Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
7
112
repo_url
stringlengths
36
141
action
stringclasses
3 values
title
stringlengths
1
744
labels
stringlengths
4
574
body
stringlengths
9
211k
index
stringclasses
10 values
text_combine
stringlengths
96
211k
label
stringclasses
2 values
text
stringlengths
96
188k
binary_label
int64
0
1
101,842
11,260,268,610
IssuesEvent
2020-01-13 10:11:39
auxmoney/OpentracingBundle-core
https://api.github.com/repos/auxmoney/OpentracingBundle-core
opened
create complete tutorial
documentation
In order to show the complete functionality, we should create a tutorial (as wiki page?) on how to set up an example application. We should include setting up a tracer instance, symfony application and instrumentation. It should also include some fancy screenshots.
1.0
create complete tutorial - In order to show the complete functionality, we should create a tutorial (as wiki page?) on how to set up an example application. We should include setting up a tracer instance, symfony application and instrumentation. It should also include some fancy screenshots.
non_process
create complete tutorial in order to show the complete functionality we should create a tutorial as wiki page on how to set up an example application we should include setting up a tracer instance symfony application and instrumentation it should also include some fancy screenshots
0
15,224
19,091,542,670
IssuesEvent
2021-11-29 12:40:13
Jeffail/benthos
https://api.github.com/repos/Jeffail/benthos
opened
Investigate elastic/opensearch forks
enhancement processors outputs
The dust is starting to settle now since the opensearch fork so it's probably worth spending some time understanding what's needed in order to continue to support both offerings. We're currently using https://github.com/olivere/elastic which has been fantastic (more info about future direction here: https://github.com/olivere/elastic/issues/1533) but we could also consider moving to the official client libraries as we only use a small fraction of ES endpoints. Official libraries: - https://github.com/elastic/go-elasticsearch - https://github.com/opensearch-project/opensearch-go Questions: - Do we need a forked `opensearch` component?
1.0
Investigate elastic/opensearch forks - The dust is starting to settle now since the opensearch fork so it's probably worth spending some time understanding what's needed in order to continue to support both offerings. We're currently using https://github.com/olivere/elastic which has been fantastic (more info about future direction here: https://github.com/olivere/elastic/issues/1533) but we could also consider moving to the official client libraries as we only use a small fraction of ES endpoints. Official libraries: - https://github.com/elastic/go-elasticsearch - https://github.com/opensearch-project/opensearch-go Questions: - Do we need a forked `opensearch` component?
process
investigate elastic opensearch forks the dust is starting to settle now since the opensearch fork so it s probably worth spending some time understanding what s needed in order to continue to support both offerings we re currently using which has been fantastic more info about future direction here but we could also consider moving to the official client libraries as we only use a small fraction of es endpoints official libraries questions do we need a forked opensearch component
1
16,175
20,622,317,312
IssuesEvent
2022-03-07 18:39:38
dtcenter/MET
https://api.github.com/repos/dtcenter/MET
reopened
Enhance PB2NC to derive Mixed-Layer CAPE (MLCAPE).
type: enhancement requestor: NOAA/EMC priority: blocker reporting: DTC NOAA R2O requestor: METplus Team MET: PreProcessing Tools (Point)
## Describe the Enhancement ## On 6/8/21, NOAA/EMC requested that the PB2NC tool be enhanced to derive additional variations of CAPE. They are most interested in mixed-layer CAPE (representing the average characteristics of the boundary layer). Mixed-layer is the "flavor" of CAPE that was recommended to be verified in our models, via the metrics workshop. While PB2NC does currently derive CAPE, it is surface-based CAPE and its done by calling this Fortran sub-routine: https://github.com/dtcenter/MET/blob/main_v10.0/met/src/tools/other/pb2nc/calcape.f That routine was taken from the NOAA/EMC VSDB verification code, but no such code exists for mixed-layer CAPE. However, it is defined in UPP. This task is to enhance PB2NC to derive the mixed-layer variation of CAPE. Consider some of the implementation options: - We could keep the scope limited and lift/adapt the code for deriving MLCAPE from the UPP source code. Should we keep that code in Fortran or re-write in C++? - We could expand the scope considerably and investigate a more direct interface to the UPP derivation routines. But this would add a new dependency on UPP. An example of a UPP module to compute CAPE can be found at: []( https://github.com/NOAA-EMC/EMC_post_refactor/blob/jesse/sorc/ncep_post.fd/UPP_PHYSICS.f) ### Time Estimate ### *Estimate the amount of work required here.* *Issues should represent approximately 1 to 3 days of work.* ### Sub-Issues ### Consider breaking the enhancement down into sub-issues. - [ ] *Add a checkbox for each sub-issue here.* ### Relevant Deadlines ### needs to be done by 7/31/21 if possible ### Funding Source ### 2792541 ## Define the Metadata ## ### Assignee ### - [x] Select **engineer(s)** or **no engineer** required: not sure yet - [x] Select **scientist(s)** or **no scientist** required: Perry S ### Labels ### - [x] Select **component(s)** - [x] Select **priority** - [x] Select **requestor(s)** ### Projects and Milestone ### - [x] Select **Repository** and/or **Organization** level **Project(s)** or add **alert: NEED PROJECT ASSIGNMENT** label - [x] Select **Milestone** as the next official version or **Future Versions** ## Define Related Issue(s) ## Consider the impact to the other METplus components. - [x] [METplus](https://github.com/dtcenter/METplus/issues/new/choose), [MET](https://github.com/dtcenter/MET/issues/new/choose), [METdatadb](https://github.com/dtcenter/METdatadb/issues/new/choose), [METviewer](https://github.com/dtcenter/METviewer/issues/new/choose), [METexpress](https://github.com/dtcenter/METexpress/issues/new/choose), [METcalcpy](https://github.com/dtcenter/METcalcpy/issues/new/choose), [METplotpy](https://github.com/dtcenter/METplotpy/issues/new/choose) There should be no impacts to other METplus repositories. ## Enhancement Checklist ## See the [METplus Workflow](https://dtcenter.github.io/METplus/Contributors_Guide/github_workflow.html) for details. - [ ] Complete the issue definition above, including the **Time Estimate** and **Funding Source**. - [ ] Fork this repository or create a branch of **develop**. Branch name: `feature_<Issue Number>_<Description>` - [ ] Complete the development and test your changes. - [ ] Add/update log messages for easier debugging. - [ ] Add/update unit tests. - [ ] Add/update documentation. - [ ] Push local changes to GitHub. - [ ] Submit a pull request to merge into **develop**. Pull request: `feature <Issue Number> <Description>` - [ ] Define the pull request metadata, as permissions allow. Select: **Reviewer(s)** and **Linked issues** Select: **Repository** level development cycle **Project** for the next official release Select: **Milestone** as the next official version - [ ] Iterate until the reviewer(s) accept and merge your changes. - [ ] Delete your fork or branch. - [ ] Close this issue.
1.0
Enhance PB2NC to derive Mixed-Layer CAPE (MLCAPE). - ## Describe the Enhancement ## On 6/8/21, NOAA/EMC requested that the PB2NC tool be enhanced to derive additional variations of CAPE. They are most interested in mixed-layer CAPE (representing the average characteristics of the boundary layer). Mixed-layer is the "flavor" of CAPE that was recommended to be verified in our models, via the metrics workshop. While PB2NC does currently derive CAPE, it is surface-based CAPE and its done by calling this Fortran sub-routine: https://github.com/dtcenter/MET/blob/main_v10.0/met/src/tools/other/pb2nc/calcape.f That routine was taken from the NOAA/EMC VSDB verification code, but no such code exists for mixed-layer CAPE. However, it is defined in UPP. This task is to enhance PB2NC to derive the mixed-layer variation of CAPE. Consider some of the implementation options: - We could keep the scope limited and lift/adapt the code for deriving MLCAPE from the UPP source code. Should we keep that code in Fortran or re-write in C++? - We could expand the scope considerably and investigate a more direct interface to the UPP derivation routines. But this would add a new dependency on UPP. An example of a UPP module to compute CAPE can be found at: []( https://github.com/NOAA-EMC/EMC_post_refactor/blob/jesse/sorc/ncep_post.fd/UPP_PHYSICS.f) ### Time Estimate ### *Estimate the amount of work required here.* *Issues should represent approximately 1 to 3 days of work.* ### Sub-Issues ### Consider breaking the enhancement down into sub-issues. - [ ] *Add a checkbox for each sub-issue here.* ### Relevant Deadlines ### needs to be done by 7/31/21 if possible ### Funding Source ### 2792541 ## Define the Metadata ## ### Assignee ### - [x] Select **engineer(s)** or **no engineer** required: not sure yet - [x] Select **scientist(s)** or **no scientist** required: Perry S ### Labels ### - [x] Select **component(s)** - [x] Select **priority** - [x] Select **requestor(s)** ### Projects and Milestone ### - [x] Select **Repository** and/or **Organization** level **Project(s)** or add **alert: NEED PROJECT ASSIGNMENT** label - [x] Select **Milestone** as the next official version or **Future Versions** ## Define Related Issue(s) ## Consider the impact to the other METplus components. - [x] [METplus](https://github.com/dtcenter/METplus/issues/new/choose), [MET](https://github.com/dtcenter/MET/issues/new/choose), [METdatadb](https://github.com/dtcenter/METdatadb/issues/new/choose), [METviewer](https://github.com/dtcenter/METviewer/issues/new/choose), [METexpress](https://github.com/dtcenter/METexpress/issues/new/choose), [METcalcpy](https://github.com/dtcenter/METcalcpy/issues/new/choose), [METplotpy](https://github.com/dtcenter/METplotpy/issues/new/choose) There should be no impacts to other METplus repositories. ## Enhancement Checklist ## See the [METplus Workflow](https://dtcenter.github.io/METplus/Contributors_Guide/github_workflow.html) for details. - [ ] Complete the issue definition above, including the **Time Estimate** and **Funding Source**. - [ ] Fork this repository or create a branch of **develop**. Branch name: `feature_<Issue Number>_<Description>` - [ ] Complete the development and test your changes. - [ ] Add/update log messages for easier debugging. - [ ] Add/update unit tests. - [ ] Add/update documentation. - [ ] Push local changes to GitHub. - [ ] Submit a pull request to merge into **develop**. Pull request: `feature <Issue Number> <Description>` - [ ] Define the pull request metadata, as permissions allow. Select: **Reviewer(s)** and **Linked issues** Select: **Repository** level development cycle **Project** for the next official release Select: **Milestone** as the next official version - [ ] Iterate until the reviewer(s) accept and merge your changes. - [ ] Delete your fork or branch. - [ ] Close this issue.
process
enhance to derive mixed layer cape mlcape describe the enhancement on noaa emc requested that the tool be enhanced to derive additional variations of cape they are most interested in mixed layer cape representing the average characteristics of the boundary layer mixed layer is the flavor of cape that was recommended to be verified in our models via the metrics workshop while does currently derive cape it is surface based cape and its done by calling this fortran sub routine that routine was taken from the noaa emc vsdb verification code but no such code exists for mixed layer cape however it is defined in upp this task is to enhance to derive the mixed layer variation of cape consider some of the implementation options we could keep the scope limited and lift adapt the code for deriving mlcape from the upp source code should we keep that code in fortran or re write in c we could expand the scope considerably and investigate a more direct interface to the upp derivation routines but this would add a new dependency on upp an example of a upp module to compute cape can be found at time estimate estimate the amount of work required here issues should represent approximately to days of work sub issues consider breaking the enhancement down into sub issues add a checkbox for each sub issue here relevant deadlines needs to be done by if possible funding source define the metadata assignee select engineer s or no engineer required not sure yet select scientist s or no scientist required perry s labels select component s select priority select requestor s projects and milestone select repository and or organization level project s or add alert need project assignment label select milestone as the next official version or future versions define related issue s consider the impact to the other metplus components there should be no impacts to other metplus repositories enhancement checklist see the for details complete the issue definition above including the time estimate and funding source fork this repository or create a branch of develop branch name feature complete the development and test your changes add update log messages for easier debugging add update unit tests add update documentation push local changes to github submit a pull request to merge into develop pull request feature define the pull request metadata as permissions allow select reviewer s and linked issues select repository level development cycle project for the next official release select milestone as the next official version iterate until the reviewer s accept and merge your changes delete your fork or branch close this issue
1
22,090
30,612,770,845
IssuesEvent
2023-07-23 20:25:33
rust-lang/rust
https://api.github.com/repos/rust-lang/rust
closed
process_unix::do_exec should reset the signal mask to its value on startup, not clear it
T-libs-api C-bug A-process
The Unix implementation of `process::spawn` (specifically, `do_exec` in `sys/unix/process/process_unix.rs`) contains logic to restore the signal mask to the default in child processes... ```rust // Reset signal handling so the child process starts in a // standardized state. libstd ignores SIGPIPE, and signal-handling // libraries often set a mask. Child processes inherit ignored // signals and the signal mask from their parent, but most // UNIX programs do not reset these things on their own, so we // need to clean things up now to avoid confusing the program // we're about to run. let mut set: libc::sigset_t = mem::uninitialized(); t!(cvt(libc::sigemptyset(&mut set))); t!(cvt(libc::pthread_sigmask(libc::SIG_SETMASK, &set, ptr::null_mut()))); let ret = sys::signal(libc::SIGPIPE, libc::SIG_DFL); if ret == libc::SIG_ERR { return io::Error::last_os_error() } ``` Completely clearing the signal mask here is subtly wrong. It should instead be restored to _whatever it was when the parent process started up_. Certain standard shell utilities — the best-known is `nohup` — deliberately start a process with some signals already masked, and expect that those settings will be inherited by any further subprocesses. For the same reason, the handler for `SIGPIPE` should be reset not to `SIG_DFL`, but to whichever of `SIG_DFL` or `SIG_IGN` it was before libstd ignored it. (In order to make it possible to _implement_ such utilities in Rust, the ideal resolution here would involve adding `mask_signals` and `ignore_signals` knobs to `unix::process::CommandExt`, and document that the _defaults_ for these are whatever was observed on process startup. But I don't see a clean way to do that without a lot more support for signals in general in libstd, maybe more than is properly in scope.)
1.0
process_unix::do_exec should reset the signal mask to its value on startup, not clear it - The Unix implementation of `process::spawn` (specifically, `do_exec` in `sys/unix/process/process_unix.rs`) contains logic to restore the signal mask to the default in child processes... ```rust // Reset signal handling so the child process starts in a // standardized state. libstd ignores SIGPIPE, and signal-handling // libraries often set a mask. Child processes inherit ignored // signals and the signal mask from their parent, but most // UNIX programs do not reset these things on their own, so we // need to clean things up now to avoid confusing the program // we're about to run. let mut set: libc::sigset_t = mem::uninitialized(); t!(cvt(libc::sigemptyset(&mut set))); t!(cvt(libc::pthread_sigmask(libc::SIG_SETMASK, &set, ptr::null_mut()))); let ret = sys::signal(libc::SIGPIPE, libc::SIG_DFL); if ret == libc::SIG_ERR { return io::Error::last_os_error() } ``` Completely clearing the signal mask here is subtly wrong. It should instead be restored to _whatever it was when the parent process started up_. Certain standard shell utilities — the best-known is `nohup` — deliberately start a process with some signals already masked, and expect that those settings will be inherited by any further subprocesses. For the same reason, the handler for `SIGPIPE` should be reset not to `SIG_DFL`, but to whichever of `SIG_DFL` or `SIG_IGN` it was before libstd ignored it. (In order to make it possible to _implement_ such utilities in Rust, the ideal resolution here would involve adding `mask_signals` and `ignore_signals` knobs to `unix::process::CommandExt`, and document that the _defaults_ for these are whatever was observed on process startup. But I don't see a clean way to do that without a lot more support for signals in general in libstd, maybe more than is properly in scope.)
process
process unix do exec should reset the signal mask to its value on startup not clear it the unix implementation of process spawn specifically do exec in sys unix process process unix rs contains logic to restore the signal mask to the default in child processes rust reset signal handling so the child process starts in a standardized state libstd ignores sigpipe and signal handling libraries often set a mask child processes inherit ignored signals and the signal mask from their parent but most unix programs do not reset these things on their own so we need to clean things up now to avoid confusing the program we re about to run let mut set libc sigset t mem uninitialized t cvt libc sigemptyset mut set t cvt libc pthread sigmask libc sig setmask set ptr null mut let ret sys signal libc sigpipe libc sig dfl if ret libc sig err return io error last os error completely clearing the signal mask here is subtly wrong it should instead be restored to whatever it was when the parent process started up certain standard shell utilities — the best known is nohup — deliberately start a process with some signals already masked and expect that those settings will be inherited by any further subprocesses for the same reason the handler for sigpipe should be reset not to sig dfl but to whichever of sig dfl or sig ign it was before libstd ignored it in order to make it possible to implement such utilities in rust the ideal resolution here would involve adding mask signals and ignore signals knobs to unix process commandext and document that the defaults for these are whatever was observed on process startup but i don t see a clean way to do that without a lot more support for signals in general in libstd maybe more than is properly in scope
1
17,357
23,184,081,054
IssuesEvent
2022-08-01 06:43:00
acumenlabs/status-page
https://api.github.com/repos/acumenlabs/status-page
closed
🛑 Processors is down
status processors
In [`2baed85`](https://github.com/acumenlabs/status-page/commit/2baed8586c88318e23ef8186c1ab123c6c92a4a9 ), Processors ($STATUS_URL) was **down**: - HTTP code: 401 - Response time: 34 ms
1.0
🛑 Processors is down - In [`2baed85`](https://github.com/acumenlabs/status-page/commit/2baed8586c88318e23ef8186c1ab123c6c92a4a9 ), Processors ($STATUS_URL) was **down**: - HTTP code: 401 - Response time: 34 ms
process
🛑 processors is down in processors status url was down http code response time ms
1
264,615
20,026,462,329
IssuesEvent
2022-02-01 21:56:45
UnBArqDsw2021-2/2021.2_G2_lava-jato
https://api.github.com/repos/UnBArqDsw2021-2/2021.2_G2_lava-jato
opened
Documento Brainstorm
documentation Elicitação Sprint 2
### Descrição: Documentar a secção de Brainstorm feita pela equipe documentada no [miro](https://miro.com/welcomeonboard/WGJaYzNzanRlUUdjOXV0blIyd1Z3bjRuT3E3eEU5WkcweEhIaVZ2dG5KcHpKeml1NHRIcTdQbmVFWElEUmhqNnwzMDc0NDU3MzU1NTA5OTM4MzUy?invite_link_id=235529925893) e pela [issue](https://github.com/UnBArqDsw2021-2/2021.2_G2_lava-jato/issues/2) ### Tarefas: - [ ] Analisar o Brainstorm. - [ ] Criar o Documento. ### Critério de aceitação: Estiver no gh-pages Todos os integrantes estiverem analisados e aprovados o documento.
