-cec9-11eb-849d-0dc5892dc570.jpg) [Attachment 1. Showing hitting the mob after effect of the quest-item.] ![WoWScrnShot_061621_163448](https://user-images.githubusercontent.com/71805677/122289917-9d6f5680-cec9-11eb-8d2d-a3f4a2456ed6.jpg) [Attachment 2. Showing the mob hitting player, while staying alive.]
1.0
Unkillable High Priest Hawinni - **Links:** https://www.wow-mania.com/armory/?quest=12674 **What is Happening:** After being subjected to the [Quetz'lun's Hexxing Stick], and having the animation of "Exploding", he stays immortal and keeps attacking the player. After walking away from the mob, he instantly resets his position, and returns to before being affected by the quest item. **What Should happen:** The mob should be considered "Dead" and have it's corpose dissapear properly ![WoWScrnShot_061621_163443](https://user-images.githubusercontent.com/71805677/122290056-bf68d900-cec9-11eb-849d-0dc5892dc570.jpg) [Attachment 1. Showing hitting the mob after effect of the quest-item.] ![WoWScrnShot_061621_163448](https://user-images.githubusercontent.com/71805677/122289917-9d6f5680-cec9-11eb-8d2d-a3f4a2456ed6.jpg) [Attachment 2. Showing the mob hitting player, while staying alive.]
non_priority
unkillable high priest hawinni links what is happening after being subjected to the and having the animation of exploding he stays immortal and keeps attacking the player after walking away from the mob he instantly resets his position and returns to before being affected by the quest item what should happen the mob should be considered dead and have it s corpose dissapear properly
0
198,905
22,674,185,211
IssuesEvent
2022-07-04 01:25:30
Techini/WebGoat
https://api.github.com/repos/Techini/WebGoat
closed
CVE-2021-21343 (High) detected in xstream-1.4.5.jar - autoclosed
security vulnerability
## CVE-2021-21343 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.5.jar</b></p></summary> <p>XStream is a serialization library from Java objects to XML and back.</p> <p>Path to dependency file: /webgoat-lessons/vulnerable-components/pom.xml</p> <p>Path to vulnerable library: /m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Techini/WebGoat/commit/d33cc0e32a0d1b949ff1b85af16890cd452276f8">d33cc0e32a0d1b949ff1b85af16890cd452276f8</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21343>CVE-2021-21343</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf">https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-21343 (High) detected in xstream-1.4.5.jar - autoclosed - ## CVE-2021-21343 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.5.jar</b></p></summary> <p>XStream is a serialization library from Java objects to XML and back.</p> <p>Path to dependency file: /webgoat-lessons/vulnerable-components/pom.xml</p> <p>Path to vulnerable library: /m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Techini/WebGoat/commit/d33cc0e32a0d1b949ff1b85af16890cd452276f8">d33cc0e32a0d1b949ff1b85af16890cd452276f8</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21343>CVE-2021-21343</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf">https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in xstream jar autoclosed cve high severity vulnerability vulnerable library xstream jar xstream is a serialization library from java objects to xml and back path to dependency file webgoat lessons vulnerable components pom xml path to vulnerable library repository com thoughtworks xstream xstream xstream jar home wss scanner repository com thoughtworks xstream xstream xstream jar home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects xstream creates therefore new instances based on these type information an attacker can manipulate the processed input stream and replace or inject objects that result in the deletion of a file on the local host no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com thoughtworks xstream xstream step up your open source security game with whitesource
0
499,574
14,450,422,441
IssuesEvent
2020-12-08 09:34:01
myConsciousness/entity-validator
https://api.github.com/repos/myConsciousness/entity-validator
opened
コンテンツフレームワークを使用しない期待値の指定方式に関する仕様策定
Priority: high Type: new feature
# Add New Feature ## 1. Feature details コンテンツフレームワークを使用しないアノテーションへ期待値を指定する方式に関する仕様を策定する。 ## 2. Why it is necessary 機能拡張に伴う新規機能の実装。 ## 3. How to implement 期待値をアノテーションへ直接指定できる機能を実装する。 ## 4. References
1.0
コンテンツフレームワークを使用しない期待値の指定方式に関する仕様策定 - # Add New Feature ## 1. Feature details コンテンツフレームワークを使用しないアノテーションへ期待値を指定する方式に関する仕様を策定する。 ## 2. Why it is necessary 機能拡張に伴う新規機能の実装。 ## 3. How to implement 期待値をアノテーションへ直接指定できる機能を実装する。 ## 4. References
priority
コンテンツフレームワークを使用しない期待値の指定方式に関する仕様策定 add new feature feature details コンテンツフレームワークを使用しないアノテーションへ期待値を指定する方式に関する仕様を策定する。 why it is necessary 機能拡張に伴う新規機能の実装。 how to implement 期待値をアノテーションへ直接指定できる機能を実装する。 references
1
194,819
6,899,517,119
IssuesEvent
2017-11-24 14:08:07
highcharts/highcharts
https://api.github.com/repos/highcharts/highcharts
closed
One data label not showing.