1.0
Documento Brainstorm - ### Descrição: Documentar a secção de Brainstorm feita pela equipe documentada no [miro](https://miro.com/welcomeonboard/WGJaYzNzanRlUUdjOXV0blIyd1Z3bjRuT3E3eEU5WkcweEhIaVZ2dG5KcHpKeml1NHRIcTdQbmVFWElEUmhqNnwzMDc0NDU3MzU1NTA5OTM4MzUy?invite_link_id=235529925893) e pela [issue](https://github.com/UnBArqDsw2021-2/2021.2_G2_lava-jato/issues/2) ### Tarefas: - [ ] Analisar o Brainstorm. - [ ] Criar o Documento. ### Critério de aceitação: Estiver no gh-pages Todos os integrantes estiverem analisados e aprovados o documento.
non_process
documento brainstorm descrição documentar a secção de brainstorm feita pela equipe documentada no e pela tarefas analisar o brainstorm criar o documento critério de aceitação estiver no gh pages todos os integrantes estiverem analisados e aprovados o documento
0
20,286
26,916,418,626
IssuesEvent
2023-02-07 06:57:35
ShashankInsnapsys/user_crud
https://api.github.com/repos/ShashankInsnapsys/user_crud
reopened
DB Issues Demooo
invalid In process
**Laravel's database** query _builder provides a _convenient_, fluent_ interface to creating and running database queries. It can be used to perform most database operations in your application and works perfectly with all of Laravel's supported database systems. The Laravel query builder uses PDO parameter binding to protect your application against SQL injection attacks. There is no need to clean or sanitize strings passed to the query builder as query bindings. ![demo1](https://user-images.githubusercontent.com/106538019/216236830-b4dbe4e2-b76b-475e-aadb-2f7aded3c584.png) ![img-4](https://user-images.githubusercontent.com/106538019/216237088-3b836193-5809-4bc5-9d60-1b645e4ce60c.jpg)
1.0
DB Issues Demooo - **Laravel's database** query _builder provides a _convenient_, fluent_ interface to creating and running database queries. It can be used to perform most database operations in your application and works perfectly with all of Laravel's supported database systems. The Laravel query builder uses PDO parameter binding to protect your application against SQL injection attacks. There is no need to clean or sanitize strings passed to the query builder as query bindings. ![demo1](https://user-images.githubusercontent.com/106538019/216236830-b4dbe4e2-b76b-475e-aadb-2f7aded3c584.png) ![img-4](https://user-images.githubusercontent.com/106538019/216237088-3b836193-5809-4bc5-9d60-1b645e4ce60c.jpg)
process
db issues demooo laravel s database query builder provides a convenient fluent interface to creating and running database queries it can be used to perform most database operations in your application and works perfectly with all of laravel s supported database systems the laravel query builder uses pdo parameter binding to protect your application against sql injection attacks there is no need to clean or sanitize strings passed to the query builder as query bindings
1
505,857
14,653,423,124
IssuesEvent
2020-12-28 05:53:48
vanjarosoftware/Vanjaro.Platform
https://api.github.com/repos/vanjarosoftware/Vanjaro.Platform
closed
Custom Fonts Do No Show in the Default Theme Builder Font Picker
Area: Backend Bug Priority: High Release: Patch
I added a custom font but the font doesn't show up in Default Theme Builder to use for the Breadcrumb and other site elements. It does show up in the Typography settings for Text Blocks, etc. What I would expect to happen is that after a custom font is added, that it would be an available option to the Default Theme Builder to use site-wide Steps to Reproduce: - Go to SEO & Site Search and link the style sheets to a custom Google Font, **Open Sans** `<link rel="preconnect" href="https://fonts.gstatic.com">` `<link href="https://fonts.googleapis.com/css2?family=Open+Sans:ital,wght@0,300;0,400;0,700;1,300;1,400;1,700&display=swap" rel="stylesheet">` ![image](https://user-images.githubusercontent.com/13650025/101813768-2ce71780-3aeb-11eb-83e3-f5bd6f7640b2.png) - Go to Custom Theme Builder and add the Open Sans Font Font Name = Open Sans Font Family = 'Open Sans', sans-serif ![image](https://user-images.githubusercontent.com/13650025/101813953-67e94b00-3aeb-11eb-98b0-5227e7dedc6c.png) - Save the theme - Clear the Client Cache - Clear the Server Cache - Restart the Application - Go back to the Default Theme Builder ![image](https://user-images.githubusercontent.com/13650025/101814263-e514c000-3aeb-11eb-8eeb-100b194ec9e4.png) - Expand Breadcrumb At this point, I would expect to see the new font listed in the drop down so that it can be applied to these global settings.
1.0
Custom Fonts Do No Show in the Default Theme Builder Font Picker - I added a custom font but the font doesn't show up in Default Theme Builder to use for the Breadcrumb and other site elements. It does show up in the Typography settings for Text Blocks, etc. What I would expect to happen is that after a custom font is added, that it would be an available option to the Default Theme Builder to use site-wide Steps to Reproduce: - Go to SEO & Site Search and link the style sheets to a custom Google Font, **Open Sans** `<link rel="preconnect" href="https://fonts.gstatic.com">` `<link href="https://fonts.googleapis.com/css2?family=Open+Sans:ital,wght@0,300;0,400;0,700;1,300;1,400;1,700&display=swap" rel="stylesheet">` ![image](https://user-images.githubusercontent.com/13650025/101813768-2ce71780-3aeb-11eb-83e3-f5bd6f7640b2.png) - Go to Custom Theme Builder and add the Open Sans Font Font Name = Open Sans Font Family = 'Open Sans', sans-serif ![image](https://user-images.githubusercontent.com/13650025/101813953-67e94b00-3aeb-11eb-98b0-5227e7dedc6c.png) - Save the theme - Clear the Client Cache - Clear the Server Cache - Restart the Application - Go back to the Default Theme Builder ![image](https://user-images.githubusercontent.com/13650025/101814263-e514c000-3aeb-11eb-8eeb-100b194ec9e4.png) - Expand Breadcrumb At this point, I would expect to see the new font listed in the drop down so that it can be applied to these global settings.
non_process
custom fonts do no show in the default theme builder font picker i added a custom font but the font doesn t show up in default theme builder to use for the breadcrumb and other site elements it does show up in the typography settings for text blocks etc what i would expect to happen is that after a custom font is added that it would be an available option to the default theme builder to use site wide steps to reproduce go to seo site search and link the style sheets to a custom google font open sans link rel preconnect href go to custom theme builder and add the open sans font font name open sans font family open sans sans serif save the theme clear the client cache clear the server cache restart the application go back to the default theme builder expand breadcrumb at this point i would expect to see the new font listed in the drop down so that it can be applied to these global settings
0
8,656
11,796,228,753
IssuesEvent
2020-03-18 10:24:13
TOMP-WG/TOMP-API
https://api.github.com/repos/TOMP-WG/TOMP-API
closed
A high-level roadmap for TO-MP API developments
process
In discussion with Ross we came to the conclusion that it would be beneficial to have a sort of roadmap that shows our development ideas (visually) and also shows for example data sharing standardization efforts that are at least considering and might be undertaking.
1.0
A high-level roadmap for TO-MP API developments - In discussion with Ross we came to the conclusion that it would be beneficial to have a sort of roadmap that shows our development ideas (visually) and also shows for example data sharing standardization efforts that are at least considering and might be undertaking.
process
a high level roadmap for to mp api developments in discussion with ross we came to the conclusion that it would be beneficial to have a sort of roadmap that shows our development ideas visually and also shows for example data sharing standardization efforts that are at least considering and might be undertaking
1
17,636
23,457,364,263
IssuesEvent
2022-08-16 10:02:29
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Missing text
automation/svc triaged cxp doc-enhancement process-automation/subsvc Pri1
In Run As accounts section, there is text missing after “There are two types of Run As accounts in Azure Automation:” --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 8721e209-24ce-2170-6caa-ed12a7060080 * Version Independent ID: ac13f91d-460c-cbe9-4778-50d20765b252 * Content: [Azure Automation account authentication overview](https://docs.microsoft.com/en-us/azure/automation/automation-security-overview) * Content Source: [articles/automation/automation-security-overview.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/automation/automation-security-overview.md) * Service: **automation** * Sub-service: **process-automation** * GitHub Login: @SnehaSudhirG * Microsoft Alias: **sudhirsneha**
1.0
Missing text - In Run As accounts section, there is text missing after “There are two types of Run As accounts in Azure Automation:” --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 8721e209-24ce-2170-6caa-ed12a7060080 * Version Independent ID: ac13f91d-460c-cbe9-4778-50d20765b252 * Content: [Azure Automation account authentication overview](https://docs.microsoft.com/en-us/azure/automation/automation-security-overview) * Content Source: [articles/automation/automation-security-overview.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/automation/automation-security-overview.md) * Service: **automation** * Sub-service: **process-automation** * GitHub Login: @SnehaSudhirG * Microsoft Alias: **sudhirsneha**
process
missing text in run as accounts section there is text missing after “there are two types of run as accounts in azure automation ” document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service automation sub service process automation github login snehasudhirg microsoft alias sudhirsneha
1
18,872
24,804,294,819
IssuesEvent
2022-10-25 02:07:31
streamnative/pulsar-spark
https://api.github.com/repos/streamnative/pulsar-spark
closed
Update the release doc follow the release template
triage/week-50 compute/data-processing
Here is the template https://streamnative.slab.com/posts/repository-release-template-prb0lvyt If you have any questions about the release doc template, please **leave your comment** on it, **do not edit it directly**.
1.0
Update the release doc follow the release template - Here is the template https://streamnative.slab.com/posts/repository-release-template-prb0lvyt If you have any questions about the release doc template, please **leave your comment** on it, **do not edit it directly**.
process
update the release doc follow the release template here is the template if you have any questions about the release doc template please leave your comment on it do not edit it directly
1
3,017
6,024,603,902
IssuesEvent
2017-06-08 05:57:41
SherlockDean/MsgGo
https://api.github.com/repos/SherlockDean/MsgGo
opened
As a product owner, I would like to start the App Store Release process so that we can have enough time to know what we need to do and prepare for the future
In Process
This is a long task. Helpful Wiki: https://wiki.wdf.sap.corp/wiki/display/NAAS/Mobile+Assembly+Alignment+and+Setup
1.0
As a product owner, I would like to start the App Store Release process so that we can have enough time to know what we need to do and prepare for the future - This is a long task. Helpful Wiki: https://wiki.wdf.sap.corp/wiki/display/NAAS/Mobile+Assembly+Alignment+and+Setup
process
as a product owner i would like to start the app store release process so that we can have enough time to know what we need to do and prepare for the future this is a long task helpful wiki
1
2,121
11,427,577,021
IssuesEvent
2020-02-04 01:17:14
rancher/rancher
https://api.github.com/repos/rancher/rancher
closed
Automation - Implement RBAC cases for Istio CRDs
setup/automation
Need to create automated tests to validate all Istio CRDs have proper RBAC. Cluster Owner, Project Owner, and Project Member should have access to read, create new, edit, and delete. Read Only user should only have access to read. Cluster Member should not have ANY access, including read. CRD List: ``` policies.authentication.istio.io adapters.config.istio.io attributemanifests.config.istio.io handlers.config.istio.io httpapispecbindings.config.istio.io httpapispecs.config.istio.io instances.config.istio.io quotaspecbindings.config.istio.io quotaspecs.config.istio.io rules.config.istio.io templates.config.istio.io destinationrules.networking.istio.io envoyfilters.networking.istio.io gateways.networking.istio.io serviceentries.networking.istio.io sidecars.networking.istio.io virtualservices.networking.istio.io rbacconfigs.rbac.istio.io servicerolebindings.rbac.istio.io serviceroles.rbac.istio.io authorizationpolicies.security.istio.io certificates.certmanager.k8s.io challenges.certmanager.k8s.io issuers.certmanager.k8s.io orders.certmanager.k8s.io ``` For now can comment out CRDs that are known to fail. Refer to Issue: #25096
1.0
Automation - Implement RBAC cases for Istio CRDs - Need to create automated tests to validate all Istio CRDs have proper RBAC. Cluster Owner, Project Owner, and Project Member should have access to read, create new, edit, and delete. Read Only user should only have access to read. Cluster Member should not have ANY access, including read. CRD List: ``` policies.authentication.istio.io adapters.config.istio.io attributemanifests.config.istio.io handlers.config.istio.io httpapispecbindings.config.istio.io httpapispecs.config.istio.io instances.config.istio.io quotaspecbindings.config.istio.io quotaspecs.config.istio.io rules.config.istio.io templates.config.istio.io destinationrules.networking.istio.io envoyfilters.networking.istio.io gateways.networking.istio.io serviceentries.networking.istio.io sidecars.networking.istio.io virtualservices.networking.istio.io rbacconfigs.rbac.istio.io servicerolebindings.rbac.istio.io serviceroles.rbac.istio.io authorizationpolicies.security.istio.io certificates.certmanager.k8s.io challenges.certmanager.k8s.io issuers.certmanager.k8s.io orders.certmanager.k8s.io ``` For now can comment out CRDs that are known to fail. Refer to Issue: #25096
non_process
automation implement rbac cases for istio crds need to create automated tests to validate all istio crds have proper rbac cluster owner project owner and project member should have access to read create new edit and delete read only user should only have access to read cluster member should not have any access including read crd list policies authentication istio io adapters config istio io attributemanifests config istio io handlers config istio io httpapispecbindings config istio io httpapispecs config istio io instances config istio io quotaspecbindings config istio io quotaspecs config istio io rules config istio io templates config istio io destinationrules networking istio io envoyfilters networking istio io gateways networking istio io serviceentries networking istio io sidecars networking istio io virtualservices networking istio io rbacconfigs rbac istio io servicerolebindings rbac istio io serviceroles rbac istio io authorizationpolicies security istio io certificates certmanager io challenges certmanager io issuers certmanager io orders certmanager io for now can comment out crds that are known to fail refer to issue
0
355,309
25,175,896,514
IssuesEvent
2022-11-11 09:13:53
domoberzin/pe
https://api.github.com/repos/domoberzin/pe
opened
No pictures in UG
type.DocumentationBug severity.Low
As in the title, there are no images of sample command executions in the UG to show the user how commands are executed and their results. <!--session: 1668152369213-3a5dd7dd-3795-4ca3-b475-d951537b6bde--> <!--Version: Web v3.4.4-->
1.0
No pictures in UG - As in the title, there are no images of sample command executions in the UG to show the user how commands are executed and their results. <!--session: 1668152369213-3a5dd7dd-3795-4ca3-b475-d951537b6bde--> <!--Version: Web v3.4.4-->
non_process
no pictures in ug as in the title there are no images of sample command executions in the ug to show the user how commands are executed and their results
0
4,663
7,497,221,900
IssuesEvent
2018-04-08 17:35:21
nodejs/node
https://api.github.com/repos/nodejs/node
closed
Why does node/io.js hang when printing to the console inside a loop?
help wanted memory process
Sorry if it is a dumb question/issue, but why does this code: ``` for (i = 0; i < 1000000; i++) { console.log('abcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabc' + i); } ``` hang `node` for a few seconds (at around i = 1500) before resuming again? During the hang the amount of memory used by the `node` process increases very fast and the CPU usage is very high during that time. On the other hand, if I write: ``` for (i = 0; i < 1000000; i++) { console.log(i); } ``` then the `node` process does not hang at all. The reason I am asking is that I have a piece of code which involves printing inside a loop, and it also hangs, but for much longer (like 30-60 seconds, before resuming again). The code prints the paths of all files in a directory (walking recursively): https://gist.github.com/pgkos/f0a650daf56aa49899e9. The issue occurs on both io.js v2.0.2 and node.js v0.12.2, on Ubuntu 64-bit.
1.0
Why does node/io.js hang when printing to the console inside a loop? - Sorry if it is a dumb question/issue, but why does this code: ``` for (i = 0; i < 1000000; i++) { console.log('abcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabc' + i); } ``` hang `node` for a few seconds (at around i = 1500) before resuming again? During the hang the amount of memory used by the `node` process increases very fast and the CPU usage is very high during that time. On the other hand, if I write: ``` for (i = 0; i < 1000000; i++) { console.log(i); } ``` then the `node` process does not hang at all. The reason I am asking is that I have a piece of code which involves printing inside a loop, and it also hangs, but for much longer (like 30-60 seconds, before resuming again). The code prints the paths of all files in a directory (walking recursively): https://gist.github.com/pgkos/f0a650daf56aa49899e9. The issue occurs on both io.js v2.0.2 and node.js v0.12.2, on Ubuntu 64-bit.
process
why does node io js hang when printing to the console inside a loop sorry if it is a dumb question issue but why does this code for i i i console log abcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabc i hang node for a few seconds at around i before resuming again during the hang the amount of memory used by the node process increases very fast and the cpu usage is very high during that time on the other hand if i write for i i i console log i then the node process does not hang at all the reason i am asking is that i have a piece of code which involves printing inside a loop and it also hangs but for much longer like seconds before resuming again the code prints the paths of all files in a directory walking recursively the issue occurs on both io js and node js on ubuntu bit
1
289,136
24,963,345,329
IssuesEvent
2022-11-01 17:15:54
phetsims/qa
https://api.github.com/repos/phetsims/qa
opened
Prototype Test: Mean: Share and Balance 1.0.0-rc.1
QA:prototype-test
<!--- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// DEVELOPERS: * title for this issue = Prototype Test: {{SIM_TITLE}} {{VERSION}} * replace {{MENTIONS}} with @mentions for team members who should received GitHub notifications about this issue * Fill in the {{REPO}}, {{VERSION}}, and {{GITHUB_ISSUE_LINK}} placeholders. * Delete things that are not relevant, e.g. PhET-iO links for non-PhET-iO tests. * assign the issue to @KatieWoe and @kathy-phet //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// --> <h1>Prototype Test</h1> **Mentions**: @kathy-phet, @amanda-phet, @samreid, @KatieWoe <h3>Simulation links</h3> - [github repository for issues](https://github.com/phetsims/mean-share-and-balance/issues) - [phet top level directory](https://phet-dev.colorado.edu/html/mean-share-and-balance/1.0.0-rc.1) - [sim: all_phet.html](https://phet-dev.colorado.edu/html/mean-share-and-balance/1.0.0-rc.1/phet/mean-share-and-balance_all_phet.html) <h3>Test Matricies</h3> - [General Test Matrix](FILLED_IN_BY_QA) <h3>Features included</h3> - [x] Alternative Input - [ ] UI Sound - [ ] Sonification - [ ] Description - [ ] Voicing <h3>Focus and Special Instructions</h3> This our first RC test and everything is fair game. <!--- Things to include here: * purpose/focus of the test * milestones * specific things to test * specific platforms to test * instructions for any non-standard tests * If you want PhET-iO diff wrapper tested against a prior version, provide details and link to prior version. --> <h3>Issues to Verify</h3> No issues to verify. <!--- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// // QA only below here //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// --> --- <h2>For QA...</h2> <!--- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// // General features //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// --> <details> <summary><b>General features</b></summary> <!--- [DO NOT OMIT, CAN BE EDITED] --> <h3>What to Test</h3> - Play with the simulation normally. - Make sure you can't lose anything. - Complete the test matrix. - Try to include version numbers for browsers - If there is a console available, check for errors and include them in the Problem Description. - Focus on pedagogy issues and bugs that break the sim. - If you find bugs beyond pedagogy/breaking, still document these bugs as github issues. - If a11y aspects are present, test them, but with an eye for "normal use". <hr> </details> <!--- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// // Accessibility features //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// --> <details> <summary><b>Accessibility features</b></summary> <!--- [DO NOT OMIT, CAN BE EDITED] --> <h3>What to Test</h3> <h3>If a11y aspects are present, test them, but with an eye for "normal use".</h3> - Specific instructions can be found above. - Make sure the accessibility (a11y) feature that is being tested doesn't negatively affect the sim in any way. Here is a list of features that may be supported in this test: - Alternative Input - Interactive Description - Sound and Sonification - Pan and Zoom - Mobile Description - Voicing - Test all possible forms of input. - Test all mouse/trackpad inputs. - Test all touchscreen inputs. - Test all keyboard navigation inputs (if applicable). - Test all forms of input with a screen reader (if applicable). - If this sim is not in [this list](https://phet.colorado.edu/en/accessibility/prototypes) or up to date there, make an issue in [website](https://github.com/phetsims/website) to ask if PhET research page links need updating. Please assign to @terracoda and @emily-phet. <!--- [CAN BE OMITTED, DO NOT EDIT] --> <h3>Screen Readers</h3> This sim may support screen readers. If you are unfamiliar with screen readers, please ask Katie to introduce you to screen readers. If you simply need a refresher on screen readers, please consult the [QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md), which should have all of the information you need as well as a link to a screen reader tutorial made by Jesse. Otherwise, look over the a11y view before opening the simulation. Once you've done that, open the simulation and make sure alerts and descriptions work as intended. <!--- [CAN BE OMITTED, CAN BE EDITED] --> <h3>Platforms and Screen Readers to Be Tested</h3> - Windows 10 + Latest Chrome + Latest JAWS - Windows 10 + Latest Firefox + Latest NVDA - macOS + Safari + VoiceOver - iOS + Safari + VoiceOver (only if specified in testing issue) <!--- [CAN BE OMITTED, CAN BE EDITED] --> <h3>Critical Screen Reader Information</h3> We are tracking known screen reader bugs in [here](https://github.com/phetsims/qa/blob/master/documentation/accessibility-bugs.md). If you find a screen reader bug, please check it against this list. <!--- [CAN BE OMITTED, CAN BE EDITED] --> <h3>Keyboard Navigation</h3> This sim supports keyboard navigation. Please make sure it works as intended on all platforms by itself and with a screen reader. <h3>Magnification</h3> This sim supports magnification with pinch and drag gestures on touch screens, keyboard shortcuts, and mouse/wheel controls. Please test magnfication and make sure it is working as intended and well with the use cases of the simulation. Due to the way screen readers handle user input, magnification is NOT expected to work while using a screen reader so there is no need to test this case. <hr> </details> <!--- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// // FAQs for QA Members [DO NOT OMIT, DO NOT EDIT] //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// --> <details> <summary><b>FAQs for QA Members</b></summary> <br> <!--- [DO NOT OMIT, DO NOT EDIT] --> <details> <summary><i>There are multiple tests in this issue... Which test should I do first?</i></summary> Test in order! Test the first thing first, the second thing second, and so on. </details> <br> <!--- [DO NOT OMIT, DO NOT EDIT] --> <details> <summary><i>How should I format my issue?</i></summary> Here's a template for making issues: <b>Test Device</b> blah <b>Operating System</b> blah <b>Browser</b> blah <b>Problem Description</b> blah <b>Steps to Reproduce</b> blah <b>Visuals</b> blah <details> <summary><b>Troubleshooting Information</b></summary> blah </details> </details> <br> <!--- [DO NOT OMIT, DO NOT EDIT] --> <details> <summary><i>Who should I assign?</i></summary> We typically assign the developer who opened the issue in the QA repository. </details> <br> <!--- [DO NOT OMIT, DO NOT EDIT] --> <details> <summary><i>My question isn't in here... What should I do?</i></summary> You should: 1. Consult the [QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md). 2. Google it. 3. Ask Katie. 4. Ask a developer. 5. Google it again. 6. Cry. </details> <br> <hr> </details>
1.0
Prototype Test: Mean: Share and Balance 1.0.0-rc.1 - <!--- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// DEVELOPERS: * title for this issue = Prototype Test: {{SIM_TITLE}} {{VERSION}} * replace {{MENTIONS}} with @mentions for team members who should received GitHub notifications about this issue * Fill in the {{REPO}}, {{VERSION}}, and {{GITHUB_ISSUE_LINK}} placeholders. * Delete things that are not relevant, e.g. PhET-iO links for non-PhET-iO tests. * assign the issue to @KatieWoe and @kathy-phet //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// --> <h1>Prototype Test</h1> **Mentions**: @kathy-phet, @amanda-phet, @samreid, @KatieWoe <h3>Simulation links</h3> - [github repository for issues](https://github.com/phetsims/mean-share-and-balance/issues) - [phet top level directory](https://phet-dev.colorado.edu/html/mean-share-and-balance/1.0.0-rc.1) - [sim: all_phet.html](https://phet-dev.colorado.edu/html/mean-share-and-balance/1.0.0-rc.1/phet/mean-share-and-balance_all_phet.html) <h3>Test Matricies</h3> - [General Test Matrix](FILLED_IN_BY_QA) <h3>Features included</h3> - [x] Alternative Input - [ ] UI Sound - [ ] Sonification - [ ] Description - [ ] Voicing <h3>Focus and Special Instructions</h3> This our first RC test and everything is fair game. <!--- Things to include here: * purpose/focus of the test * milestones * specific things to test * specific platforms to test * instructions for any non-standard tests * If you want PhET-iO diff wrapper tested against a prior version, provide details and link to prior version. --> <h3>Issues to Verify</h3> No issues to verify. <!--- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// // QA only below here //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// --> --- <h2>For QA...</h2> <!--- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// // General features //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// --> <details> <summary><b>General features</b></summary> <!--- [DO NOT OMIT, CAN BE EDITED] --> <h3>What to Test</h3> - Play with the simulation normally. - Make sure you can't lose anything. - Complete the test matrix. - Try to include version numbers for browsers - If there is a console available, check for errors and include them in the Problem Description. - Focus on pedagogy issues and bugs that break the sim. - If you find bugs beyond pedagogy/breaking, still document these bugs as github issues. - If a11y aspects are present, test them, but with an eye for "normal use". <hr> </details> <!--- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// // Accessibility features //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// --> <details> <summary><b>Accessibility features</b></summary> <!--- [DO NOT OMIT, CAN BE EDITED] --> <h3>What to Test</h3> <h3>If a11y aspects are present, test them, but with an eye for "normal use".</h3> - Specific instructions can be found above. - Make sure the accessibility (a11y) feature that is being tested doesn't negatively affect the sim in any way. Here is a list of features that may be supported in this test: - Alternative Input - Interactive Description - Sound and Sonification - Pan and Zoom - Mobile Description - Voicing - Test all possible forms of input. - Test all mouse/trackpad inputs. - Test all touchscreen inputs. - Test all keyboard navigation inputs (if applicable). - Test all forms of input with a screen reader (if applicable). - If this sim is not in [this list](https://phet.colorado.edu/en/accessibility/prototypes) or up to date there, make an issue in [website](https://github.com/phetsims/website) to ask if PhET research page links need updating. Please assign to @terracoda and @emily-phet. <!--- [CAN BE OMITTED, DO NOT EDIT] --> <h3>Screen Readers</h3> This sim may support screen readers. If you are unfamiliar with screen readers, please ask Katie to introduce you to screen readers. If you simply need a refresher on screen readers, please consult the [QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md), which should have all of the information you need as well as a link to a screen reader tutorial made by Jesse. Otherwise, look over the a11y view before opening the simulation. Once you've done that, open the simulation and make sure alerts and descriptions work as intended. <!--- [CAN BE OMITTED, CAN BE EDITED] --> <h3>Platforms and Screen Readers to Be Tested</h3> - Windows 10 + Latest Chrome + Latest JAWS - Windows 10 + Latest Firefox + Latest NVDA - macOS + Safari + VoiceOver - iOS + Safari + VoiceOver (only if specified in testing issue) <!--- [CAN BE OMITTED, CAN BE EDITED] --> <h3>Critical Screen Reader Information</h3> We are tracking known screen reader bugs in [here](https://github.com/phetsims/qa/blob/master/documentation/accessibility-bugs.md). If you find a screen reader bug, please check it against this list. <!--- [CAN BE OMITTED, CAN BE EDITED] --> <h3>Keyboard Navigation</h3> This sim supports keyboard navigation. Please make sure it works as intended on all platforms by itself and with a screen reader. <h3>Magnification</h3> This sim supports magnification with pinch and drag gestures on touch screens, keyboard shortcuts, and mouse/wheel controls. Please test magnfication and make sure it is working as intended and well with the use cases of the simulation. Due to the way screen readers handle user input, magnification is NOT expected to work while using a screen reader so there is no need to test this case. <hr> </details> <!--- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// // FAQs for QA Members [DO NOT OMIT, DO NOT EDIT] //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// --> <details> <summary><b>FAQs for QA Members</b></summary> <br> <!--- [DO NOT OMIT, DO NOT EDIT] --> <details> <summary><i>There are multiple tests in this issue... Which test should I do first?</i></summary> Test in order! Test the first thing first, the second thing second, and so on. </details> <br> <!--- [DO NOT OMIT, DO NOT EDIT] --> <details> <summary><i>How should I format my issue?</i></summary> Here's a template for making issues: <b>Test Device</b> blah <b>Operating System</b> blah <b>Browser</b> blah <b>Problem Description</b> blah <b>Steps to Reproduce</b> blah <b>Visuals</b> blah <details> <summary><b>Troubleshooting Information</b></summary> blah </details> </details> <br> <!--- [DO NOT OMIT, DO NOT EDIT] --> <details> <summary><i>Who should I assign?</i></summary> We typically assign the developer who opened the issue in the QA repository. </details> <br> <!--- [DO NOT OMIT, DO NOT EDIT] --> <details> <summary><i>My question isn't in here... What should I do?</i></summary> You should: 1. Consult the [QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md). 2. Google it. 3. Ask Katie. 4. Ask a developer. 5. Google it again. 6. Cry. </details> <br> <hr> </details>
non_process
prototype test mean share and balance rc developers title for this issue prototype test sim title version replace mentions with mentions for team members who should received github notifications about this issue fill in the repo version and github issue link placeholders delete things that are not relevant e g phet io links for non phet io tests assign the issue to katiewoe and kathy phet prototype test mentions kathy phet amanda phet samreid katiewoe simulation links test matricies filled in by qa features included alternative input ui sound sonification description voicing focus and special instructions this our first rc test and everything is fair game things to include here purpose focus of the test milestones specific things to test specific platforms to test instructions for any non standard tests if you want phet io diff wrapper tested against a prior version provide details and link to prior version issues to verify no issues to verify qa only below here for qa general features general features what to test play with the simulation normally make sure you can t lose anything complete the test matrix try to include version numbers for browsers if there is a console available check for errors and include them in the problem description focus on pedagogy issues and bugs that break the sim if you find bugs beyond pedagogy breaking still document these bugs as github issues if aspects are present test them but with an eye for normal use accessibility features accessibility features what to test if aspects are present test them but with an eye for normal use specific instructions can be found above make sure the accessibility feature that is being tested doesn t negatively affect the sim in any way here is a list of features that may be supported in this test alternative input interactive description sound and sonification pan and zoom mobile description voicing test all possible forms of input test all mouse trackpad inputs test all touchscreen inputs test all keyboard navigation inputs if applicable test all forms of input with a screen reader if applicable if this sim is not in or up to date there make an issue in to ask if phet research page links need updating please assign to terracoda and emily phet screen readers this sim may support screen readers if you are unfamiliar with screen readers please ask katie to introduce you to screen readers if you simply need a refresher on screen readers please consult the which should have all of the information you need as well as a link to a screen reader tutorial made by jesse otherwise look over the view before opening the simulation once you ve done that open the simulation and make sure alerts and descriptions work as intended platforms and screen readers to be tested windows latest chrome latest jaws windows latest firefox latest nvda macos safari voiceover ios safari voiceover only if specified in testing issue critical screen reader information we are tracking known screen reader bugs in if you find a screen reader bug please check it against this list keyboard navigation this sim supports keyboard navigation please make sure it works as intended on all platforms by itself and with a screen reader magnification this sim supports magnification with pinch and drag gestures on touch screens keyboard shortcuts and mouse wheel controls please test magnfication and make sure it is working as intended and well with the use cases of the simulation due to the way screen readers handle user input magnification is not expected to work while using a screen reader so there is no need to test this case faqs for qa members faqs for qa members there are multiple tests in this issue which test should i do first test in order test the first thing first the second thing second and so on how should i format my issue here s a template for making issues test device blah operating system blah browser blah problem description blah steps to reproduce blah visuals blah troubleshooting information blah who should i assign we typically assign the developer who opened the issue in the qa repository my question isn t in here what should i do you should consult the google it ask katie ask a developer google it again cry
0
17,824
23,753,825,786
IssuesEvent
2022-08-31 23:51:15
Azure/azure-sdk-tools
https://api.github.com/repos/Azure/azure-sdk-tools
opened
Dashboard to track the state of a Service team on our release process
Epic Engagement Experience WS: Process Tools & Automation
We need requirements for this. Some rough notes are: - There must be different views: - Which service teams are we engaged with - Where is a specific service team at? what are the next steps? - User for our internal tracking, for example, for Cadl - It will be great if it can help us determine how long it took a service team to go through our SDK Release process
1.0
Dashboard to track the state of a Service team on our release process - We need requirements for this. Some rough notes are: - There must be different views: - Which service teams are we engaged with - Where is a specific service team at? what are the next steps? - User for our internal tracking, for example, for Cadl - It will be great if it can help us determine how long it took a service team to go through our SDK Release process
process
dashboard to track the state of a service team on our release process we need requirements for this some rough notes are there must be different views which service teams are we engaged with where is a specific service team at what are the next steps user for our internal tracking for example for cadl it will be great if it can help us determine how long it took a service team to go through our sdk release process
1
222,643
17,086,155,952
IssuesEvent
2021-07-08 12:08:04
espoo-dev/espoo-dev
https://api.github.com/repos/espoo-dev/espoo-dev
opened
Configure Storybook.js for frontend
documentation frontend
Storybook is an open source tool for building UI components and pages in isolation. It streamlines UI development, testing, and documentation.
1.0
Configure Storybook.js for frontend - Storybook is an open source tool for building UI components and pages in isolation. It streamlines UI development, testing, and documentation.
non_process
configure storybook js for frontend storybook is an open source tool for building ui components and pages in isolation it streamlines ui development testing and documentation
0
19,926
26,393,048,534
IssuesEvent
2023-01-12 17:04:16
geneontology/go-ontology
https://api.github.com/repos/geneontology/go-ontology
closed
Change label GO:0039648 modulation by virus of host protein ubiquitination
multi-species process term name
- modulation by symbiont of host of protein ubiquitination - Change def from: Any process in which a virus modulates the frequency, rate or extent of protein ubiquitination in the host organism. Ubiquitination is the process in which one or more ubiquitin groups are added to a protein. - to: Any process by which a symbiont increases or decreases ubiquitination of target proteins of a host organism. @genegodbold
1.0
Change label GO:0039648 modulation by virus of host protein ubiquitination - - modulation by symbiont of host of protein ubiquitination - Change def from: Any process in which a virus modulates the frequency, rate or extent of protein ubiquitination in the host organism. Ubiquitination is the process in which one or more ubiquitin groups are added to a protein. - to: Any process by which a symbiont increases or decreases ubiquitination of target proteins of a host organism. @genegodbold
process
change label go modulation by virus of host protein ubiquitination modulation by symbiont of host of protein ubiquitination change def from any process in which a virus modulates the frequency rate or extent of protein ubiquitination in the host organism ubiquitination is the process in which one or more ubiquitin groups are added to a protein to any process by which a symbiont increases or decreases ubiquitination of target proteins of a host organism genegodbold
1
160,800
20,118,878,535
IssuesEvent
2022-02-07 22:52:43
TreyM-WSS/whitesource-demo-1
https://api.github.com/repos/TreyM-WSS/whitesource-demo-1
closed
CVE-2021-37701 (High) detected in multiple libraries - autoclosed
security vulnerability
## CVE-2021-37701 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tar-4.4.8.tgz</b>, <b>tar-4.4.13.tgz</b>, <b>tar-4.4.11.tgz</b></p></summary> <p> <details><summary><b>tar-4.4.8.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.8.tgz">https://registry.npmjs.org/tar/-/tar-4.4.8.tgz</a></p> <p> Dependency Hierarchy: - firebase-tools-7.1.0.tgz (Root Library) - :x: **tar-4.4.8.tgz** (Vulnerable Library) </details> <details><summary><b>tar-4.4.13.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.13.tgz">https://registry.npmjs.org/tar/-/tar-4.4.13.tgz</a></p> <p> Dependency Hierarchy: - compiler-cli-9.0.0-next.11.tgz (Root Library) - chokidar-2.1.5.tgz - fsevents-1.2.9.tgz - node-pre-gyp-0.12.0.tgz - :x: **tar-4.4.13.tgz** (Vulnerable Library) </details> <details><summary><b>tar-4.4.11.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.11.tgz">https://registry.npmjs.org/tar/-/tar-4.4.11.tgz</a></p> <p> Dependency Hierarchy: - cli-9.0.0-next.10.tgz (Root Library) - pacote-9.5.8.tgz - :x: **tar-4.4.11.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/TreyM-WSS/whitesource-demo-1/commit/551e7e8a23ecb57fdb46f4d6702da4d7cff49f70">551e7e8a23ecb57fdb46f4d6702da4d7cff49f70</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc. <p>Publish Date: 2021-08-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37701>CVE-2021-37701</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc">https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc</a></p> <p>Release Date: 2021-08-31</p> <p>Fix Resolution: tar - 4.4.16, 5.0.8, 6.1.7</p> </p> </details> <p></p>
True
CVE-2021-37701 (High) detected in multiple libraries - autoclosed - ## CVE-2021-37701 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tar-4.4.8.tgz</b>, <b>tar-4.4.13.tgz</b>, <b>tar-4.4.11.tgz</b></p></summary> <p> <details><summary><b>tar-4.4.8.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.8.tgz">https://registry.npmjs.org/tar/-/tar-4.4.8.tgz</a></p> <p> Dependency Hierarchy: - firebase-tools-7.1.0.tgz (Root Library) - :x: **tar-4.4.8.tgz** (Vulnerable Library) </details> <details><summary><b>tar-4.4.13.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.13.tgz">https://registry.npmjs.org/tar/-/tar-4.4.13.tgz</a></p> <p> Dependency Hierarchy: - compiler-cli-9.0.0-next.11.tgz (Root Library) - chokidar-2.1.5.tgz - fsevents-1.2.9.tgz - node-pre-gyp-0.12.0.tgz - :x: **tar-4.4.13.tgz** (Vulnerable Library) </details> <details><summary><b>tar-4.4.11.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.11.tgz">https://registry.npmjs.org/tar/-/tar-4.4.11.tgz</a></p> <p> Dependency Hierarchy: - cli-9.0.0-next.10.tgz (Root Library) - pacote-9.5.8.tgz - :x: **tar-4.4.11.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/TreyM-WSS/whitesource-demo-1/commit/551e7e8a23ecb57fdb46f4d6702da4d7cff49f70">551e7e8a23ecb57fdb46f4d6702da4d7cff49f70</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc. <p>Publish Date: 2021-08-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37701>CVE-2021-37701</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc">https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc</a></p> <p>Release Date: 2021-08-31</p> <p>Fix Resolution: tar - 4.4.16, 5.0.8, 6.1.7</p> </p> </details> <p></p>
non_process
cve high detected in multiple libraries autoclosed cve high severity vulnerability vulnerable libraries tar tgz tar tgz tar tgz tar tgz tar for node library home page a href dependency hierarchy firebase tools tgz root library x tar tgz vulnerable library tar tgz tar for node library home page a href dependency hierarchy compiler cli next tgz root library chokidar tgz fsevents tgz node pre gyp tgz x tar tgz vulnerable library tar tgz tar for node library home page a href dependency hierarchy cli next tgz root library pacote tgz x tar tgz vulnerable library found in head commit a href vulnerability details the npm package tar aka node tar before versions and has an arbitrary file creation overwrite and arbitrary code execution vulnerability node tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted this is in part achieved by ensuring that extracted directories are not symlinks additionally in order to prevent unnecessary stat calls to determine whether a given path is a directory paths are cached when directories are created this logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems the cache checking logic used both and characters as path separators however is a valid filename character on posix systems by first creating a directory and then replacing that directory with a symlink it was thus possible to bypass node tar symlink checks on directories essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location thus allowing arbitrary file creation and overwrite additionally a similar confusion could arise on case insensitive filesystems if a tar archive contained a directory at foo followed by a symbolic link named foo then on case insensitive file systems the creation of the symbolic link would remove the directory from the filesystem but not from the internal directory cache as it would not be treated as a cache hit a subsequent file entry within the foo directory would then be placed in the target of the symbolic link thinking that the directory had already been created these issues were addressed in releases and the branch of node tar has been deprecated and did not receive patches for these issues if you are still using a release we recommend you update to a more recent version of node tar if this is not possible a workaround is available in the referenced ghsa publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tar
0
3,966
6,900,327,825
IssuesEvent
2017-11-24 17:54:45
GoogleCloudPlatform/google-cloud-dotnet
https://api.github.com/repos/GoogleCloudPlatform/google-cloud-dotnet
closed
Separate out long-running perf/stress tests
priority: p2 type: process
Currently we have PubSub integration tests that take a very long time, and Spanner stress tests. While they should clearly be run periodically, it would be good to be able to run the "regular" integration tests without running these. Options: - Have categories that are excluded by default (if such a thing exists with xUnit) - Use an environment variable (ick) to skip/run them - Separate them into different projects
1.0
Separate out long-running perf/stress tests - Currently we have PubSub integration tests that take a very long time, and Spanner stress tests. While they should clearly be run periodically, it would be good to be able to run the "regular" integration tests without running these. Options: - Have categories that are excluded by default (if such a thing exists with xUnit) - Use an environment variable (ick) to skip/run them - Separate them into different projects
process
separate out long running perf stress tests currently we have pubsub integration tests that take a very long time and spanner stress tests while they should clearly be run periodically it would be good to be able to run the regular integration tests without running these options have categories that are excluded by default if such a thing exists with xunit use an environment variable ick to skip run them separate them into different projects
1
72,315
15,225,245,949
IssuesEvent
2021-02-18 06:58:22
devikab2b/whites5
https://api.github.com/repos/devikab2b/whites5
opened
CVE-2020-9547 (High) detected in jackson-databind-2.6.7.3.jar
security vulnerability
## CVE-2020-9547 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: whites5/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.3/jackson-databind-2.6.7.3.jar</p> <p> Dependency Hierarchy: - spark-sql_2.12-2.4.7.jar (Root Library) - :x: **jackson-databind-2.6.7.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/devikab2b/whites5/commit/b24afaf70d8746f42dcb93a7ef65ad261fda5b7f">b24afaf70d8746f42dcb93a7ef65ad261fda5b7f</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-9547 (High) detected in jackson-databind-2.6.7.3.jar - ## CVE-2020-9547 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: whites5/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.3/jackson-databind-2.6.7.3.jar</p> <p> Dependency Hierarchy: - spark-sql_2.12-2.4.7.jar (Root Library) - :x: **jackson-databind-2.6.7.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/devikab2b/whites5/commit/b24afaf70d8746f42dcb93a7ef65ad261fda5b7f">b24afaf70d8746f42dcb93a7ef65ad261fda5b7f</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spark sql jar root library x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com ibatis sqlmap engine transaction jta jtatransactionconfig aka ibatis sqlmap publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
2,779
5,713,497,253
IssuesEvent
2017-04-19 07:56:32
zotero/zotero
https://api.github.com/repos/zotero/zotero
opened
Remove "Store references in document" option
Interface Word Processor Integration
I can't find the thread where we agreed to this, but given that the text mentions Zotero 3.0, I think it's time to get rid of it…
1.0
Remove "Store references in document" option - I can't find the thread where we agreed to this, but given that the text mentions Zotero 3.0, I think it's time to get rid of it…
process
remove store references in document option i can t find the thread where we agreed to this but given that the text mentions zotero i think it s time to get rid of it…
1
331,830
24,328,072,705
IssuesEvent
2022-09-30 16:34:05
envoyproxy/gateway
https://api.github.com/repos/envoyproxy/gateway
closed
Initial Config Manager Design and Implementation
documentation enhancement help wanted area/config
The Config Manager is responsible for instantiating and managing the lifecycle of the various system components in Envoy Gateway based on the Envoy Gateway Bootstrap spec
1.0
Initial Config Manager Design and Implementation - The Config Manager is responsible for instantiating and managing the lifecycle of the various system components in Envoy Gateway based on the Envoy Gateway Bootstrap spec
non_process
initial config manager design and implementation the config manager is responsible for instantiating and managing the lifecycle of the various system components in envoy gateway based on the envoy gateway bootstrap spec
0
6,303
9,308,456,875
IssuesEvent
2019-03-25 14:35:59
brandon1roadgears/Interpreter-of-programming-language-of-Turing-Machine
https://api.github.com/repos/brandon1roadgears/Interpreter-of-programming-language-of-Turing-Machine
opened
Проверка работоспособности программы.