Bug Priority:Low
When I create a stack bar chart, and choose the stacked bars to be horizontally, along with the labels showing on the stacked bars, one data label is not being displayed. As shown in the snapshot, ![highchartissue](https://f.cloud.github.com/assets/4491563/543472/f8b5f07e-c23b-11e2-806d-765fb3e76f6f.png) The data label(value) is not shown on stacked bar . If any other legend is hidden, then the data label on the stacked bar will be displayed correctly.The snapshot is given below. ![highchartissue2](https://f.cloud.github.com/assets/4491563/543488/5d12ca2e-c23c-11e2-8d9e-fefa8bda6d37.png) After again making all the legends enable, the data label will still be displayed.Please refer to the snapshot below. ![highchartissue3](https://f.cloud.github.com/assets/4491563/543503/a86294be-c23c-11e2-8641-e992be01713c.png) But after saving the chart, that particular data label is again not displayed on stacked bar If the legend values are also displayed along with the legends, then the datalabel is displayed.Please refer to the attachment below. ![highchartissue4](https://f.cloud.github.com/assets/4491563/543549/ac603a98-c23d-11e2-98b3-1e1f916ac6fe.png)
1.0
One data label not showing. - When I create a stack bar chart, and choose the stacked bars to be horizontally, along with the labels showing on the stacked bars, one data label is not being displayed. As shown in the snapshot, ![highchartissue](https://f.cloud.github.com/assets/4491563/543472/f8b5f07e-c23b-11e2-806d-765fb3e76f6f.png) The data label(value) is not shown on stacked bar . If any other legend is hidden, then the data label on the stacked bar will be displayed correctly.The snapshot is given below. ![highchartissue2](https://f.cloud.github.com/assets/4491563/543488/5d12ca2e-c23c-11e2-8d9e-fefa8bda6d37.png) After again making all the legends enable, the data label will still be displayed.Please refer to the snapshot below. ![highchartissue3](https://f.cloud.github.com/assets/4491563/543503/a86294be-c23c-11e2-8641-e992be01713c.png) But after saving the chart, that particular data label is again not displayed on stacked bar If the legend values are also displayed along with the legends, then the datalabel is displayed.Please refer to the attachment below. ![highchartissue4](https://f.cloud.github.com/assets/4491563/543549/ac603a98-c23d-11e2-98b3-1e1f916ac6fe.png)
priority
one data label not showing when i create a stack bar chart and choose the stacked bars to be horizontally along with the labels showing on the stacked bars one data label is not being displayed as shown in the snapshot the data label value is not shown on stacked bar if any other legend is hidden then the data label on the stacked bar will be displayed correctly the snapshot is given below after again making all the legends enable the data label will still be displayed please refer to the snapshot below but after saving the chart that particular data label is again not displayed on stacked bar if the legend values are also displayed along with the legends then the datalabel is displayed please refer to the attachment below
1
312,343
9,546,160,048
IssuesEvent
2019-05-01 19:06:49
poanetwork/nifty-wallet
https://api.github.com/repos/poanetwork/nifty-wallet
opened
Change POA Network -> POA Core
enhancement medium priority
POA Network is too generic, and it refers more to the project as whole. POA Core is more accurate description of the network
1.0
Change POA Network -> POA Core - POA Network is too generic, and it refers more to the project as whole. POA Core is more accurate description of the network
priority
change poa network poa core poa network is too generic and it refers more to the project as whole poa core is more accurate description of the network
1
452,583
13,056,095,143
IssuesEvent
2020-07-30 03:38:33
kubeflow/pipelines
https://api.github.com/repos/kubeflow/pipelines
closed
kfp.Client: Can't specify localhost host
area/sdk/client kind/bug priority/p2 status/triaged