Testing process
# После завершения работы необходимо проверить, как программа решает те или инные задачи. *** ### (@goldmen4ik) Нам необходимо найти на просторах интернета около 10 задач c решением для машины тьюринга, чтобы проверить, способна ли она справиться с ними. * ### Думаю этого ресурса будет достаточно: [https://infourok.ru/reshenie-zadach-mashina-tyuringa-2302088.html](url), Если есть варианты интереснее - отправить их сюда комментарием.
1.0
Проверка работоспособности программы. - # После завершения работы необходимо проверить, как программа решает те или инные задачи. *** ### (@goldmen4ik) Нам необходимо найти на просторах интернета около 10 задач c решением для машины тьюринга, чтобы проверить, способна ли она справиться с ними. * ### Думаю этого ресурса будет достаточно: [https://infourok.ru/reshenie-zadach-mashina-tyuringa-2302088.html](url), Если есть варианты интереснее - отправить их сюда комментарием.
process
проверка работоспособности программы после завершения работы необходимо проверить как программа решает те или инные задачи нам необходимо найти на просторах интернета около задач c решением для машины тьюринга чтобы проверить способна ли она справиться с ними думаю этого ресурса будет достаточно url если есть варианты интереснее отправить их сюда комментарием
1
38,758
8,956,697,392
IssuesEvent
2019-01-26 19:44:05
catmaid/CATMAID
https://api.github.com/repos/catmaid/CATMAID
opened
ImageBlockLayer: timedout tiles show stale data
context: tile layer difficulty: low priority: low type: defect
When waiting for tiles to load times out, stale textures are shown for the loading tiles rather than empty tiles filled with the Stack's placeholder color.
1.0
ImageBlockLayer: timedout tiles show stale data - When waiting for tiles to load times out, stale textures are shown for the loading tiles rather than empty tiles filled with the Stack's placeholder color.
non_process
imageblocklayer timedout tiles show stale data when waiting for tiles to load times out stale textures are shown for the loading tiles rather than empty tiles filled with the stack s placeholder color
0
146,670
19,441,104,351
IssuesEvent
2021-12-22 01:03:47
samqws-marketing/amzn-ion-hive-serde
https://api.github.com/repos/samqws-marketing/amzn-ion-hive-serde
opened
CVE-2021-43797 (Medium) detected in netty-all-4.0.23.Final.jar
security vulnerability
## CVE-2021-43797 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-all-4.0.23.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: amzn-ion-hive-serde/integration-test/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-all/4.0.23.Final/294104aaf1781d6a56a07d561e792c5d0c95f45/netty-all-4.0.23.Final.jar</p> <p> Dependency Hierarchy: - hive-jdbc-2.3.9.jar (Root Library) - hive-service-2.3.9.jar - hive-llap-server-2.3.9.jar - hbase-server-1.1.1.jar - :x: **netty-all-4.0.23.Final.jar** (Vulnerable Library) <p>Found in base branch: <b>0.3.0</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.7.1.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.7.1.Final to receive a patch. <p>Publish Date: 2021-12-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797>CVE-2021-43797</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="CVE-2021-43797">CVE-2021-43797</a></p> <p>Release Date: 2021-12-09</p> <p>Fix Resolution: io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-all","packageVersion":"4.0.23.Final","packageFilePaths":["/integration-test/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.apache.hive:hive-jdbc:2.3.9;org.apache.hive:hive-service:2.3.9;org.apache.hive:hive-llap-server:2.3.9;org.apache.hbase:hbase-server:1.1.1;io.netty:netty-all:4.0.23.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final","isBinary":false}],"baseBranches":["0.3.0"],"vulnerabilityIdentifier":"CVE-2021-43797","vulnerabilityDetails":"Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers \u0026 clients. Netty prior to version 4.1.7.1.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to \"sanitize\" header names before it forward these to another remote system when used as proxy. This remote system can\u0027t see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.7.1.Final to receive a patch.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-43797 (Medium) detected in netty-all-4.0.23.Final.jar - ## CVE-2021-43797 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-all-4.0.23.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: amzn-ion-hive-serde/integration-test/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-all/4.0.23.Final/294104aaf1781d6a56a07d561e792c5d0c95f45/netty-all-4.0.23.Final.jar</p> <p> Dependency Hierarchy: - hive-jdbc-2.3.9.jar (Root Library) - hive-service-2.3.9.jar - hive-llap-server-2.3.9.jar - hbase-server-1.1.1.jar - :x: **netty-all-4.0.23.Final.jar** (Vulnerable Library) <p>Found in base branch: <b>0.3.0</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.7.1.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.7.1.Final to receive a patch. <p>Publish Date: 2021-12-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797>CVE-2021-43797</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="CVE-2021-43797">CVE-2021-43797</a></p> <p>Release Date: 2021-12-09</p> <p>Fix Resolution: io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-all","packageVersion":"4.0.23.Final","packageFilePaths":["/integration-test/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.apache.hive:hive-jdbc:2.3.9;org.apache.hive:hive-service:2.3.9;org.apache.hive:hive-llap-server:2.3.9;org.apache.hbase:hbase-server:1.1.1;io.netty:netty-all:4.0.23.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final","isBinary":false}],"baseBranches":["0.3.0"],"vulnerabilityIdentifier":"CVE-2021-43797","vulnerabilityDetails":"Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers \u0026 clients. Netty prior to version 4.1.7.1.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to \"sanitize\" header names before it forward these to another remote system when used as proxy. This remote system can\u0027t see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.7.1.Final to receive a patch.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_process
cve medium detected in netty all final jar cve medium severity vulnerability vulnerable library netty all final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file amzn ion hive serde integration test build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty all final netty all final jar dependency hierarchy hive jdbc jar root library hive service jar hive llap server jar hbase server jar x netty all final jar vulnerable library found in base branch vulnerability details netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers clients netty prior to version final skips control chars when they are present at the beginning end of the header name it should instead fail fast as these are not allowed by the spec and could lead to http request smuggling failing to do the validation might cause netty to sanitize header names before it forward these to another remote system when used as proxy this remote system can t see the invalid usage anymore and therefore does not do the validation itself users should upgrade to version final to receive a patch publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin cve release date fix resolution io netty netty codec http final io netty netty all final isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org apache hive hive jdbc org apache hive hive service org apache hive hive llap server org apache hbase hbase server io netty netty all final isminimumfixversionavailable true minimumfixversion io netty netty codec http final io netty netty all final isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers clients netty prior to version final skips control chars when they are present at the beginning end of the header name it should instead fail fast as these are not allowed by the spec and could lead to http request smuggling failing to do the validation might cause netty to sanitize header names before it forward these to another remote system when used as proxy this remote system can see the invalid usage anymore and therefore does not do the validation itself users should upgrade to version final to receive a patch vulnerabilityurl
0
95,966
3,962,779,704
IssuesEvent
2016-05-02 18:04:33
dwyl/dwyl.github.io
https://api.github.com/repos/dwyl/dwyl.github.io
closed
Hero image is cut off when resized
bug help wanted priority-2
I would love the image to always look like this: <img width="616" alt="screen shot 2015-11-04 at 00 48 46" src="https://cloud.githubusercontent.com/assets/4185328/10926306/e1841ea2-828d-11e5-80fb-6e3fca5a0093.png"> But sadly, on mobile, it does this: <img width="352" alt="screen shot 2015-11-04 at 00 49 45" src="https://cloud.githubusercontent.com/assets/4185328/10926350/4cf3914a-828e-11e5-8861-39723f90a09a.png"> And even worse on tall thin phones: <img width="321" alt="screen shot 2015-11-04 at 00 52 03" src="https://cloud.githubusercontent.com/assets/4185328/10926354/58957586-828e-11e5-8a9d-026abfa94604.png"> Then on wide desktop screens: <img width="761" alt="screen shot 2015-11-04 at 00 53 42" src="https://cloud.githubusercontent.com/assets/4185328/10926363/86fcfebc-828e-11e5-8e64-a0ba88a94bf6.png"> There HAS to be a better solution that manually testing 20 different break points and photoshopping the image to add more and more image 'padding' to the sides every time the aspect ratio is anything short of 'perfect'. :persevere:
1.0
Hero image is cut off when resized - I would love the image to always look like this: <img width="616" alt="screen shot 2015-11-04 at 00 48 46" src="https://cloud.githubusercontent.com/assets/4185328/10926306/e1841ea2-828d-11e5-80fb-6e3fca5a0093.png"> But sadly, on mobile, it does this: <img width="352" alt="screen shot 2015-11-04 at 00 49 45" src="https://cloud.githubusercontent.com/assets/4185328/10926350/4cf3914a-828e-11e5-8861-39723f90a09a.png"> And even worse on tall thin phones: <img width="321" alt="screen shot 2015-11-04 at 00 52 03" src="https://cloud.githubusercontent.com/assets/4185328/10926354/58957586-828e-11e5-8a9d-026abfa94604.png"> Then on wide desktop screens: <img width="761" alt="screen shot 2015-11-04 at 00 53 42" src="https://cloud.githubusercontent.com/assets/4185328/10926363/86fcfebc-828e-11e5-8e64-a0ba88a94bf6.png"> There HAS to be a better solution that manually testing 20 different break points and photoshopping the image to add more and more image 'padding' to the sides every time the aspect ratio is anything short of 'perfect'. :persevere:
non_process
hero image is cut off when resized i would love the image to always look like this img width alt screen shot at src but sadly on mobile it does this img width alt screen shot at src and even worse on tall thin phones img width alt screen shot at src then on wide desktop screens img width alt screen shot at src there has to be a better solution that manually testing different break points and photoshopping the image to add more and more image padding to the sides every time the aspect ratio is anything short of perfect persevere
0
11,871
14,672,820,445
IssuesEvent
2020-12-30 11:33:20
prisma/prisma
https://api.github.com/repos/prisma/prisma
closed
Introspect overwrites prisma relation field names
kind/bug process/candidate team/migrations topic: introspection
<!-- Thanks for helping us improve Prisma! 🙏 Please follow the sections in the template and provide as much information as possible about your problem, e.g. by setting the `DEBUG="*"` environment variable and enabling additional logging output in Prisma Client. Learn more about writing proper bug reports here: https://pris.ly/d/bug-reports --> ## Bug description <!-- A clear and concise description of what the bug is. --> The docs: https://www.prisma.io/docs/concepts/components/introspection#introspection-with-an-existing-schema claims that they maintain `@map and @@map attributes` and `Custom @relation names`. However, it's not possible to achieve renaming relation fields for introspected workflow. When I try to put `@map` attribute, I get this error: > `Error parsing attribute "@map": The attribute @map can not be used on relation fields.` I've also tried to use relation names: ```diff - CampaignAutomation CampaignAutomation? @relation(fields: [campaignAutomationId], references: [id]) + automation CampaignAutomation? @relation("CampaignAutomation", fields: [campaignAutomationId], references: [id]) ``` But the introspect overwrites all that changes, removing the relation name ## How to reproduce <!-- Steps to reproduce the behavior: 1. Go to '...' 2. Change '....' 3. Run '....' 4. See error --> Create two tables with one-many relation and introspect the database. Then try to change the generated relation field name. ## Expected behavior <!-- A clear and concise description of what you expected to happen. --> Being able to change the introspected relation field names. They are generated as the table names in PascalCase, which is a horrible DX when making a prisma query. ## Prisma information <!-- Your Prisma schema, Prisma Client queries, ... Do not include your database credentials when sharing your Prisma schema! --> ## Environment & setup <!-- In which environment does the problem occur --> - OS: <!--[e.g. Mac OS, Windows, Debian, CentOS, ...]--> Ubuntu 20.04 - Database: <!--[PostgreSQL, MySQL, MariaDB or SQLite]--> MySQL - Node.js version: <!--[Run `node -v` to see your Node.js version]--> `v15.3.0` - Prisma version: <!--[Run `prisma -v` to see your Prisma version and paste it between the ´´´]--> ``` @prisma/cli : 2.13.1 @prisma/client : 2.13.1 Current platform : debian-openssl-1.1.x Query Engine : query-engine fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/query-engine-debian-openssl-1.1.x) Migration Engine : migration-engine-cli fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/migration-engine-debian-openssl-1.1.x) Introspection Engine : introspection-core fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/introspection-engine-debian-openssl-1.1.x) Format Binary : prisma-fmt fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/prisma-fmt-debian-openssl-1.1.x) Studio : 0.329.0 Done in 3.81s. ```
1.0
Introspect overwrites prisma relation field names - <!-- Thanks for helping us improve Prisma! 🙏 Please follow the sections in the template and provide as much information as possible about your problem, e.g. by setting the `DEBUG="*"` environment variable and enabling additional logging output in Prisma Client. Learn more about writing proper bug reports here: https://pris.ly/d/bug-reports --> ## Bug description <!-- A clear and concise description of what the bug is. --> The docs: https://www.prisma.io/docs/concepts/components/introspection#introspection-with-an-existing-schema claims that they maintain `@map and @@map attributes` and `Custom @relation names`. However, it's not possible to achieve renaming relation fields for introspected workflow. When I try to put `@map` attribute, I get this error: > `Error parsing attribute "@map": The attribute @map can not be used on relation fields.` I've also tried to use relation names: ```diff - CampaignAutomation CampaignAutomation? @relation(fields: [campaignAutomationId], references: [id]) + automation CampaignAutomation? @relation("CampaignAutomation", fields: [campaignAutomationId], references: [id]) ``` But the introspect overwrites all that changes, removing the relation name ## How to reproduce <!-- Steps to reproduce the behavior: 1. Go to '...' 2. Change '....' 3. Run '....' 4. See error --> Create two tables with one-many relation and introspect the database. Then try to change the generated relation field name. ## Expected behavior <!-- A clear and concise description of what you expected to happen. --> Being able to change the introspected relation field names. They are generated as the table names in PascalCase, which is a horrible DX when making a prisma query. ## Prisma information <!-- Your Prisma schema, Prisma Client queries, ... Do not include your database credentials when sharing your Prisma schema! --> ## Environment & setup <!-- In which environment does the problem occur --> - OS: <!--[e.g. Mac OS, Windows, Debian, CentOS, ...]--> Ubuntu 20.04 - Database: <!--[PostgreSQL, MySQL, MariaDB or SQLite]--> MySQL - Node.js version: <!--[Run `node -v` to see your Node.js version]--> `v15.3.0` - Prisma version: <!--[Run `prisma -v` to see your Prisma version and paste it between the ´´´]--> ``` @prisma/cli : 2.13.1 @prisma/client : 2.13.1 Current platform : debian-openssl-1.1.x Query Engine : query-engine fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/query-engine-debian-openssl-1.1.x) Migration Engine : migration-engine-cli fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/migration-engine-debian-openssl-1.1.x) Introspection Engine : introspection-core fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/introspection-engine-debian-openssl-1.1.x) Format Binary : prisma-fmt fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/prisma-fmt-debian-openssl-1.1.x) Studio : 0.329.0 Done in 3.81s. ```
process
introspect overwrites prisma relation field names thanks for helping us improve prisma 🙏 please follow the sections in the template and provide as much information as possible about your problem e g by setting the debug environment variable and enabling additional logging output in prisma client learn more about writing proper bug reports here bug description the docs claims that they maintain map and map attributes and custom relation names however it s not possible to achieve renaming relation fields for introspected workflow when i try to put map attribute i get this error error parsing attribute map the attribute map can not be used on relation fields i ve also tried to use relation names diff campaignautomation campaignautomation relation fields references automation campaignautomation relation campaignautomation fields references but the introspect overwrites all that changes removing the relation name how to reproduce steps to reproduce the behavior go to change run see error create two tables with one many relation and introspect the database then try to change the generated relation field name expected behavior being able to change the introspected relation field names they are generated as the table names in pascalcase which is a horrible dx when making a prisma query prisma information your prisma schema prisma client queries do not include your database credentials when sharing your prisma schema environment setup os ubuntu database mysql node js version prisma version prisma cli prisma client current platform debian openssl x query engine query engine at node modules prisma engines query engine debian openssl x migration engine migration engine cli at node modules prisma engines migration engine debian openssl x introspection engine introspection core at node modules prisma engines introspection engine debian openssl x format binary prisma fmt at node modules prisma engines prisma fmt debian openssl x studio done in
1
7,759
10,878,728,188
IssuesEvent
2019-11-16 19:42:42
deeplearningunb/Skincare
https://api.github.com/repos/deeplearningunb/Skincare
closed
Split Images into Training set and Test set
backend preprocessing
This procedure aims to set the data apart which is going to be used to train the model and check the accuracy afterwards. To be accepted, this procedure must contain: - [x] A proportion of 20% for Test set and 80% for Training Set
1.0
Split Images into Training set and Test set - This procedure aims to set the data apart which is going to be used to train the model and check the accuracy afterwards. To be accepted, this procedure must contain: - [x] A proportion of 20% for Test set and 80% for Training Set
process
split images into training set and test set this procedure aims to set the data apart which is going to be used to train the model and check the accuracy afterwards to be accepted this procedure must contain a proportion of for test set and for training set
1
592,110
17,870,797,501
IssuesEvent
2021-09-06 15:12:57
Kotlin/kotlinx.serialization
https://api.github.com/repos/Kotlin/kotlinx.serialization
closed
Annotations are not collected for object kinds
bug compiler-plugin Priority: 1
**Describe the bug** `getEntityAnnotations()` for an object descriptor is empty in spite of that the annotation class is marked with `@SerialInfo` meta-annotation. This works well for regular classes. **To Reproduce** ```kotlin class ObjectSerialInfoTest { @Test @ImplicitReflectionSerializer fun annotations() { val childDescriptor = serializer<Root.Child>().descriptor assertEquals(1, childDescriptor.getEntityAnnotations().size) assertEquals(22, (childDescriptor.getEntityAnnotations().single() as MetaData).metaValue) assertEquals(2, childDescriptor.elementsCount) val rootDescriptor = childDescriptor.getElementDescriptor(1) assertEquals(1, rootDescriptor.getEntityAnnotations().size) assertEquals(11, (childDescriptor.getEntityAnnotations().single() as MetaData).metaValue) } @SerialInfo annotation class MetaData(val metaValue: Int) @Serializable @MetaData(11) object Root { @Serializable @MetaData(22) class Child(val id: Int, val root: Root = Root) } } ``` **Expected behaviour** SerialDescriptor should work the same as for a regular class descriptor - it should return annotations and the test should pass. **Environment** - Kotlin version: 1.3.61 - Library version: 0.14.0 - Kotlin platforms: JVM
1.0
Annotations are not collected for object kinds - **Describe the bug** `getEntityAnnotations()` for an object descriptor is empty in spite of that the annotation class is marked with `@SerialInfo` meta-annotation. This works well for regular classes. **To Reproduce** ```kotlin class ObjectSerialInfoTest { @Test @ImplicitReflectionSerializer fun annotations() { val childDescriptor = serializer<Root.Child>().descriptor assertEquals(1, childDescriptor.getEntityAnnotations().size) assertEquals(22, (childDescriptor.getEntityAnnotations().single() as MetaData).metaValue) assertEquals(2, childDescriptor.elementsCount) val rootDescriptor = childDescriptor.getElementDescriptor(1) assertEquals(1, rootDescriptor.getEntityAnnotations().size) assertEquals(11, (childDescriptor.getEntityAnnotations().single() as MetaData).metaValue) } @SerialInfo annotation class MetaData(val metaValue: Int) @Serializable @MetaData(11) object Root { @Serializable @MetaData(22) class Child(val id: Int, val root: Root = Root) } } ``` **Expected behaviour** SerialDescriptor should work the same as for a regular class descriptor - it should return annotations and the test should pass. **Environment** - Kotlin version: 1.3.61 - Library version: 0.14.0 - Kotlin platforms: JVM
non_process
annotations are not collected for object kinds describe the bug getentityannotations for an object descriptor is empty in spite of that the annotation class is marked with serialinfo meta annotation this works well for regular classes to reproduce kotlin class objectserialinfotest test implicitreflectionserializer fun annotations val childdescriptor serializer descriptor assertequals childdescriptor getentityannotations size assertequals childdescriptor getentityannotations single as metadata metavalue assertequals childdescriptor elementscount val rootdescriptor childdescriptor getelementdescriptor assertequals rootdescriptor getentityannotations size assertequals childdescriptor getentityannotations single as metadata metavalue serialinfo annotation class metadata val metavalue int serializable metadata object root serializable metadata class child val id int val root root root expected behaviour serialdescriptor should work the same as for a regular class descriptor it should return annotations and the test should pass environment kotlin version library version kotlin platforms jvm
0
66,971
12,855,504,204
IssuesEvent
2020-07-09 05:26:05
intel/media-driver
https://api.github.com/repos/intel/media-driver
closed
[ffmpeg_vaapi][hevc_lp_encode] encode file has garbage on ICL
Encode Need Info
description: the color have some error on hevc lowpower encode cbr/vbr mode reproduce step: 1.ffmpeg -hwaccel vaapi -vaapi_device /dev/dri/renderD128 -v verbose -f rawvideo -pix_fmt yuv420p -s:v 352x288 -r:v 30 -i yuv/MOBILE_352x288_30_orig_01_352x288_I420.yuv -vf 'format=nv12,hwupload' -c:v hevc_vaapi -profile:v main -rc_mode CBR -g 30 -slices 1 -b:v 100k -maxrate 100k -low_power 1 -vframes 300 -y test.h265 2. observe the color have some garbage, screen shot below ![Capture](https://user-images.githubusercontent.com/29194447/62451186-56c65680-b7a0-11e9-9adb-8b572b469ec6.PNG) ![Capture2](https://user-images.githubusercontent.com/29194447/62451207-604fbe80-b7a0-11e9-9ffd-228857a3594e.PNG)
1.0
[ffmpeg_vaapi][hevc_lp_encode] encode file has garbage on ICL - description: the color have some error on hevc lowpower encode cbr/vbr mode reproduce step: 1.ffmpeg -hwaccel vaapi -vaapi_device /dev/dri/renderD128 -v verbose -f rawvideo -pix_fmt yuv420p -s:v 352x288 -r:v 30 -i yuv/MOBILE_352x288_30_orig_01_352x288_I420.yuv -vf 'format=nv12,hwupload' -c:v hevc_vaapi -profile:v main -rc_mode CBR -g 30 -slices 1 -b:v 100k -maxrate 100k -low_power 1 -vframes 300 -y test.h265 2. observe the color have some garbage, screen shot below ![Capture](https://user-images.githubusercontent.com/29194447/62451186-56c65680-b7a0-11e9-9adb-8b572b469ec6.PNG) ![Capture2](https://user-images.githubusercontent.com/29194447/62451207-604fbe80-b7a0-11e9-9ffd-228857a3594e.PNG)
non_process
encode file has garbage on icl description the color have some error on hevc lowpower encode cbr vbr mode reproduce step ffmpeg hwaccel vaapi vaapi device dev dri v verbose f rawvideo pix fmt s v r v i yuv mobile orig yuv vf format hwupload c v hevc vaapi profile v main rc mode cbr g slices b v maxrate low power vframes y test observe the color have some garbage screen shot below
0
18,075
24,091,419,899
IssuesEvent
2022-09-19 15:02:15
bazelbuild/bazel
https://api.github.com/repos/bazelbuild/bazel
closed
Select on host platform and execution platform
more data needed type: support / not a bug (process) team-Configurability untriaged
First of all, I apologize if I missed this info in the documentation. I have a use case where I want my code-generator program to be compiled slightly differently for target platform, host platform, and execution platform by setting different defines. This is a simplified example of what I'm trying to do. My target is aarch64, so that's straight forward. My host and execution platforms are the same x86 machine but the `CODEGEN_TARGET` define value depends on whether it's building for host or execution platform. ``` config_setting( name = "is_aarch64", constraint_values = [ "@platforms//cpu:aarch64", "@platforms//os:linux", ], ) config_setting( name = "is_x86_host", constraint_values = [ <---------------------------------+ "@platforms//cpu:x86", | "@platforms//os:linux", | # How to define a host platform ? | ], +---- How to make the distinction between host platform and execution platform? ) | | config_setting( | name = "is_x86_execution", | constraint_values = [ <---------------------------------+ "@platforms//cpu:x86", "@platforms//os:linux", # How to define an execution platform ? ], ) cc_library( name = "codeGen", hdrs = [ "include/codeGen.h", ], defines = select({ ":is_aarch64": ["CODEGEN_TARGET=aarch64"], ":is_x86_execution": ["CODEGEN_TARGET=aarch64"], # <----------------- how do I write a rule that applies to execution platform only? ":is_x86_host": ["CODEGEN_TARGET=x86"], }), includes = ["include"], src = [ "codeGen.cc", ], ) ``` I'm probably approaching it the wrong way. Any guidance would be appreciated.