### What steps did you take: ``` client = kfp.Client(host="http://localhost:8888") ... client.upload_pipeline(filename, name, description) ``` ### What happened: ``` Traceback (most recent call last): File "../kubeflow-apply/kubeflow-apply.py", line 73, in <module> args.func() File "../kubeflow-apply/kubeflow-apply.py", line 33, in pipelines self.client.upload_pipeline(filename, name, description) File "/usr/local/lib/python3.8/site-packages/kfp/_client.py", line 723, in upload_pipeline response = self._upload_api.upload_pipeline(pipeline_package_path, name=pipeline_name, description=description) File "/usr/local/lib/python3.8/site-packages/kfp_server_api/api/pipeline_upload_service_api.py", line 83, in upload_pipeline return self.upload_pipeline_with_http_info(uploadfile, **kwargs) # noqa: E501 File "/usr/local/lib/python3.8/site-packages/kfp_server_api/api/pipeline_upload_service_api.py", line 177, in upload_pipeline_with_http_info return self.api_client.call_api( File "/usr/local/lib/python3.8/site-packages/kfp_server_api/api_client.py", line 379, in call_api return self.__call_api(resource_path, method, File "/usr/local/lib/python3.8/site-packages/kfp_server_api/api_client.py", line 196, in __call_api response_data = self.request( File "/usr/local/lib/python3.8/site-packages/kfp_server_api/api_client.py", line 422, in request return self.rest_client.POST(url, File "/usr/local/lib/python3.8/site-packages/kfp_server_api/rest.py", line 279, in POST return self.request("POST", url, File "/usr/local/lib/python3.8/site-packages/kfp_server_api/rest.py", line 196, in request r = self.pool_manager.request( File "/usr/local/lib/python3.8/site-packages/urllib3/request.py", line 79, in request return self.request_encode_body( File "/usr/local/lib/python3.8/site-packages/urllib3/request.py", line 172, in request_encode_body return self.urlopen(method, url, **extra_kw) File "/usr/local/lib/python3.8/site-packages/urllib3/poolmanager.py", line 326, in urlopen conn = self.connection_from_host(u.host, port=u.port, scheme=u.scheme) File "/usr/local/lib/python3.8/site-packages/urllib3/poolmanager.py", line 231, in connection_from_host raise LocationValueError("No host specified.") urllib3.exceptions.LocationValueError: No host specified. ``` ### What did you expect to happen: Being able to specify the host ### Environment: KFP SDK version: 1.0.0 ### Anything else you would like to add: The problem is that for unclear reasons kfp strips the schema from the url, causing urllib3's parse_url to interpret the 'localhost' part as schema. This was working with kfp==0.1.31
1.0
kfp.Client: Can't specify localhost host - ### What steps did you take: ``` client = kfp.Client(host="http://localhost:8888") ... client.upload_pipeline(filename, name, description) ``` ### What happened: ``` Traceback (most recent call last): File "../kubeflow-apply/kubeflow-apply.py", line 73, in <module> args.func() File "../kubeflow-apply/kubeflow-apply.py", line 33, in pipelines self.client.upload_pipeline(filename, name, description) File "/usr/local/lib/python3.8/site-packages/kfp/_client.py", line 723, in upload_pipeline response = self._upload_api.upload_pipeline(pipeline_package_path, name=pipeline_name, description=description) File "/usr/local/lib/python3.8/site-packages/kfp_server_api/api/pipeline_upload_service_api.py", line 83, in upload_pipeline return self.upload_pipeline_with_http_info(uploadfile, **kwargs) # noqa: E501 File "/usr/local/lib/python3.8/site-packages/kfp_server_api/api/pipeline_upload_service_api.py", line 177, in upload_pipeline_with_http_info return self.api_client.call_api( File "/usr/local/lib/python3.8/site-packages/kfp_server_api/api_client.py", line 379, in call_api return self.__call_api(resource_path, method, File "/usr/local/lib/python3.8/site-packages/kfp_server_api/api_client.py", line 196, in __call_api response_data = self.request( File "/usr/local/lib/python3.8/site-packages/kfp_server_api/api_client.py", line 422, in request return self.rest_client.POST(url, File "/usr/local/lib/python3.8/site-packages/kfp_server_api/rest.py", line 279, in POST return self.request("POST", url, File "/usr/local/lib/python3.8/site-packages/kfp_server_api/rest.py", line 196, in request r = self.pool_manager.request( File "/usr/local/lib/python3.8/site-packages/urllib3/request.py", line 79, in request return self.request_encode_body( File "/usr/local/lib/python3.8/site-packages/urllib3/request.py", line 172, in request_encode_body return self.urlopen(method, url, **extra_kw) File "/usr/local/lib/python3.8/site-packages/urllib3/poolmanager.py", line 326, in urlopen conn = self.connection_from_host(u.host, port=u.port, scheme=u.scheme) File "/usr/local/lib/python3.8/site-packages/urllib3/poolmanager.py", line 231, in connection_from_host raise LocationValueError("No host specified.") urllib3.exceptions.LocationValueError: No host specified. ``` ### What did you expect to happen: Being able to specify the host ### Environment: KFP SDK version: 1.0.0 ### Anything else you would like to add: The problem is that for unclear reasons kfp strips the schema from the url, causing urllib3's parse_url to interpret the 'localhost' part as schema. This was working with kfp==0.1.31
priority