1.0
Select on host platform and execution platform - First of all, I apologize if I missed this info in the documentation. I have a use case where I want my code-generator program to be compiled slightly differently for target platform, host platform, and execution platform by setting different defines. This is a simplified example of what I'm trying to do. My target is aarch64, so that's straight forward. My host and execution platforms are the same x86 machine but the `CODEGEN_TARGET` define value depends on whether it's building for host or execution platform. ``` config_setting( name = "is_aarch64", constraint_values = [ "@platforms//cpu:aarch64", "@platforms//os:linux", ], ) config_setting( name = "is_x86_host", constraint_values = [ <---------------------------------+ "@platforms//cpu:x86", | "@platforms//os:linux", | # How to define a host platform ? | ], +---- How to make the distinction between host platform and execution platform? ) | | config_setting( | name = "is_x86_execution", | constraint_values = [ <---------------------------------+ "@platforms//cpu:x86", "@platforms//os:linux", # How to define an execution platform ? ], ) cc_library( name = "codeGen", hdrs = [ "include/codeGen.h", ], defines = select({ ":is_aarch64": ["CODEGEN_TARGET=aarch64"], ":is_x86_execution": ["CODEGEN_TARGET=aarch64"], # <----------------- how do I write a rule that applies to execution platform only? ":is_x86_host": ["CODEGEN_TARGET=x86"], }), includes = ["include"], src = [ "codeGen.cc", ], ) ``` I'm probably approaching it the wrong way. Any guidance would be appreciated.
process
select on host platform and execution platform first of all i apologize if i missed this info in the documentation i have a use case where i want my code generator program to be compiled slightly differently for target platform host platform and execution platform by setting different defines this is a simplified example of what i m trying to do my target is so that s straight forward my host and execution platforms are the same machine but the codegen target define value depends on whether it s building for host or execution platform config setting name is constraint values platforms cpu platforms os linux config setting name is host constraint values platforms cpu platforms os linux how to define a host platform how to make the distinction between host platform and execution platform config setting name is execution constraint values platforms cpu platforms os linux how to define an execution platform cc library name codegen hdrs include codegen h defines select is is execution how do i write a rule that applies to execution platform only is host includes src codegen cc i m probably approaching it the wrong way any guidance would be appreciated
1
1,726
4,383,260,677
IssuesEvent
2016-08-07 12:20:04
nodejs/node-v0.x-archive
https://api.github.com/repos/nodejs/node-v0.x-archive
closed
`child_process.spawnSync()` throws an error when `options` argument is shared
child_process P-2 v0.12
Calling `child_process.spawnSync()` 3 times with shared `options` argument throws an error. `test.js`: ```javascript var spawn = require('child_process').spawnSync; var ls; var opts = { stdio: 'inherit' }; ls = spawn('ls', [], opts); ls = spawn('ls', [], opts); ls = spawn('ls', [], opts); ``` This bug has been fixed on io.js v1.1.0. See also: iojs/io.js#576, iojs/io.js#579
1.0
`child_process.spawnSync()` throws an error when `options` argument is shared - Calling `child_process.spawnSync()` 3 times with shared `options` argument throws an error. `test.js`: ```javascript var spawn = require('child_process').spawnSync; var ls; var opts = { stdio: 'inherit' }; ls = spawn('ls', [], opts); ls = spawn('ls', [], opts); ls = spawn('ls', [], opts); ``` This bug has been fixed on io.js v1.1.0. See also: iojs/io.js#576, iojs/io.js#579
process
child process spawnsync throws an error when options argument is shared calling child process spawnsync times with shared options argument throws an error test js javascript var spawn require child process spawnsync var ls var opts stdio inherit ls spawn ls opts ls spawn ls opts ls spawn ls opts this bug has been fixed on io js see also iojs io js iojs io js
1
294,825
25,408,955,674
IssuesEvent
2022-11-22 17:18:14
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
pkg/ccl/logictestccl/tests/3node-tenant/3node-tenant_test: TestTenantLogic_vectorize failed
C-test-failure O-robot T-sql-queries branch-release-22.2
pkg/ccl/logictestccl/tests/3node-tenant/3node-tenant_test.TestTenantLogic_vectorize [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/7637286?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/7637286?buildTab=artifacts#/) on release-22.2 @ [2a71a5cca1f66313fd39956f1a3db070f67ade15](https://github.com/cockroachdb/cockroach/commits/2a71a5cca1f66313fd39956f1a3db070f67ade15): ``` Slow failing tests: TestTenantLogic_vectorize - 62.49s Slow passing tests: TestTenantLogic_collatedstring - 140.42s TestTenantLogic_srfs - 117.82s TestTenantLogic_pg_builtins - 110.66s TestTenantLogic_fk - 84.98s TestTenantLogic_fk - 80.33s TestTenantLogic_alter_table - 66.39s TestTenantLogic_alter_table - 65.96s TestTenantLogic_upsert - 65.95s TestTenantLogic_alter_primary_key - 58.25s TestTenantLogic_alter_primary_key - 51.62s TestTenantLogic_hash_sharded_index - 44.45s TestTenantLogic_enums - 42.62s TestTenantLogic_drop_type - 42.45s TestTenantLogic_cascade - 41.90s TestTenantLogic_cascade - 41.63s TestTenantLogic_enums - 41.46s TestTenantLogic_drop_type - 40.83s TestTenantLogic_new_schema_changer - 39.15s TestTenantLogic_hash_sharded_index - 38.61s TestTenantLogic_new_schema_changer - 37.69s ``` <p>Parameters: <code>TAGS=bazel,gss</code> </p> <details><summary>Help</summary> <p> See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM) </p> </details> /cc @cockroachdb/sql-queries <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestTenantLogic_vectorize.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-21697
1.0
pkg/ccl/logictestccl/tests/3node-tenant/3node-tenant_test: TestTenantLogic_vectorize failed - pkg/ccl/logictestccl/tests/3node-tenant/3node-tenant_test.TestTenantLogic_vectorize [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/7637286?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/7637286?buildTab=artifacts#/) on release-22.2 @ [2a71a5cca1f66313fd39956f1a3db070f67ade15](https://github.com/cockroachdb/cockroach/commits/2a71a5cca1f66313fd39956f1a3db070f67ade15): ``` Slow failing tests: TestTenantLogic_vectorize - 62.49s Slow passing tests: TestTenantLogic_collatedstring - 140.42s TestTenantLogic_srfs - 117.82s TestTenantLogic_pg_builtins - 110.66s TestTenantLogic_fk - 84.98s TestTenantLogic_fk - 80.33s TestTenantLogic_alter_table - 66.39s TestTenantLogic_alter_table - 65.96s TestTenantLogic_upsert - 65.95s TestTenantLogic_alter_primary_key - 58.25s TestTenantLogic_alter_primary_key - 51.62s TestTenantLogic_hash_sharded_index - 44.45s TestTenantLogic_enums - 42.62s TestTenantLogic_drop_type - 42.45s TestTenantLogic_cascade - 41.90s TestTenantLogic_cascade - 41.63s TestTenantLogic_enums - 41.46s TestTenantLogic_drop_type - 40.83s TestTenantLogic_new_schema_changer - 39.15s TestTenantLogic_hash_sharded_index - 38.61s TestTenantLogic_new_schema_changer - 37.69s ``` <p>Parameters: <code>TAGS=bazel,gss</code> </p> <details><summary>Help</summary> <p> See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM) </p> </details> /cc @cockroachdb/sql-queries <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestTenantLogic_vectorize.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-21697
non_process
pkg ccl logictestccl tests tenant tenant test testtenantlogic vectorize failed pkg ccl logictestccl tests tenant tenant test testtenantlogic vectorize with on release slow failing tests testtenantlogic vectorize slow passing tests testtenantlogic collatedstring testtenantlogic srfs testtenantlogic pg builtins testtenantlogic fk testtenantlogic fk testtenantlogic alter table testtenantlogic alter table testtenantlogic upsert testtenantlogic alter primary key testtenantlogic alter primary key testtenantlogic hash sharded index testtenantlogic enums testtenantlogic drop type testtenantlogic cascade testtenantlogic cascade testtenantlogic enums testtenantlogic drop type testtenantlogic new schema changer testtenantlogic hash sharded index testtenantlogic new schema changer parameters tags bazel gss help see also cc cockroachdb sql queries jira issue crdb
0
78,079
15,569,914,491
IssuesEvent
2021-03-17 01:17:14
benchmarkdebricked/Sylius
https://api.github.com/repos/benchmarkdebricked/Sylius
opened
CVE-2021-20270 (Medium) detected in Pygments-2.4.2-py2.py3-none-any.whl
security vulnerability
## CVE-2021-20270 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pygments-2.4.2-py2.py3-none-any.whl</b></p></summary> <p>Pygments is a syntax highlighting package written in Python.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/5c/73/1dfa428150e3ccb0fa3e68db406e5be48698f2a979ccbcec795f28f44048/Pygments-2.4.2-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/5c/73/1dfa428150e3ccb0fa3e68db406e5be48698f2a979ccbcec795f28f44048/Pygments-2.4.2-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /Sylius/docs/requirements.txt</p> <p>Path to vulnerable library: teSource-ArchiveExtractor_422d378f-a3b0-4a00-adc7-c445a3bfd558/20190610083023_48873/20190610082952_depth_0/Pygments-2.4.2-py2.py3-none-any/pygments,teSource-ArchiveExtractor_422d378f-a3b0-4a00-adc7-c445a3bfd558/20190610082947_21509/20190610082915_depth_0/Pygments-2.4.2-py2.py3-none-any/pygments</p> <p> Dependency Hierarchy: - :x: **Pygments-2.4.2-py2.py3-none-any.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A security issue was found in python-pygments version 1.5 up to 2.7.3. When the SMLLexer gets fed the string "exception", it loops indefinitely, leading to denial of service. The issue is fixed in python-pygments version 2.7.4. <p>Publish Date: 2020-12-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20270>CVE-2021-20270</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922136">https://bugzilla.redhat.com/show_bug.cgi?id=1922136</a></p> <p>Release Date: 2020-12-18</p> <p>Fix Resolution: 2.7.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-20270 (Medium) detected in Pygments-2.4.2-py2.py3-none-any.whl - ## CVE-2021-20270 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pygments-2.4.2-py2.py3-none-any.whl</b></p></summary> <p>Pygments is a syntax highlighting package written in Python.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/5c/73/1dfa428150e3ccb0fa3e68db406e5be48698f2a979ccbcec795f28f44048/Pygments-2.4.2-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/5c/73/1dfa428150e3ccb0fa3e68db406e5be48698f2a979ccbcec795f28f44048/Pygments-2.4.2-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /Sylius/docs/requirements.txt</p> <p>Path to vulnerable library: teSource-ArchiveExtractor_422d378f-a3b0-4a00-adc7-c445a3bfd558/20190610083023_48873/20190610082952_depth_0/Pygments-2.4.2-py2.py3-none-any/pygments,teSource-ArchiveExtractor_422d378f-a3b0-4a00-adc7-c445a3bfd558/20190610082947_21509/20190610082915_depth_0/Pygments-2.4.2-py2.py3-none-any/pygments</p> <p> Dependency Hierarchy: - :x: **Pygments-2.4.2-py2.py3-none-any.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A security issue was found in python-pygments version 1.5 up to 2.7.3. When the SMLLexer gets fed the string "exception", it loops indefinitely, leading to denial of service. The issue is fixed in python-pygments version 2.7.4. <p>Publish Date: 2020-12-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20270>CVE-2021-20270</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922136">https://bugzilla.redhat.com/show_bug.cgi?id=1922136</a></p> <p>Release Date: 2020-12-18</p> <p>Fix Resolution: 2.7.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve medium detected in pygments none any whl cve medium severity vulnerability vulnerable library pygments none any whl pygments is a syntax highlighting package written in python library home page a href path to dependency file sylius docs requirements txt path to vulnerable library tesource archiveextractor depth pygments none any pygments tesource archiveextractor depth pygments none any pygments dependency hierarchy x pygments none any whl vulnerable library vulnerability details a security issue was found in python pygments version up to when the smllexer gets fed the string exception it loops indefinitely leading to denial of service the issue is fixed in python pygments version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
33,480
9,159,047,043
IssuesEvent
2019-03-01 00:44:57
xlayers/xlayers
https://api.github.com/repos/xlayers/xlayers
closed
Duplicate entries in CHANGELOG
Priority: Medium Scope: Build State: accepted community-help effort1: easy (hours) good first issue type: enhancement
We should figure out the root cause of this and find a fix to avoid this in the future.
1.0
Duplicate entries in CHANGELOG - We should figure out the root cause of this and find a fix to avoid this in the future.
non_process
duplicate entries in changelog we should figure out the root cause of this and find a fix to avoid this in the future
0
289,844
31,999,082,143
IssuesEvent
2023-09-21 11:05:14
uthrasri/frameworks_av_AOSP_4.2.2_r1
https://api.github.com/repos/uthrasri/frameworks_av_AOSP_4.2.2_r1
opened
CVE-2016-3821 (Critical) detected in multiple libraries
Mend: dependency security vulnerability
## CVE-2016-3821 - Critical Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> libmedia in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 has certain incorrect declarations, which allows remote attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference or memory corruption) via a crafted media file, aka internal bug 28166152. <p>Publish Date: 2016-08-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-3821>CVE-2016-3821</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-3821 (Critical) detected in multiple libraries - ## CVE-2016-3821 - Critical Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> libmedia in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 has certain incorrect declarations, which allows remote attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference or memory corruption) via a crafted media file, aka internal bug 28166152. <p>Publish Date: 2016-08-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-3821>CVE-2016-3821</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve critical detected in multiple libraries cve critical severity vulnerability vulnerable libraries vulnerability details libmedia in mediaserver in android x before x before x before and x before has certain incorrect declarations which allows remote attackers to execute arbitrary code or cause a denial of service null pointer dereference or memory corruption via a crafted media file aka internal bug publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with mend
0
8,779
11,900,732,541
IssuesEvent
2020-03-30 11:11:39
prisma/migrate
https://api.github.com/repos/prisma/migrate
reopened
preview025 causes migration error for Postgres db
process/candidate
## Bug description Unable to connect to postgres db with new `preview025`. Works with `preview024`. ## How to reproduce 1. Change schema. 2. Attempt to commit the changes: `npx prisma2 migrate save --experimental` ## Prisma information ``` $ npx prisma2 migrate save --experimental Error: Error in migration engine: Mar 27 08:44:36.142 INFO migration_engine: Starting migration engine RPC server git_hash="8814060fa684793b73d07dbfccd4b7777b3361ae" Mar 27 08:44:36.659 INFO quaint::single: Starting a postgresql pool with 1 connections. Mar 27 08:44:37.069 INFO tokio_postgres::connection: NOTICE: schema "public" already exists, skipping error Command failed with exit code 1. ``` ## Environment & setup - macOS - PostgreSQL - Prisma preview025 - Node.js version: 12.6.0
1.0
preview025 causes migration error for Postgres db - ## Bug description Unable to connect to postgres db with new `preview025`. Works with `preview024`. ## How to reproduce 1. Change schema. 2. Attempt to commit the changes: `npx prisma2 migrate save --experimental` ## Prisma information ``` $ npx prisma2 migrate save --experimental Error: Error in migration engine: Mar 27 08:44:36.142 INFO migration_engine: Starting migration engine RPC server git_hash="8814060fa684793b73d07dbfccd4b7777b3361ae" Mar 27 08:44:36.659 INFO quaint::single: Starting a postgresql pool with 1 connections. Mar 27 08:44:37.069 INFO tokio_postgres::connection: NOTICE: schema "public" already exists, skipping error Command failed with exit code 1. ``` ## Environment & setup - macOS - PostgreSQL - Prisma preview025 - Node.js version: 12.6.0
process
causes migration error for postgres db bug description unable to connect to postgres db with new works with how to reproduce change schema attempt to commit the changes npx migrate save experimental prisma information npx migrate save experimental error error in migration engine mar info migration engine starting migration engine rpc server git hash mar info quaint single starting a postgresql pool with connections mar info tokio postgres connection notice schema public already exists skipping error command failed with exit code environment setup macos postgresql prisma node js version
1
4,719
7,552,682,610
IssuesEvent
2018-04-19 01:46:35
UnbFeelings/unb-feelings-docs
https://api.github.com/repos/UnbFeelings/unb-feelings-docs
opened
[Não Conformidade] Backlog da Release
Desenvolvimento Processo invalid
@UnbFeelings/devel A auditoria do [Backlog da Release](https://github.com/UnbFeelings/unb-feelings-docs/wiki/Processo#2012-planejar-release), que é um produto da atividade de **Planejar release**, foi feita com base nos [critérios](https://github.com/UnbFeelings/unb-feelings-GQA/wiki/Crit%C3%A9rios-de-Avalia%C3%A7%C3%A3o-e-T%C3%A9cnicas-de-Auditoria#backlog-da-release) pré-estabelecidos para poder verificar se o Processo foi utilizado. O resultado da auditoria pode ser acessado através da seguinte página: [Auditoria Backlog](https://github.com/UnbFeelings/unb-feelings-GQA/wiki/Auditoria-Backlog-da-Release-Ciclo-1). ### Descrição Foi identificado o principal motivo da não-adesão ao processo: * Problema de comunicação (externa/interna); #### Recomendações Conforme o processo, é necessário que seja documentado o Backlog da release. Por a wiki ser a ferramenta para documentar artefatos, é importante que esteja na mesma. Além disso, deve-se estabelecer com urgência uma nova reunião entre equipe de processos e desenvolvimento para identificar atividades desnecessárias no processo e principalmente artefatos que não agregam valor para o cliente. Ressalta-se ainda levar em conta a carga horária de trabalho efetivo de cada membro do desenvolvimento para propor melhorias ao processo que se adequem a carga horária dos desenvolvedores para que o processo não torne suas atividades tão custoso. E que engaje de alguma forma a equipe de processo e de desenvolvimento, porque é bem visível a falta de comunicação e alinhamento de todos. ### Detalhes **Autor:** Naiara Andrade **Tipo:** Processo **Prazo:** Seria de 3 dia para a correção, pela Matriz GUT. Mas como depende dos horários das aulas, seria 6 dias.
1.0
[Não Conformidade] Backlog da Release - @UnbFeelings/devel A auditoria do [Backlog da Release](https://github.com/UnbFeelings/unb-feelings-docs/wiki/Processo#2012-planejar-release), que é um produto da atividade de **Planejar release**, foi feita com base nos [critérios](https://github.com/UnbFeelings/unb-feelings-GQA/wiki/Crit%C3%A9rios-de-Avalia%C3%A7%C3%A3o-e-T%C3%A9cnicas-de-Auditoria#backlog-da-release) pré-estabelecidos para poder verificar se o Processo foi utilizado. O resultado da auditoria pode ser acessado através da seguinte página: [Auditoria Backlog](https://github.com/UnbFeelings/unb-feelings-GQA/wiki/Auditoria-Backlog-da-Release-Ciclo-1). ### Descrição Foi identificado o principal motivo da não-adesão ao processo: * Problema de comunicação (externa/interna); #### Recomendações Conforme o processo, é necessário que seja documentado o Backlog da release. Por a wiki ser a ferramenta para documentar artefatos, é importante que esteja na mesma. Além disso, deve-se estabelecer com urgência uma nova reunião entre equipe de processos e desenvolvimento para identificar atividades desnecessárias no processo e principalmente artefatos que não agregam valor para o cliente. Ressalta-se ainda levar em conta a carga horária de trabalho efetivo de cada membro do desenvolvimento para propor melhorias ao processo que se adequem a carga horária dos desenvolvedores para que o processo não torne suas atividades tão custoso. E que engaje de alguma forma a equipe de processo e de desenvolvimento, porque é bem visível a falta de comunicação e alinhamento de todos. ### Detalhes **Autor:** Naiara Andrade **Tipo:** Processo **Prazo:** Seria de 3 dia para a correção, pela Matriz GUT. Mas como depende dos horários das aulas, seria 6 dias.
process
backlog da release unbfeelings devel a auditoria do que é um produto da atividade de planejar release foi feita com base nos pré estabelecidos para poder verificar se o processo foi utilizado o resultado da auditoria pode ser acessado através da seguinte página descrição foi identificado o principal motivo da não adesão ao processo problema de comunicação externa interna recomendações conforme o processo é necessário que seja documentado o backlog da release por a wiki ser a ferramenta para documentar artefatos é importante que esteja na mesma além disso deve se estabelecer com urgência uma nova reunião entre equipe de processos e desenvolvimento para identificar atividades desnecessárias no processo e principalmente artefatos que não agregam valor para o cliente ressalta se ainda levar em conta a carga horária de trabalho efetivo de cada membro do desenvolvimento para propor melhorias ao processo que se adequem a carga horária dos desenvolvedores para que o processo não torne suas atividades tão custoso e que engaje de alguma forma a equipe de processo e de desenvolvimento porque é bem visível a falta de comunicação e alinhamento de todos detalhes autor naiara andrade tipo processo prazo seria de dia para a correção pela matriz gut mas como depende dos horários das aulas seria dias
1
23,812
16,600,553,772
IssuesEvent
2021-06-01 18:48:47
sciencehistory/scihist_digicoll
https://api.github.com/repos/sciencehistory/scihist_digicoll
closed
Monitoring solution
infrastructure
We are shutting down our self-hosted netdata, without a sysadmin on staff we don't think it is sustainable to maintain it. (Also there were diverse opinions of how successful netadata was as a solution among staff :) ). But we do need some monitoring solution in order to keep our systems reliable in a professional way. Perhaps lean more heavily on AWS cloudwatch? Perhaps something else. Things we want to be alerted to (@eddierubeiz et al add more?): * disks approaching full. (That took us down a few times with our sufia app, although hasn't recently. But we want an alarm if any of our EC2 block storage disk is appraoching being full).
1.0
Monitoring solution - We are shutting down our self-hosted netdata, without a sysadmin on staff we don't think it is sustainable to maintain it. (Also there were diverse opinions of how successful netadata was as a solution among staff :) ). But we do need some monitoring solution in order to keep our systems reliable in a professional way. Perhaps lean more heavily on AWS cloudwatch? Perhaps something else. Things we want to be alerted to (@eddierubeiz et al add more?): * disks approaching full. (That took us down a few times with our sufia app, although hasn't recently. But we want an alarm if any of our EC2 block storage disk is appraoching being full).
non_process
monitoring solution we are shutting down our self hosted netdata without a sysadmin on staff we don t think it is sustainable to maintain it also there were diverse opinions of how successful netadata was as a solution among staff but we do need some monitoring solution in order to keep our systems reliable in a professional way perhaps lean more heavily on aws cloudwatch perhaps something else things we want to be alerted to eddierubeiz et al add more disks approaching full that took us down a few times with our sufia app although hasn t recently but we want an alarm if any of our block storage disk is appraoching being full
0
152,114
13,445,439,395
IssuesEvent
2020-09-08 11:24:32
tsungtingdu/hackmd_clone_react
https://api.github.com/repos/tsungtingdu/hackmd_clone_react
opened
Documents
documentation
Repo * Front-end: https://github.com/tsungtingdu/hackmd_clone_react * Back-end: https://github.com/tsungtingdu/hackmd_clone_api_server Doc * Project note: https://hackmd.io/@tsungtingdu/BJKgMGcmv * Meeting note: https://hackmd.io/@tsungtingdu/B1wsgQsXv * Frontend design: https://docs.google.com/presentation/d/1GVKVaO1E7SzeVXaBNY9rAXo68FEGxjQq5z11pnU_uOE/edit?usp=sharing
1.0
Documents - Repo * Front-end: https://github.com/tsungtingdu/hackmd_clone_react * Back-end: https://github.com/tsungtingdu/hackmd_clone_api_server Doc * Project note: https://hackmd.io/@tsungtingdu/BJKgMGcmv * Meeting note: https://hackmd.io/@tsungtingdu/B1wsgQsXv * Frontend design: https://docs.google.com/presentation/d/1GVKVaO1E7SzeVXaBNY9rAXo68FEGxjQq5z11pnU_uOE/edit?usp=sharing
non_process
documents repo front end back end doc project note meeting note frontend design
0
19,255
25,452,428,489
IssuesEvent
2022-11-24 11:31:29
deepset-ai/haystack
https://api.github.com/repos/deepset-ai/haystack
closed
PDFToTextConverter doesn't seem to preserve any sort of paragraph markings (\n\n)
topic:preprocessing
**Describe the bug** I've tried putting various PDFs through the PDFToTextConverter and regardless of how the paragraphs are spaced (even with triple spaces between them), they end up just separated by a single `\n`. If I run it with `keep_physical_layout=True`, it does seem to do better. However, this is typically very undesirable as it doesn't handle columns etc... Conversely, Tika does seem to mark paragraph endings with `\n\n\` **Expected behavior** I would expect some ability to mark paragraphs, so that split by `"passage"` and other things could be possible, which would make for better embeddings of related information. I don't know if this is simply a limitation inherent to pdftotext, or if there's some config that could be done to make the output more useful. **To Reproduce** You could run this (or probably any) pdf through the TikaConverter and PDFToTextConverter. [tika.pdf](https://github.com/deepset-ai/haystack/files/9602702/tika.pdf)
1.0
PDFToTextConverter doesn't seem to preserve any sort of paragraph markings (\n\n) - **Describe the bug** I've tried putting various PDFs through the PDFToTextConverter and regardless of how the paragraphs are spaced (even with triple spaces between them), they end up just separated by a single `\n`. If I run it with `keep_physical_layout=True`, it does seem to do better. However, this is typically very undesirable as it doesn't handle columns etc... Conversely, Tika does seem to mark paragraph endings with `\n\n\` **Expected behavior** I would expect some ability to mark paragraphs, so that split by `"passage"` and other things could be possible, which would make for better embeddings of related information. I don't know if this is simply a limitation inherent to pdftotext, or if there's some config that could be done to make the output more useful. **To Reproduce** You could run this (or probably any) pdf through the TikaConverter and PDFToTextConverter. [tika.pdf](https://github.com/deepset-ai/haystack/files/9602702/tika.pdf)
process
pdftotextconverter doesn t seem to preserve any sort of paragraph markings n n describe the bug i ve tried putting various pdfs through the pdftotextconverter and regardless of how the paragraphs are spaced even with triple spaces between them they end up just separated by a single n if i run it with keep physical layout true it does seem to do better however this is typically very undesirable as it doesn t handle columns etc conversely tika does seem to mark paragraph endings with n n expected behavior i would expect some ability to mark paragraphs so that split by passage and other things could be possible which would make for better embeddings of related information i don t know if this is simply a limitation inherent to pdftotext or if there s some config that could be done to make the output more useful to reproduce you could run this or probably any pdf through the tikaconverter and pdftotextconverter
1
51,084
12,676,625,731
IssuesEvent
2020-06-19 05:47:24
turnkeylinux/tracker
https://api.github.com/repos/turnkeylinux/tracker
closed
Moodle - dashboard error message on log in
build invalid moodle
Upstream error report: https://tracker.moodle.org/browse/MDL-68700 I'll put this appliance aside for now...
1.0
Moodle - dashboard error message on log in - Upstream error report: https://tracker.moodle.org/browse/MDL-68700 I'll put this appliance aside for now...
non_process
moodle dashboard error message on log in upstream error report i ll put this appliance aside for now
0
20,319
26,960,784,842
IssuesEvent
2023-02-08 18:01:15
googleapis/google-cloud-dotnet
https://api.github.com/repos/googleapis/google-cloud-dotnet
closed
Warning: a recent release failed
type: process
The following release PRs may have failed: * #9855 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9857 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9859 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9860 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9854 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9858 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9853 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9841 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9842 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9843 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9844 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9845 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9846 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9847 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9848 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9849 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9850 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9851 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9852 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
1.0
Warning: a recent release failed - The following release PRs may have failed: * #9855 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9857 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9859 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9860 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9854 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9858 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9853 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9841 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9842 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9843 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9844 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9845 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9846 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9847 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9848 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9849 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9850 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9851 - The release job is 'autorelease: tagged', but expected 'autorelease: published'. * #9852 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
process
warning a recent release failed the following release prs may have failed the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published
1
21,717
30,219,123,753
IssuesEvent
2023-07-05 17:52:28
esmero/ami
https://api.github.com/repos/esmero/ami
opened
AMI remote file Mimetype (yes again) renames extensions
enhancement Release duty File processing CSV Processing
# What? This is not an error per se. Using the normalized extension based on the actual remote `Mime Type` is OK. But for a specific need, 3D Models, where the exact name of a texture inside an Material file requires a 1:1 match this breaks things. Need to debug exactly where this is happening bc reading my code I assumed I was already doing this, doing a reverse mapping from MimeType to extension, a normal from extension to `Mime Type` and only if both differed I used the calculated one. But there might be an `IF` or a `logic conditional` that is always ending in renaming. The specific case is JPG v/s JPEG
2.0
AMI remote file Mimetype (yes again) renames extensions - # What? This is not an error per se. Using the normalized extension based on the actual remote `Mime Type` is OK. But for a specific need, 3D Models, where the exact name of a texture inside an Material file requires a 1:1 match this breaks things. Need to debug exactly where this is happening bc reading my code I assumed I was already doing this, doing a reverse mapping from MimeType to extension, a normal from extension to `Mime Type` and only if both differed I used the calculated one. But there might be an `IF` or a `logic conditional` that is always ending in renaming. The specific case is JPG v/s JPEG
process
ami remote file mimetype yes again renames extensions what this is not an error per se using the normalized extension based on the actual remote mime type is ok but for a specific need models where the exact name of a texture inside an material file requires a match this breaks things need to debug exactly where this is happening bc reading my code i assumed i was already doing this doing a reverse mapping from mimetype to extension a normal from extension to mime type and only if both differed i used the calculated one but there might be an if or a logic conditional that is always ending in renaming the specific case is jpg v s jpeg
1
237,931
7,768,387,272
IssuesEvent
2018-06-03 17:27:29
InfiniteFlightAirportEditing/Navigation
https://api.github.com/repos/InfiniteFlightAirportEditing/Navigation
opened
LRCL
ILS Priority ILS Error
# Summary of Navigation issue: (ILS, Waypoints, etc.) Runway moved/changed. # Runway(s) with ILS: (If any) 25 # References: (Official sources/charts) http://vau.aero/navdb/chart/LRCL.pdf
1.0
LRCL - # Summary of Navigation issue: (ILS, Waypoints, etc.) Runway moved/changed. # Runway(s) with ILS: (If any) 25 # References: (Official sources/charts) http://vau.aero/navdb/chart/LRCL.pdf
non_process
lrcl summary of navigation issue ils waypoints etc runway moved changed runway s with ils if any references official sources charts
0
241,904
26,256,986,546
IssuesEvent
2023-01-06 02:13:41
AlexRogalskiy/object-mappers-playground
https://api.github.com/repos/AlexRogalskiy/object-mappers-playground
opened
CVE-2022-1471 (High) detected in snakeyaml-1.14.jar
security vulnerability
## CVE-2022-1471 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.14.jar</b></p></summary> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="http://www.snakeyaml.org">http://www.snakeyaml.org</a></p> <p>Path to dependency file: /modules/objectmappers-smooks/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.14/snakeyaml-1.14.jar</p> <p> Dependency Hierarchy: - milyn-smooks-all-1.7.1.jar (Root Library) - milyn-smooks-yaml-1.7.1.jar - :x: **snakeyaml-1.14.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/object-mappers-playground/commit/f8ec948423b9447cfa8c211fc94d011f6f24e137">f8ec948423b9447cfa8c211fc94d011f6f24e137</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. <p>Publish Date: 2022-12-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-1471>CVE-2022-1471</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-1471 (High) detected in snakeyaml-1.14.jar - ## CVE-2022-1471 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.14.jar</b></p></summary> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="http://www.snakeyaml.org">http://www.snakeyaml.org</a></p> <p>Path to dependency file: /modules/objectmappers-smooks/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.14/snakeyaml-1.14.jar</p> <p> Dependency Hierarchy: - milyn-smooks-all-1.7.1.jar (Root Library) - milyn-smooks-yaml-1.7.1.jar - :x: **snakeyaml-1.14.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/object-mappers-playground/commit/f8ec948423b9447cfa8c211fc94d011f6f24e137">f8ec948423b9447cfa8c211fc94d011f6f24e137</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. <p>Publish Date: 2022-12-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-1471>CVE-2022-1471</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve high detected in snakeyaml jar cve high severity vulnerability vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file modules objectmappers smooks pom xml path to vulnerable library home wss scanner repository org yaml snakeyaml snakeyaml jar dependency hierarchy milyn smooks all jar root library milyn smooks yaml jar x snakeyaml jar vulnerable library found in head commit a href found in base branch master vulnerability details snakeyaml s constructor class does not restrict types which can be instantiated during deserialization deserializing yaml content provided by an attacker can lead to remote code execution we recommend using snakeyaml s safeconsturctor when parsing untrusted content to restrict deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with mend
0
15,273
19,254,203,441
IssuesEvent
2021-12-09 09:32:45
opensafely-core/job-server
https://api.github.com/repos/opensafely-core/job-server
closed
Sharing application view with other internal reviewers
application-process
I need to be able share and discuss applications with @brianmackenna @alexwalkerepi (and BenG). This page, for example, https://jobs.opensafely.org/staff/applications/c058/ is not visible to Alex (and I assume to others) - 403 permission denied error. Could they have access? In time they should also be able to approve the applications thus I am not concerned they can tick the approved section.