kfp client can t specify localhost host what steps did you take client kfp client host client upload pipeline filename name description what happened traceback most recent call last file kubeflow apply kubeflow apply py line in args func file kubeflow apply kubeflow apply py line in pipelines self client upload pipeline filename name description file usr local lib site packages kfp client py line in upload pipeline response self upload api upload pipeline pipeline package path name pipeline name description description file usr local lib site packages kfp server api api pipeline upload service api py line in upload pipeline return self upload pipeline with http info uploadfile kwargs noqa file usr local lib site packages kfp server api api pipeline upload service api py line in upload pipeline with http info return self api client call api file usr local lib site packages kfp server api api client py line in call api return self call api resource path method file usr local lib site packages kfp server api api client py line in call api response data self request file usr local lib site packages kfp server api api client py line in request return self rest client post url file usr local lib site packages kfp server api rest py line in post return self request post url file usr local lib site packages kfp server api rest py line in request r self pool manager request file usr local lib site packages request py line in request return self request encode body file usr local lib site packages request py line in request encode body return self urlopen method url extra kw file usr local lib site packages poolmanager py line in urlopen conn self connection from host u host port u port scheme u scheme file usr local lib site packages poolmanager py line in connection from host raise locationvalueerror no host specified exceptions locationvalueerror no host specified what did you expect to happen being able to specify the host environment kfp sdk version anything else you would like to add the problem is that for unclear reasons kfp strips the schema from the url causing s parse url to interpret the localhost part as schema this was working with kfp
1
29,138
8,299,839,399
IssuesEvent
2018-09-21 05:31:51
envoyproxy/envoy
https://api.github.com/repos/envoyproxy/envoy
reopened
Use lld as linker
build help wanted
As a part of tool chain revisit (#4159, #4158) and also as a part of (#3741). We should consider use [LLD](https://lld.llvm.org/) as default linker. LLD is at least twice faster than gold linker, we have more than 300 test target to link so this will improve CI performance. Options: 1. Use lld everywhere (it works with gcc) 2. Use lld where clang is used (sanitizers) A sample benchmark of linking `envoy-static` is here: gold w/o threads (current): `12.01s user 1.32s system 99% cpu 13.358 total` gold w/ threads: `14.24s user 6.97s system 180% cpu 11.762 total` lld w/o threads: `3.63s user 1.15s system 99% cpu 4.805 total` lld w/ threads: `8.64s user 11.24s system 709% cpu 2.802 total`
1.0
Use lld as linker - As a part of tool chain revisit (#4159, #4158) and also as a part of (#3741). We should consider use [LLD](https://lld.llvm.org/) as default linker. LLD is at least twice faster than gold linker, we have more than 300 test target to link so this will improve CI performance. Options: 1. Use lld everywhere (it works with gcc) 2. Use lld where clang is used (sanitizers) A sample benchmark of linking `envoy-static` is here: gold w/o threads (current): `12.01s user 1.32s system 99% cpu 13.358 total` gold w/ threads: `14.24s user 6.97s system 180% cpu 11.762 total` lld w/o threads: `3.63s user 1.15s system 99% cpu 4.805 total` lld w/ threads: `8.64s user 11.24s system 709% cpu 2.802 total`
non_priority
use lld as linker as a part of tool chain revisit and also as a part of we should consider use as default linker lld is at least twice faster than gold linker we have more than test target to link so this will improve ci performance options use lld everywhere it works with gcc use lld where clang is used sanitizers a sample benchmark of linking envoy static is here gold w o threads current user system cpu total gold w threads user system cpu total lld w o threads user system cpu total lld w threads user system cpu total
0
342,117
10,312,205,361
IssuesEvent
2019-08-29 19:16:15
CCAFS/MARLO
https://api.github.com/repos/CCAFS/MARLO
closed
Adjust Innovations section in the CGIAR Results Dashboard
Priority - High Type -Task
Adjust Innovations interface and graph filters to include 2018 data. Tasks: - [x] Interface. - [x] Add new graphs. - [x] Modify and add new chart filters. **Deliverable:** Section in testing environment. **Move to Review when:** Not applicable. **Move to Closed when:** Section is released in testing environment.
1.0
Adjust Innovations section in the CGIAR Results Dashboard - Adjust Innovations interface and graph filters to include 2018 data. Tasks: - [x] Interface. - [x] Add new graphs. - [x] Modify and add new chart filters. **Deliverable:** Section in testing environment. **Move to Review when:** Not applicable. **Move to Closed when:** Section is released in testing environment.
priority
adjust innovations section in the cgiar results dashboard adjust innovations interface and graph filters to include data tasks interface add new graphs modify and add new chart filters deliverable section in testing environment move to review when not applicable move to closed when section is released in testing environment
1
102,195
16,548,284,910
IssuesEvent
2021-05-28 04:36:00
samq-ghdemo/Java-Demo
https://api.github.com/repos/samq-ghdemo/Java-Demo
opened
CVE-2016-2510 (High) detected in bsh-core-2.0b4.jar
security vulnerability
## CVE-2016-2510 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bsh-core-2.0b4.jar</b></p></summary> <p>BeanShell core</p> <p>Path to dependency file: Java-Demo/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/beanshell/bsh-core/2.0b4/bsh-core-2.0b4.jar,Java-Demo/target/easybuggy-1-SNAPSHOT/WEB-INF/lib/bsh-core-2.0b4.jar,Java-Demo/.extract/webapps/ROOT/WEB-INF/lib/bsh-core-2.0b4.jar</p> <p> Dependency Hierarchy: - :x: **bsh-core-2.0b4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/Java-Demo/commit/ebe5ad9510b919e1dd226c70afc5e1115136f8cf">ebe5ad9510b919e1dd226c70afc5e1115136f8cf</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler. <p>Publish Date: 2016-04-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510>CVE-2016-2510</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2510">https://nvd.nist.gov/vuln/detail/CVE-2016-2510</a></p> <p>Release Date: 2016-04-07</p> <p>Fix Resolution: 2.0b6</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.beanshell","packageName":"bsh-core","packageVersion":"2.0b4","packageFilePaths":["/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"org.beanshell:bsh-core:2.0b4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.0b6"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2016-2510","vulnerabilityDetails":"BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2016-2510 (High) detected in bsh-core-2.0b4.jar - ## CVE-2016-2510 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bsh-core-2.0b4.jar</b></p></summary> <p>BeanShell core</p> <p>Path to dependency file: Java-Demo/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/beanshell/bsh-core/2.0b4/bsh-core-2.0b4.jar,Java-Demo/target/easybuggy-1-SNAPSHOT/WEB-INF/lib/bsh-core-2.0b4.jar,Java-Demo/.extract/webapps/ROOT/WEB-INF/lib/bsh-core-2.0b4.jar</p> <p> Dependency Hierarchy: - :x: **bsh-core-2.0b4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/Java-Demo/commit/ebe5ad9510b919e1dd226c70afc5e1115136f8cf">ebe5ad9510b919e1dd226c70afc5e1115136f8cf</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler. <p>Publish Date: 2016-04-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510>CVE-2016-2510</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2510">https://nvd.nist.gov/vuln/detail/CVE-2016-2510</a></p> <p>Release Date: 2016-04-07</p> <p>Fix Resolution: 2.0b6</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.beanshell","packageName":"bsh-core","packageVersion":"2.0b4","packageFilePaths":["/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"org.beanshell:bsh-core:2.0b4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.0b6"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2016-2510","vulnerabilityDetails":"BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in bsh core jar cve high severity vulnerability vulnerable library bsh core jar beanshell core path to dependency file java demo pom xml path to vulnerable library home wss scanner repository org beanshell bsh core bsh core jar java demo target easybuggy snapshot web inf lib bsh core jar java demo extract webapps root web inf lib bsh core jar dependency hierarchy x bsh core jar vulnerable library found in head commit a href found in base branch main vulnerability details beanshell bsh before when included on the classpath by an application that uses java serialization or xstream allows remote attackers to execute arbitrary code via crafted serialized data related to xthis handler publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree org beanshell bsh core isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails beanshell bsh before when included on the classpath by an application that uses java serialization or xstream allows remote attackers to execute arbitrary code via crafted serialized data related to xthis handler vulnerabilityurl
0
789,482
27,791,678,161
IssuesEvent
2023-03-17 09:24:13
VeriFIT/mata
https://api.github.com/repos/VeriFIT/mata
opened
Complementation over non-existent states
For:library Module:nfa Type:discussion Priority:low
In classical complement algorithm implemented in `Mata::Nfa::complement_classical`, we call `Mata::Nfa::Nfa::size()` which returns domain size of initial/final state sets. Those might contain “deleted” states (final/initial at some point but not now, yet still allocated with `false` value in `NumberPredicate`), so when we complement such automaton, non-existent states become final. As of now, we agreed on leaving it up to the user to call `Mata::Nfa::Nfa::trim` before complementing. We might want to reconsider this decision in the future.