1.0
Sharing application view with other internal reviewers - I need to be able share and discuss applications with @brianmackenna @alexwalkerepi (and BenG). This page, for example, https://jobs.opensafely.org/staff/applications/c058/ is not visible to Alex (and I assume to others) - 403 permission denied error. Could they have access? In time they should also be able to approve the applications thus I am not concerned they can tick the approved section.
process
sharing application view with other internal reviewers i need to be able share and discuss applications with brianmackenna alexwalkerepi and beng this page for example is not visible to alex and i assume to others permission denied error could they have access in time they should also be able to approve the applications thus i am not concerned they can tick the approved section
1
436,472
12,550,692,023
IssuesEvent
2020-06-06 12:06:19
googleapis/elixir-google-api
https://api.github.com/repos/googleapis/elixir-google-api
opened
Synthesis failed for AdExperienceReport
api: adexperiencereport autosynth failure priority: p1 type: bug
Hello! Autosynth couldn't regenerate AdExperienceReport. :broken_heart: Here's the output from running `synth.py`: ``` 2020-06-06 05:05:35,259 autosynth [INFO] > logs will be written to: /tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api 2020-06-06 05:05:36,510 autosynth [DEBUG] > Running: git config --global core.excludesfile /home/kbuilder/.autosynth-gitignore 2020-06-06 05:05:36,514 autosynth [DEBUG] > Running: git config user.name yoshi-automation 2020-06-06 05:05:36,517 autosynth [DEBUG] > Running: git config user.email yoshi-automation@google.com 2020-06-06 05:05:36,521 autosynth [DEBUG] > Running: git config push.default simple 2020-06-06 05:05:36,525 autosynth [DEBUG] > Running: git branch -f autosynth-adexperiencereport 2020-06-06 05:05:36,530 autosynth [DEBUG] > Running: git checkout autosynth-adexperiencereport Switched to branch 'autosynth-adexperiencereport' 2020-06-06 05:05:36,799 autosynth [INFO] > Running synthtool 2020-06-06 05:05:36,799 autosynth [INFO] > ['/tmpfs/src/github/synthtool/env/bin/python3', '-m', 'synthtool', '--metadata', 'clients/ad_experience_report/synth.metadata', 'synth.py', '--'] 2020-06-06 05:05:36,802 autosynth [DEBUG] > Running: /tmpfs/src/github/synthtool/env/bin/python3 -m synthtool --metadata clients/ad_experience_report/synth.metadata synth.py -- AdExperienceReport tee: /tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api: Is a directory 2020-06-06 05:05:37,068 synthtool [DEBUG] > Executing /home/kbuilder/.cache/synthtool/elixir-google-api/synth.py. On branch autosynth-adexperiencereport nothing to commit, working tree clean 2020-06-06 05:05:39,080 synthtool [DEBUG] > Running: docker run --rm -v/tmpfs/tmp/tmp0iwknc7l/repo:/workspace -v/var/run/docker.sock:/var/run/docker.sock -e USER_GROUP=1000:1000 -w /workspace gcr.io/cloud-devrel-public-resources/elixir19 scripts/generate_client.sh AdExperienceReport DEBUG:synthtool:Running: docker run --rm -v/tmpfs/tmp/tmp0iwknc7l/repo:/workspace -v/var/run/docker.sock:/var/run/docker.sock -e USER_GROUP=1000:1000 -w /workspace gcr.io/cloud-devrel-public-resources/elixir19 scripts/generate_client.sh AdExperienceReport /workspace /workspace The mix.lock file was generated with a newer version of Hex. Update your client by running `mix local.hex` to avoid losing data. Resolving Hex dependencies... Dependency resolution completed: Unchanged: certifi 2.5.1 google_api_discovery 0.7.0 google_gax 0.3.2 hackney 1.15.2 idna 6.0.0 jason 1.2.1 metrics 1.0.1 mime 1.3.1 mimerl 1.2.0 oauth2 0.9.4 parse_trans 3.3.0 poison 3.1.0 ssl_verify_fun 1.1.5 temp 0.4.7 tesla 1.3.3 unicode_util_compat 0.4.1 * Getting google_api_discovery (Hex package) * Getting tesla (Hex package) * Getting oauth2 (Hex package) * Getting temp (Hex package) * Getting jason (Hex package) * Getting poison (Hex package) * Getting hackney (Hex package) * Getting certifi (Hex package) * Getting idna (Hex package) * Getting metrics (Hex package) * Getting mimerl (Hex package) * Getting ssl_verify_fun (Hex package) * Getting unicode_util_compat (Hex package) * Getting parse_trans (Hex package) * Getting mime (Hex package) * Getting google_gax (Hex package) The mix.lock file was generated with a newer version of Hex. Update your client by running `mix local.hex` to avoid losing data. ==> temp Compiling 3 files (.ex) Generated temp app ===> Compiling parse_trans ===> Compiling mimerl ===> Compiling metrics ===> Compiling unicode_util_compat ===> Compiling idna ==> jason Compiling 8 files (.ex) Generated jason app warning: String.strip/1 is deprecated. Use String.trim/1 instead /workspace/deps/poison/mix.exs:4 ==> poison Compiling 4 files (.ex) warning: Integer.to_char_list/2 is deprecated. Use Integer.to_charlist/2 instead lib/poison/encoder.ex:173 Generated poison app ==> ssl_verify_fun Compiling 7 files (.erl) Generated ssl_verify_fun app ===> Compiling certifi ===> Compiling hackney ==> oauth2 Compiling 13 files (.ex) Generated oauth2 app ==> mime Compiling 2 files (.ex) Generated mime app ==> tesla Compiling 26 files (.ex) Generated tesla app ==> google_gax Compiling 5 files (.ex) Generated google_gax app ==> google_api_discovery Compiling 21 files (.ex) Generated google_api_discovery app ==> google_apis Compiling 27 files (.ex) warning: System.cwd/0 is deprecated. Use File.cwd/0 instead lib/google_apis/publisher.ex:24 Generated google_apis app 12:06:14.782 [info] FETCHING: https://adexperiencereport.googleapis.com/$discovery/GOOGLE_REST_SIMPLE_URI?version=v1 12:06:14.956 [info] FOUND: https://adexperiencereport.googleapis.com/$discovery/GOOGLE_REST_SIMPLE_URI?version=v1 Revision check: old=20200504, new=20200601, generating=true Creating leading directories Writing PlatformSummary to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/platform_summary.ex. Writing SiteSummaryResponse to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/site_summary_response.ex. Writing ViolatingSitesResponse to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/violating_sites_response.ex. Writing Sites to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/api/sites.ex. Writing ViolatingSites to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/api/violating_sites.ex. Writing connection.ex. Writing metadata.ex. Writing mix.exs Writing README.md Writing LICENSE Writing .gitignore Writing config/config.exs Writing test/test_helper.exs 12:06:15.351 [info] Found only discovery_revision and/or formatting changes. Not significant enough for a PR. fixing file permissions 2020-06-06 05:06:18,471 synthtool [DEBUG] > Wrote metadata to clients/ad_experience_report/synth.metadata. DEBUG:synthtool:Wrote metadata to clients/ad_experience_report/synth.metadata. 2020-06-06 05:06:18,500 autosynth [DEBUG] > Running: git clean -fdx Removing __pycache__/ Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 615, in <module> main() File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 476, in main return _inner_main(temp_dir) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 555, in _inner_main ).synthesize(base_synth_log_path) File "/tmpfs/src/github/synthtool/autosynth/synthesizer.py", line 121, in synthesize with open(log_file_path, "rt") as fp: IsADirectoryError: [Errno 21] Is a directory: '/tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api' ``` Google internal developers can see the full log [here](http://sponge2/results/invocations/567e2ab8-5e4f-4fb0-8bae-9d0cc90aa1af/targets/github%2Fsynthtool;config=default/tests;query=elixir-google-api;failed=false).
1.0
Synthesis failed for AdExperienceReport - Hello! Autosynth couldn't regenerate AdExperienceReport. :broken_heart: Here's the output from running `synth.py`: ``` 2020-06-06 05:05:35,259 autosynth [INFO] > logs will be written to: /tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api 2020-06-06 05:05:36,510 autosynth [DEBUG] > Running: git config --global core.excludesfile /home/kbuilder/.autosynth-gitignore 2020-06-06 05:05:36,514 autosynth [DEBUG] > Running: git config user.name yoshi-automation 2020-06-06 05:05:36,517 autosynth [DEBUG] > Running: git config user.email yoshi-automation@google.com 2020-06-06 05:05:36,521 autosynth [DEBUG] > Running: git config push.default simple 2020-06-06 05:05:36,525 autosynth [DEBUG] > Running: git branch -f autosynth-adexperiencereport 2020-06-06 05:05:36,530 autosynth [DEBUG] > Running: git checkout autosynth-adexperiencereport Switched to branch 'autosynth-adexperiencereport' 2020-06-06 05:05:36,799 autosynth [INFO] > Running synthtool 2020-06-06 05:05:36,799 autosynth [INFO] > ['/tmpfs/src/github/synthtool/env/bin/python3', '-m', 'synthtool', '--metadata', 'clients/ad_experience_report/synth.metadata', 'synth.py', '--'] 2020-06-06 05:05:36,802 autosynth [DEBUG] > Running: /tmpfs/src/github/synthtool/env/bin/python3 -m synthtool --metadata clients/ad_experience_report/synth.metadata synth.py -- AdExperienceReport tee: /tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api: Is a directory 2020-06-06 05:05:37,068 synthtool [DEBUG] > Executing /home/kbuilder/.cache/synthtool/elixir-google-api/synth.py. On branch autosynth-adexperiencereport nothing to commit, working tree clean 2020-06-06 05:05:39,080 synthtool [DEBUG] > Running: docker run --rm -v/tmpfs/tmp/tmp0iwknc7l/repo:/workspace -v/var/run/docker.sock:/var/run/docker.sock -e USER_GROUP=1000:1000 -w /workspace gcr.io/cloud-devrel-public-resources/elixir19 scripts/generate_client.sh AdExperienceReport DEBUG:synthtool:Running: docker run --rm -v/tmpfs/tmp/tmp0iwknc7l/repo:/workspace -v/var/run/docker.sock:/var/run/docker.sock -e USER_GROUP=1000:1000 -w /workspace gcr.io/cloud-devrel-public-resources/elixir19 scripts/generate_client.sh AdExperienceReport /workspace /workspace The mix.lock file was generated with a newer version of Hex. Update your client by running `mix local.hex` to avoid losing data. Resolving Hex dependencies... Dependency resolution completed: Unchanged: certifi 2.5.1 google_api_discovery 0.7.0 google_gax 0.3.2 hackney 1.15.2 idna 6.0.0 jason 1.2.1 metrics 1.0.1 mime 1.3.1 mimerl 1.2.0 oauth2 0.9.4 parse_trans 3.3.0 poison 3.1.0 ssl_verify_fun 1.1.5 temp 0.4.7 tesla 1.3.3 unicode_util_compat 0.4.1 * Getting google_api_discovery (Hex package) * Getting tesla (Hex package) * Getting oauth2 (Hex package) * Getting temp (Hex package) * Getting jason (Hex package) * Getting poison (Hex package) * Getting hackney (Hex package) * Getting certifi (Hex package) * Getting idna (Hex package) * Getting metrics (Hex package) * Getting mimerl (Hex package) * Getting ssl_verify_fun (Hex package) * Getting unicode_util_compat (Hex package) * Getting parse_trans (Hex package) * Getting mime (Hex package) * Getting google_gax (Hex package) The mix.lock file was generated with a newer version of Hex. Update your client by running `mix local.hex` to avoid losing data. ==> temp Compiling 3 files (.ex) Generated temp app ===> Compiling parse_trans ===> Compiling mimerl ===> Compiling metrics ===> Compiling unicode_util_compat ===> Compiling idna ==> jason Compiling 8 files (.ex) Generated jason app warning: String.strip/1 is deprecated. Use String.trim/1 instead /workspace/deps/poison/mix.exs:4 ==> poison Compiling 4 files (.ex) warning: Integer.to_char_list/2 is deprecated. Use Integer.to_charlist/2 instead lib/poison/encoder.ex:173 Generated poison app ==> ssl_verify_fun Compiling 7 files (.erl) Generated ssl_verify_fun app ===> Compiling certifi ===> Compiling hackney ==> oauth2 Compiling 13 files (.ex) Generated oauth2 app ==> mime Compiling 2 files (.ex) Generated mime app ==> tesla Compiling 26 files (.ex) Generated tesla app ==> google_gax Compiling 5 files (.ex) Generated google_gax app ==> google_api_discovery Compiling 21 files (.ex) Generated google_api_discovery app ==> google_apis Compiling 27 files (.ex) warning: System.cwd/0 is deprecated. Use File.cwd/0 instead lib/google_apis/publisher.ex:24 Generated google_apis app 12:06:14.782 [info] FETCHING: https://adexperiencereport.googleapis.com/$discovery/GOOGLE_REST_SIMPLE_URI?version=v1 12:06:14.956 [info] FOUND: https://adexperiencereport.googleapis.com/$discovery/GOOGLE_REST_SIMPLE_URI?version=v1 Revision check: old=20200504, new=20200601, generating=true Creating leading directories Writing PlatformSummary to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/platform_summary.ex. Writing SiteSummaryResponse to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/site_summary_response.ex. Writing ViolatingSitesResponse to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/violating_sites_response.ex. Writing Sites to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/api/sites.ex. Writing ViolatingSites to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/api/violating_sites.ex. Writing connection.ex. Writing metadata.ex. Writing mix.exs Writing README.md Writing LICENSE Writing .gitignore Writing config/config.exs Writing test/test_helper.exs 12:06:15.351 [info] Found only discovery_revision and/or formatting changes. Not significant enough for a PR. fixing file permissions 2020-06-06 05:06:18,471 synthtool [DEBUG] > Wrote metadata to clients/ad_experience_report/synth.metadata. DEBUG:synthtool:Wrote metadata to clients/ad_experience_report/synth.metadata. 2020-06-06 05:06:18,500 autosynth [DEBUG] > Running: git clean -fdx Removing __pycache__/ Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 615, in <module> main() File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 476, in main return _inner_main(temp_dir) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 555, in _inner_main ).synthesize(base_synth_log_path) File "/tmpfs/src/github/synthtool/autosynth/synthesizer.py", line 121, in synthesize with open(log_file_path, "rt") as fp: IsADirectoryError: [Errno 21] Is a directory: '/tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api' ``` Google internal developers can see the full log [here](http://sponge2/results/invocations/567e2ab8-5e4f-4fb0-8bae-9d0cc90aa1af/targets/github%2Fsynthtool;config=default/tests;query=elixir-google-api;failed=false).
non_process
synthesis failed for adexperiencereport hello autosynth couldn t regenerate adexperiencereport broken heart here s the output from running synth py autosynth logs will be written to tmpfs src github synthtool logs googleapis elixir google api autosynth running git config global core excludesfile home kbuilder autosynth gitignore autosynth running git config user name yoshi automation autosynth running git config user email yoshi automation google com autosynth running git config push default simple autosynth running git branch f autosynth adexperiencereport autosynth running git checkout autosynth adexperiencereport switched to branch autosynth adexperiencereport autosynth running synthtool autosynth autosynth running tmpfs src github synthtool env bin m synthtool metadata clients ad experience report synth metadata synth py adexperiencereport tee tmpfs src github synthtool logs googleapis elixir google api is a directory synthtool executing home kbuilder cache synthtool elixir google api synth py on branch autosynth adexperiencereport nothing to commit working tree clean synthtool running docker run rm v tmpfs tmp repo workspace v var run docker sock var run docker sock e user group w workspace gcr io cloud devrel public resources scripts generate client sh adexperiencereport debug synthtool running docker run rm v tmpfs tmp repo workspace v var run docker sock var run docker sock e user group w workspace gcr io cloud devrel public resources scripts generate client sh adexperiencereport workspace workspace  mix lock file was generated with a newer version of hex update your client by running mix local hex to avoid losing data  resolving hex dependencies dependency resolution completed unchanged certifi google api discovery google gax hackney idna jason metrics mime mimerl parse trans poison ssl verify fun temp tesla unicode util compat getting google api discovery hex package getting tesla hex package getting hex package getting temp hex package getting jason hex package getting poison hex package getting hackney hex package getting certifi hex package getting idna hex package getting metrics hex package getting mimerl hex package getting ssl verify fun hex package getting unicode util compat hex package getting parse trans hex package getting mime hex package getting google gax hex package  mix lock file was generated with a newer version of hex update your client by running mix local hex to avoid losing data  temp compiling files ex generated temp app compiling parse trans compiling mimerl compiling metrics compiling unicode util compat compiling idna jason compiling files ex generated jason app warning string strip is deprecated use string trim instead workspace deps poison mix exs poison compiling files ex warning integer to char list is deprecated use integer to charlist instead lib poison encoder ex generated poison app ssl verify fun compiling files erl generated ssl verify fun app compiling certifi compiling hackney compiling files ex generated app mime compiling files ex generated mime app tesla compiling files ex generated tesla app google gax compiling files ex generated google gax app google api discovery compiling files ex generated google api discovery app google apis compiling files ex warning system cwd is deprecated use file cwd instead lib google apis publisher ex generated google apis app fetching found revision check old new generating true creating leading directories writing platformsummary to clients ad experience report lib google api ad experience report model platform summary ex writing sitesummaryresponse to clients ad experience report lib google api ad experience report model site summary response ex writing violatingsitesresponse to clients ad experience report lib google api ad experience report model violating sites response ex writing sites to clients ad experience report lib google api ad experience report api sites ex writing violatingsites to clients ad experience report lib google api ad experience report api violating sites ex writing connection ex writing metadata ex writing mix exs writing readme md writing license writing gitignore writing config config exs writing test test helper exs found only discovery revision and or formatting changes not significant enough for a pr fixing file permissions synthtool wrote metadata to clients ad experience report synth metadata debug synthtool wrote metadata to clients ad experience report synth metadata autosynth running git clean fdx removing pycache traceback most recent call last file home kbuilder pyenv versions lib runpy py line in run module as main main mod spec file home kbuilder pyenv versions lib runpy py line in run code exec code run globals file tmpfs src github synthtool autosynth synth py line in main file tmpfs src github synthtool autosynth synth py line in main return inner main temp dir file tmpfs src github synthtool autosynth synth py line in inner main synthesize base synth log path file tmpfs src github synthtool autosynth synthesizer py line in synthesize with open log file path rt as fp isadirectoryerror is a directory tmpfs src github synthtool logs googleapis elixir google api google internal developers can see the full log
0
369,240
25,834,701,965
IssuesEvent
2022-12-12 18:39:48
UCSCLibrary/ucsc-library-digital-collections
https://api.github.com/repos/UCSCLibrary/ucsc-library-digital-collections
closed
(1) Update github README
documentation housekeeping
The README file on github for [ucsc-library-digital-collections] is outdated. We need to update it to remove dev_docker set up and use stack_car instead.
1.0
(1) Update github README - The README file on github for [ucsc-library-digital-collections] is outdated. We need to update it to remove dev_docker set up and use stack_car instead.
non_process
update github readme the readme file on github for is outdated we need to update it to remove dev docker set up and use stack car instead
0
3,445
6,538,272,106
IssuesEvent
2017-09-01 04:53:47
amaster507/ifbmt
https://api.github.com/repos/amaster507/ifbmt
opened
Sending Updates back to KJVchurches.com
idea process
The problem with these kinds of tools is the database. For the tool to be useful the database has to be kept current. If enough missionaries are involved, maybe a simple form for correction as a pastor changes, a church closes down, or a prophet's chamber is built could help with the capture of that information. We could gain manpower in keeping it current if they had some access to make updates as they are making the call or on site. KJVchurches.com is an awesome tool. I'm not sure how updates are going except that I know who to contact if I notice something wrong.
1.0
Sending Updates back to KJVchurches.com - The problem with these kinds of tools is the database. For the tool to be useful the database has to be kept current. If enough missionaries are involved, maybe a simple form for correction as a pastor changes, a church closes down, or a prophet's chamber is built could help with the capture of that information. We could gain manpower in keeping it current if they had some access to make updates as they are making the call or on site. KJVchurches.com is an awesome tool. I'm not sure how updates are going except that I know who to contact if I notice something wrong.
process
sending updates back to kjvchurches com the problem with these kinds of tools is the database for the tool to be useful the database has to be kept current if enough missionaries are involved maybe a simple form for correction as a pastor changes a church closes down or a prophet s chamber is built could help with the capture of that information we could gain manpower in keeping it current if they had some access to make updates as they are making the call or on site kjvchurches com is an awesome tool i m not sure how updates are going except that i know who to contact if i notice something wrong
1
5,296
8,108,473,473
IssuesEvent
2018-08-14 01:57:24
rubberduck-vba/Rubberduck
https://api.github.com/repos/rubberduck-vba/Rubberduck
closed
Dirty designer is ignored if code-behind isn't modified
bug difficulty-03-duck edge-case enhancement inspection-false-positive parse-tree-processing
Repro: - Add a UserForm module; Rubberduck parses. - Add a CommandButton control to the form designer. - Request a reparse / refresh: Rubberduck ignores the unmodified UserForm module. - Select the command button: Rubberduck fails to see it. We need to treat designers like "modules" and monitor their "dirtiness" separately from their code-behind. Otherwise, it's possible to have ignored content on a UserForm, and code in other modules that refer to controls on that form: this results in inspection false positives, e.g. `VariableNotDeclared` and `UnassignedVariableUsage` firing up for `UserForm1.CommandButton1`.