1.0
Complementation over non-existent states - In classical complement algorithm implemented in `Mata::Nfa::complement_classical`, we call `Mata::Nfa::Nfa::size()` which returns domain size of initial/final state sets. Those might contain “deleted” states (final/initial at some point but not now, yet still allocated with `false` value in `NumberPredicate`), so when we complement such automaton, non-existent states become final. As of now, we agreed on leaving it up to the user to call `Mata::Nfa::Nfa::trim` before complementing. We might want to reconsider this decision in the future.
priority
complementation over non existent states in classical complement algorithm implemented in mata nfa complement classical we call mata nfa nfa size which returns domain size of initial final state sets those might contain “deleted” states final initial at some point but not now yet still allocated with false value in numberpredicate so when we complement such automaton non existent states become final as of now we agreed on leaving it up to the user to call mata nfa nfa trim before complementing we might want to reconsider this decision in the future
1
585,245
17,483,511,838
IssuesEvent
2021-08-09 07:53:18
chaosblade-io/chaosblade
https://api.github.com/repos/chaosblade-io/chaosblade
closed
Does the dd command in the mac system not support the inflag attribute? There will be problems when simulating the disk fill scene
priority/low type/feature chaosblade-exec-os
我在mac上执行下面命令会报错: blade create disk fill -d --mount-point /home --size 1024 错误为: {"code":604,"success":false,"error":"dd: unknown operand iflag\n exit status 1 exit status 1"} 看了一下上面的讨论,我直接执行下面的命令也会报错 命令为: dd if=/dev/zero of=/home/chaos_filldisk.log.dat bs=1b count=1 iflag=fullblock 错误为: dd: unknown operand iflag
1.0
Does the dd command in the mac system not support the inflag attribute? There will be problems when simulating the disk fill scene - 我在mac上执行下面命令会报错: blade create disk fill -d --mount-point /home --size 1024 错误为: {"code":604,"success":false,"error":"dd: unknown operand iflag\n exit status 1 exit status 1"} 看了一下上面的讨论,我直接执行下面的命令也会报错 命令为: dd if=/dev/zero of=/home/chaos_filldisk.log.dat bs=1b count=1 iflag=fullblock 错误为: dd: unknown operand iflag
priority
does the dd command in the mac system not support the inflag attribute there will be problems when simulating the disk fill scene 我在mac上执行下面命令会报错: blade create disk fill d mount point home size 错误为: code success false error dd unknown operand iflag n exit status exit status 看了一下上面的讨论,我直接执行下面的命令也会报错 命令为: dd if dev zero of home chaos filldisk log dat bs count iflag fullblock 错误为: dd unknown operand iflag
1
766,672
26,893,787,823
IssuesEvent
2023-02-06 10:51:23
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
yle.fi - site is not usable
priority-normal browser-fenix engine-gecko
<!-- @browser: Firefox Mobile 110.0 --> <!-- @ua_header: Mozilla/5.0 (Android 12; Mobile; rv:109.0) Gecko/110.0 Firefox/110.0 --> <!-- @reported_with: android-components-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/117848 --> <!-- @extra_labels: browser-fenix --> **URL**: https://yle.fi/a/3-12686102 **Browser / Version**: Firefox Mobile 110.0 **Operating System**: Android 12 **Tested Another Browser**: No **Problem type**: Site is not usable **Description**: Page not loading correctly **Steps to Reproduce**: Firefox crash when scrolling down <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2023/2/fbedd9dc-247a-4857-9592-00e87e78d619.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20230202190127</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2023/2/b22f578a-bed2-4df4-84cc-cdf435de8169) _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
yle.fi - site is not usable - <!-- @browser: Firefox Mobile 110.0 --> <!-- @ua_header: Mozilla/5.0 (Android 12; Mobile; rv:109.0) Gecko/110.0 Firefox/110.0 --> <!-- @reported_with: android-components-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/117848 --> <!-- @extra_labels: browser-fenix --> **URL**: https://yle.fi/a/3-12686102 **Browser / Version**: Firefox Mobile 110.0 **Operating System**: Android 12 **Tested Another Browser**: No **Problem type**: Site is not usable **Description**: Page not loading correctly **Steps to Reproduce**: Firefox crash when scrolling down <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2023/2/fbedd9dc-247a-4857-9592-00e87e78d619.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20230202190127</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2023/2/b22f578a-bed2-4df4-84cc-cdf435de8169) _From [webcompat.com](https://webcompat.com/) with ❤️_
priority
yle fi site is not usable url browser version firefox mobile operating system android tested another browser no problem type site is not usable description page not loading correctly steps to reproduce firefox crash when scrolling down view the screenshot img alt screenshot src browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel beta hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false from with ❤️
1
244,315
26,375,102,597
IssuesEvent
2023-01-12 01:18:34
VivekBuzruk/UI
https://api.github.com/repos/VivekBuzruk/UI
opened
CVE-2021-23413 (Medium) detected in jszip-3.5.0.tgz
security vulnerability
## CVE-2021-23413 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jszip-3.5.0.tgz</b></p></summary> <p>Create, read and edit .zip files with JavaScript http://stuartk.com/jszip</p> <p>Library home page: <a href="https://registry.npmjs.org/jszip/-/jszip-3.5.0.tgz">https://registry.npmjs.org/jszip/-/jszip-3.5.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/jszip/package.json</p> <p> Dependency Hierarchy: - protractor-5.4.4.tgz (Root Library) - selenium-webdriver-3.6.0.tgz - :x: **jszip-3.5.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/VivekBuzruk/UI/commits/edeb2a2fd15349abe4886893f9325323672726f3">edeb2a2fd15349abe4886893f9325323672726f3</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g __proto__, toString, etc) results in a returned object with a modified prototype instance. <p>Publish Date: 2021-07-25 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23413>CVE-2021-23413</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23413</a></p> <p>Release Date: 2021-07-25</p> <p>Fix Resolution (jszip): 3.7.0</p> <p>Direct dependency fix Resolution (protractor): 6.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23413 (Medium) detected in jszip-3.5.0.tgz - ## CVE-2021-23413 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jszip-3.5.0.tgz</b></p></summary> <p>Create, read and edit .zip files with JavaScript http://stuartk.com/jszip</p> <p>Library home page: <a href="https://registry.npmjs.org/jszip/-/jszip-3.5.0.tgz">https://registry.npmjs.org/jszip/-/jszip-3.5.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/jszip/package.json</p> <p> Dependency Hierarchy: - protractor-5.4.4.tgz (Root Library) - selenium-webdriver-3.6.0.tgz - :x: **jszip-3.5.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/VivekBuzruk/UI/commits/edeb2a2fd15349abe4886893f9325323672726f3">edeb2a2fd15349abe4886893f9325323672726f3</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g __proto__, toString, etc) results in a returned object with a modified prototype instance. <p>Publish Date: 2021-07-25 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23413>CVE-2021-23413</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23413</a></p> <p>Release Date: 2021-07-25</p> <p>Fix Resolution (jszip): 3.7.0</p> <p>Direct dependency fix Resolution (protractor): 6.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jszip tgz cve medium severity vulnerability vulnerable library jszip tgz create read and edit zip files with javascript library home page a href path to dependency file package json path to vulnerable library node modules jszip package json dependency hierarchy protractor tgz root library selenium webdriver tgz x jszip tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package jszip before crafting a new zip file with filenames set to object prototype values e g proto tostring etc results in a returned object with a modified prototype instance publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jszip direct dependency fix resolution protractor step up your open source security game with mend
0