1.0
Dirty designer is ignored if code-behind isn't modified - Repro: - Add a UserForm module; Rubberduck parses. - Add a CommandButton control to the form designer. - Request a reparse / refresh: Rubberduck ignores the unmodified UserForm module. - Select the command button: Rubberduck fails to see it. We need to treat designers like "modules" and monitor their "dirtiness" separately from their code-behind. Otherwise, it's possible to have ignored content on a UserForm, and code in other modules that refer to controls on that form: this results in inspection false positives, e.g. `VariableNotDeclared` and `UnassignedVariableUsage` firing up for `UserForm1.CommandButton1`.
process
dirty designer is ignored if code behind isn t modified repro add a userform module rubberduck parses add a commandbutton control to the form designer request a reparse refresh rubberduck ignores the unmodified userform module select the command button rubberduck fails to see it we need to treat designers like modules and monitor their dirtiness separately from their code behind otherwise it s possible to have ignored content on a userform and code in other modules that refer to controls on that form this results in inspection false positives e g variablenotdeclared and unassignedvariableusage firing up for
1
10,819
13,609,291,520
IssuesEvent
2020-09-23 04:50:45
googleapis/java-texttospeech
https://api.github.com/repos/googleapis/java-texttospeech
closed
Dependency Dashboard
api: texttospeech type: process
This issue contains a list of Renovate updates and their statuses. ## Open These updates have all been created already. Click a checkbox below to force a retry/rebase of any. - [ ] <!-- rebase-branch=renovate/com.google.cloud-google-cloud-texttospeech-1.x -->chore(deps): update dependency com.google.cloud:google-cloud-texttospeech to v1.2.1 --- - [ ] <!-- manual job -->Check this box to trigger a request for Renovate to run again on this repository
1.0
Dependency Dashboard - This issue contains a list of Renovate updates and their statuses. ## Open These updates have all been created already. Click a checkbox below to force a retry/rebase of any. - [ ] <!-- rebase-branch=renovate/com.google.cloud-google-cloud-texttospeech-1.x -->chore(deps): update dependency com.google.cloud:google-cloud-texttospeech to v1.2.1 --- - [ ] <!-- manual job -->Check this box to trigger a request for Renovate to run again on this repository
process
dependency dashboard this issue contains a list of renovate updates and their statuses open these updates have all been created already click a checkbox below to force a retry rebase of any chore deps update dependency com google cloud google cloud texttospeech to check this box to trigger a request for renovate to run again on this repository
1
16,746
21,912,532,429
IssuesEvent
2022-05-21 09:27:42
shirou/gopsutil
https://api.github.com/repos/shirou/gopsutil
closed
I have a Windows process that definitely exists, but I'm getting "process does not exist" error
os:windows package:process
**Describe the bug** On Windows, when calling `NewProcess` passing a pid that exists for some processes I get "process does not exist" error, whereas the process definitely exists. **To Reproduce** This happens to some processes only, it works as exepcted for most of the processes. ```go package main import ( "fmt" "github.com/shirou/gopsutil/v3/process" ) func findPid(pid int32) { if pids, err := process.Pids(); err != nil { fmt.Printf("error calling Pids: %v\n", pid, err) } else { pidFound := false for _, c := range pids { if c == pid { pidFound = true break } } fmt.Printf("Pid %d found: %v\n", pid, pidFound) } } func callNewProcess(pid int32) { if p, err := process.NewProcess(pid); err != nil { fmt.Printf("error calling NewProcess for pid %d: %v\n", pid, err) } else { fmt.Printf("ok calling NewProcess for pid %d. Result: %v\n", pid, p) } } func main() { pid := int32(6756) findPid(pid) callNewProcess(pid) findPid(pid) callNewProcess(pid) } ``` Output: ``` Pid 6756 found: true error calling NewProcess for pid 6756: process does not exist Pid 6756 found: true error calling NewProcess for pid 6756: process does not exist ``` **Expected behavior** Since the pid and the process exist I expect the NewProcess call to succeed. **Environment (please complete the following information):** - Windows: Microsoft Windows [Version 10.0.14393] **Additional context** This is happening with some but not all VirtualBox Headless Frontend processes. I can see the process in the Process Explorer, I can also kill it form there if I like, as far as I can see it is no different from other processes. Process Explorer marks this process as "packed" and the command line for the process as displayed by the process explorer does not start with the executable name, which is a difference from most processes. Some pictures are below. ![ps01](https://user-images.githubusercontent.com/658865/167236015-0c477bb2-fb87-4830-a74b-eefcd0dca61d.png) ![ps02](https://user-images.githubusercontent.com/658865/167236032-34c2b734-4973-4c63-b9e8-0823d50898f9.png)
1.0
I have a Windows process that definitely exists, but I'm getting "process does not exist" error - **Describe the bug** On Windows, when calling `NewProcess` passing a pid that exists for some processes I get "process does not exist" error, whereas the process definitely exists. **To Reproduce** This happens to some processes only, it works as exepcted for most of the processes. ```go package main import ( "fmt" "github.com/shirou/gopsutil/v3/process" ) func findPid(pid int32) { if pids, err := process.Pids(); err != nil { fmt.Printf("error calling Pids: %v\n", pid, err) } else { pidFound := false for _, c := range pids { if c == pid { pidFound = true break } } fmt.Printf("Pid %d found: %v\n", pid, pidFound) } } func callNewProcess(pid int32) { if p, err := process.NewProcess(pid); err != nil { fmt.Printf("error calling NewProcess for pid %d: %v\n", pid, err) } else { fmt.Printf("ok calling NewProcess for pid %d. Result: %v\n", pid, p) } } func main() { pid := int32(6756) findPid(pid) callNewProcess(pid) findPid(pid) callNewProcess(pid) } ``` Output: ``` Pid 6756 found: true error calling NewProcess for pid 6756: process does not exist Pid 6756 found: true error calling NewProcess for pid 6756: process does not exist ``` **Expected behavior** Since the pid and the process exist I expect the NewProcess call to succeed. **Environment (please complete the following information):** - Windows: Microsoft Windows [Version 10.0.14393] **Additional context** This is happening with some but not all VirtualBox Headless Frontend processes. I can see the process in the Process Explorer, I can also kill it form there if I like, as far as I can see it is no different from other processes. Process Explorer marks this process as "packed" and the command line for the process as displayed by the process explorer does not start with the executable name, which is a difference from most processes. Some pictures are below. ![ps01](https://user-images.githubusercontent.com/658865/167236015-0c477bb2-fb87-4830-a74b-eefcd0dca61d.png) ![ps02](https://user-images.githubusercontent.com/658865/167236032-34c2b734-4973-4c63-b9e8-0823d50898f9.png)
process
i have a windows process that definitely exists but i m getting process does not exist error describe the bug on windows when calling newprocess passing a pid that exists for some processes i get process does not exist error whereas the process definitely exists to reproduce this happens to some processes only it works as exepcted for most of the processes go package main import fmt github com shirou gopsutil process func findpid pid if pids err process pids err nil fmt printf error calling pids v n pid err else pidfound false for c range pids if c pid pidfound true break fmt printf pid d found v n pid pidfound func callnewprocess pid if p err process newprocess pid err nil fmt printf error calling newprocess for pid d v n pid err else fmt printf ok calling newprocess for pid d result v n pid p func main pid findpid pid callnewprocess pid findpid pid callnewprocess pid output pid found true error calling newprocess for pid process does not exist pid found true error calling newprocess for pid process does not exist expected behavior since the pid and the process exist i expect the newprocess call to succeed environment please complete the following information windows microsoft windows additional context this is happening with some but not all virtualbox headless frontend processes i can see the process in the process explorer i can also kill it form there if i like as far as i can see it is no different from other processes process explorer marks this process as packed and the command line for the process as displayed by the process explorer does not start with the executable name which is a difference from most processes some pictures are below
1
16,526
21,554,040,328
IssuesEvent
2022-04-30 05:07:34
NationalSecurityAgency/ghidra
https://api.github.com/repos/NationalSecurityAgency/ghidra
closed
Wrong addresses with AVR8
Feature: Processor/Atmel
When decompiling ATmega328 app which is AVR5 with AVR8 (this is the closest that Ghidra provides) I get wrong addresses in code. It sometimes shows the data at address formatted like this code:[address].1 When this adds up multiple times you eventually end up with completely different addresses. Is this intentional? Can it be switched somewhere? Wrong address offset in Ghidra shows 0x5C ![Screenshot_20211003_223115](https://user-images.githubusercontent.com/1550507/135770658-32d57dc8-a024-4286-91b5-4f789277865f.png) Same file, same place but in Okteta shows 0xB8 ![Screenshot_20211003_223136](https://user-images.githubusercontent.com/1550507/135770661-26c489cb-e77c-4f76-8852-f277b2cbbba9.png) Language info from Ghidra ![Screenshot_20211003_224203](https://user-images.githubusercontent.com/1550507/135770849-db38a9cc-a20d-4851-95e8-c14d53f68a74.png) The decompiled file shown in screenshots can be downloaded here: [gateway.ino.eightanaloginputs.bin.zip](https://github.com/NationalSecurityAgency/ghidra/files/7274485/gateway.ino.eightanaloginputs.bin.zip)
1.0
Wrong addresses with AVR8 - When decompiling ATmega328 app which is AVR5 with AVR8 (this is the closest that Ghidra provides) I get wrong addresses in code. It sometimes shows the data at address formatted like this code:[address].1 When this adds up multiple times you eventually end up with completely different addresses. Is this intentional? Can it be switched somewhere? Wrong address offset in Ghidra shows 0x5C ![Screenshot_20211003_223115](https://user-images.githubusercontent.com/1550507/135770658-32d57dc8-a024-4286-91b5-4f789277865f.png) Same file, same place but in Okteta shows 0xB8 ![Screenshot_20211003_223136](https://user-images.githubusercontent.com/1550507/135770661-26c489cb-e77c-4f76-8852-f277b2cbbba9.png) Language info from Ghidra ![Screenshot_20211003_224203](https://user-images.githubusercontent.com/1550507/135770849-db38a9cc-a20d-4851-95e8-c14d53f68a74.png) The decompiled file shown in screenshots can be downloaded here: [gateway.ino.eightanaloginputs.bin.zip](https://github.com/NationalSecurityAgency/ghidra/files/7274485/gateway.ino.eightanaloginputs.bin.zip)
process
wrong addresses with when decompiling app which is with this is the closest that ghidra provides i get wrong addresses in code it sometimes shows the data at address formatted like this code when this adds up multiple times you eventually end up with completely different addresses is this intentional can it be switched somewhere wrong address offset in ghidra shows same file same place but in okteta shows language info from ghidra the decompiled file shown in screenshots can be downloaded here
1
355,781
10,584,710,108
IssuesEvent
2019-10-08 15:57:12
AY1920S1-CS2113T-W12-4/main
https://api.github.com/repos/AY1920S1-CS2113T-W12-4/main
opened
As a user, I can see live updates when i add a new task
priority.High type.Story
so that I can see the tasks I have and compare on easily.
1.0
As a user, I can see live updates when i add a new task - so that I can see the tasks I have and compare on easily.
non_process
as a user i can see live updates when i add a new task so that i can see the tasks i have and compare on easily
0
16,878
22,157,499,385
IssuesEvent
2022-06-04 02:33:12
hashgraph/hedera-json-rpc-relay
https://api.github.com/repos/hashgraph/hedera-json-rpc-relay
closed
Add artifact build and upload to 0.1 release branch
enhancement P2 process
### Problem `release/0.1` is missing logic to archive and upload the npm package. ### Solution Add logic to archive and upload artifact ### Alternatives Use github npm package creation flow. Maybe in 0.2.0
1.0
Add artifact build and upload to 0.1 release branch - ### Problem `release/0.1` is missing logic to archive and upload the npm package. ### Solution Add logic to archive and upload artifact ### Alternatives Use github npm package creation flow. Maybe in 0.2.0
process
add artifact build and upload to release branch problem release is missing logic to archive and upload the npm package solution add logic to archive and upload artifact alternatives use github npm package creation flow maybe in
1
125,639
17,836,503,494
IssuesEvent
2021-09-03 02:22:15
alpersonalwebsite/react-state-fetch
https://api.github.com/repos/alpersonalwebsite/react-state-fetch
opened
CVE-2021-3664 (Medium) detected in url-parse-1.4.7.tgz
security vulnerability
## CVE-2021-3664 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.4.7.tgz</b></p></summary> <p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p> <p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz</a></p> <p>Path to dependency file: react-state-fetch/package.json</p> <p>Path to vulnerable library: react-state-fetch/node_modules/url-parse/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.3.0.tgz (Root Library) - webpack-dev-server-3.9.0.tgz - sockjs-client-1.4.0.tgz - :x: **url-parse-1.4.7.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> url-parse is vulnerable to URL Redirection to Untrusted Site <p>Publish Date: 2021-07-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3664>CVE-2021-3664</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3664</a></p> <p>Release Date: 2021-07-26</p> <p>Fix Resolution: url-parse - 1.5.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-3664 (Medium) detected in url-parse-1.4.7.tgz - ## CVE-2021-3664 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.4.7.tgz</b></p></summary> <p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p> <p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz</a></p> <p>Path to dependency file: react-state-fetch/package.json</p> <p>Path to vulnerable library: react-state-fetch/node_modules/url-parse/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.3.0.tgz (Root Library) - webpack-dev-server-3.9.0.tgz - sockjs-client-1.4.0.tgz - :x: **url-parse-1.4.7.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> url-parse is vulnerable to URL Redirection to Untrusted Site <p>Publish Date: 2021-07-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3664>CVE-2021-3664</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3664</a></p> <p>Release Date: 2021-07-26</p> <p>Fix Resolution: url-parse - 1.5.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve medium detected in url parse tgz cve medium severity vulnerability vulnerable library url parse tgz small footprint url parser that works seamlessly across node js and browser environments library home page a href path to dependency file react state fetch package json path to vulnerable library react state fetch node modules url parse package json dependency hierarchy react scripts tgz root library webpack dev server tgz sockjs client tgz x url parse tgz vulnerable library found in base branch master vulnerability details url parse is vulnerable to url redirection to untrusted site publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution url parse step up your open source security game with whitesource
0
9,988
13,037,721,917
IssuesEvent
2020-07-28 14:13:32
RockefellerArchiveCenter/request_broker
https://api.github.com/repos/RockefellerArchiveCenter/request_broker
closed
Process data for reading room requests
process request
## Describe the solution you'd like Given a list of AS URIs, fetch additional data, parse submittable requests from unsubmittable ones, and return a list of dicts which conform to specs for request data. This should happen in the `ProcessRequest` `process_readingroom_request` method.
1.0
Process data for reading room requests - ## Describe the solution you'd like Given a list of AS URIs, fetch additional data, parse submittable requests from unsubmittable ones, and return a list of dicts which conform to specs for request data. This should happen in the `ProcessRequest` `process_readingroom_request` method.
process
process data for reading room requests describe the solution you d like given a list of as uris fetch additional data parse submittable requests from unsubmittable ones and return a list of dicts which conform to specs for request data this should happen in the processrequest process readingroom request method
1
13,932
16,700,107,956
IssuesEvent
2021-06-09 00:11:27
qgis/QGIS
https://api.github.com/repos/qgis/QGIS
closed
error at the end of SAGA logs
Bug Processing Regression
Author Name: **Giovanni Manghi** (@gioman) Original Redmine Issue: [21530](https://issues.qgis.org/issues/21530) Affected QGIS version: 3.6.0 Redmine category:processing/saga --- On 3.6 at the end of logs of SAGA tools (tested a few tools for rasters/dems) a message like the following will show Loading resulting layers The following layers were not correctly generated.<ul><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/0f148c064e624b7e815a936a301e85a3/C_GENE.sdat</li><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/65c98a4ab4f047c99b8ddec8093d9d84/SLOPE.sdat</li><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/f36ee388fb4340c181b64c2e56f0e081/ASPECT.sdat</li></ul>You can check the 'Log Messages Panel' in QGIS main window to find more information about the execution of the algorithm. the outputs are created and added to the map, but anyway this seems wrong (and does not happen on 3.4.5). --- Related issue(s): #29339 (relates) Redmine related issue(s): [21523](https://issues.qgis.org/issues/21523) ---
1.0
error at the end of SAGA logs - Author Name: **Giovanni Manghi** (@gioman) Original Redmine Issue: [21530](https://issues.qgis.org/issues/21530) Affected QGIS version: 3.6.0 Redmine category:processing/saga --- On 3.6 at the end of logs of SAGA tools (tested a few tools for rasters/dems) a message like the following will show Loading resulting layers The following layers were not correctly generated.<ul><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/0f148c064e624b7e815a936a301e85a3/C_GENE.sdat</li><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/65c98a4ab4f047c99b8ddec8093d9d84/SLOPE.sdat</li><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/f36ee388fb4340c181b64c2e56f0e081/ASPECT.sdat</li></ul>You can check the 'Log Messages Panel' in QGIS main window to find more information about the execution of the algorithm. the outputs are created and added to the map, but anyway this seems wrong (and does not happen on 3.4.5). --- Related issue(s): #29339 (relates) Redmine related issue(s): [21523](https://issues.qgis.org/issues/21523) ---
process
error at the end of saga logs author name giovanni manghi gioman original redmine issue affected qgis version redmine category processing saga on at the end of logs of saga tools tested a few tools for rasters dems a message like the following will show loading resulting layers the following layers were not correctly generated c users qgis appdata local temp processing c gene sdat c users qgis appdata local temp processing slope sdat c users qgis appdata local temp processing aspect sdat you can check the log messages panel in qgis main window to find more information about the execution of the algorithm the outputs are created and added to the map but anyway this seems wrong and does not happen on related issue s relates redmine related issue s
1
735
3,214,317,073
IssuesEvent
2015-10-07 00:46:22
broadinstitute/hellbender-dataflow
https://api.github.com/repos/broadinstitute/hellbender-dataflow
opened
Choose approach to fix scaling of ReadBAMTransform, and implement fix
Dataflow DataflowPreprocessingPipeline profiling
_From @droazen on July 27, 2015 17:39_ From an analysis by @jean-philippe-martin: **The Problem** Doing a preliminary performance analysis of Hellbender, I found that ReadBAM did not scale with the number of workers. ![image](https://cloud.githubusercontent.com/assets/798637/8913030/757d9552-3464-11e5-8244-46931fed8383.png) Logs indicated it was running on a single worker, regardless of how many were specified for the job. **The Cause** The underlying cause is a combination of ReadBAM's design and Dataflow's own perhaps over-eager optimization. ReadBAM is implemented as a series of transforms. It could also have been implemented as a Dataflow BoundedSource, but the latter is much more complicated. The transforms are as follows: Start with a collection of filenames and a collection of contigs. Transform 1 -- input: filenames, side input: contigs. Generates a list of regions to read ("BAMShard") Transform 2 -- input: `PCollection<BAMShard>`, output: `PCollection<Read>`. Each worker reads from the BAM file, using the index to find where to read from. Dataflow sees that transform 2 takes as input transform 1's output, and so these two can be run in sequence on the same machines, skipping a serialization/deserialization step. This optimization is called "fusing" and it's generally a very good thing. However in this case, the input PCollection has a single element (the file we want to read), so only one worker is involved. Because of the fusion, that same worker then ends up doing all of the reading work, ruining our day. **The Solutions** There are multiple ways to solve this problem. 1. change transform 1 to have the contig collection as a primary input in the hope that we always have more than one contig. This solution's very brittle (our benchmark, for example, reads a single chromosome so the contig list has effectively only one element). I did not pursue it. 2. Insert a groupby step between the two transforms. pro: this gets all the workers involved again con: the groupby itself takes some time, unnecessarily. 3. Compute the BAMShards at the client and then send those to workers. pro: this gets all the workers involved again, and they do not have to spend any time on groupby con: an existing Dataflow bug will cause the program to crash if the shard list is too long. We can work around this, though, by increasing the shard size when we have many. 4. Bite the bullet and implement a BoundedSource. I implemented solutions 2 and 3. Solution 3 is the fastest. I suspect solution 4 wouldn't be any faster, though it would be more idiomatic for Dataflow. The graph below shows the time in the Dataflow Read phase with the new code when using the groupby method (this includes sharding, groupby, and actually reading the BAM file). ![image](https://cloud.githubusercontent.com/assets/798637/8913044/8db099d0-3464-11e5-8ee3-f2cbebb6ce2b.png) Next Steps The next step is to pick either solution 3 or 4 (or 2, I suppose, if we want to be expedient). If 3, then we need to change the sharding to deal with large files. If 4, then we need to spend the time and effort writing the new source (and of course testing that it scales as we're expecting). Comments & feedback welcome! _Copied from original issue: broadinstitute/hellbender#756_
1.0
Choose approach to fix scaling of ReadBAMTransform, and implement fix - _From @droazen on July 27, 2015 17:39_ From an analysis by @jean-philippe-martin: **The Problem** Doing a preliminary performance analysis of Hellbender, I found that ReadBAM did not scale with the number of workers. ![image](https://cloud.githubusercontent.com/assets/798637/8913030/757d9552-3464-11e5-8244-46931fed8383.png) Logs indicated it was running on a single worker, regardless of how many were specified for the job. **The Cause** The underlying cause is a combination of ReadBAM's design and Dataflow's own perhaps over-eager optimization. ReadBAM is implemented as a series of transforms. It could also have been implemented as a Dataflow BoundedSource, but the latter is much more complicated. The transforms are as follows: Start with a collection of filenames and a collection of contigs. Transform 1 -- input: filenames, side input: contigs. Generates a list of regions to read ("BAMShard") Transform 2 -- input: `PCollection<BAMShard>`, output: `PCollection<Read>`. Each worker reads from the BAM file, using the index to find where to read from. Dataflow sees that transform 2 takes as input transform 1's output, and so these two can be run in sequence on the same machines, skipping a serialization/deserialization step. This optimization is called "fusing" and it's generally a very good thing. However in this case, the input PCollection has a single element (the file we want to read), so only one worker is involved. Because of the fusion, that same worker then ends up doing all of the reading work, ruining our day. **The Solutions** There are multiple ways to solve this problem. 1. change transform 1 to have the contig collection as a primary input in the hope that we always have more than one contig. This solution's very brittle (our benchmark, for example, reads a single chromosome so the contig list has effectively only one element). I did not pursue it. 2. Insert a groupby step between the two transforms. pro: this gets all the workers involved again con: the groupby itself takes some time, unnecessarily. 3. Compute the BAMShards at the client and then send those to workers. pro: this gets all the workers involved again, and they do not have to spend any time on groupby con: an existing Dataflow bug will cause the program to crash if the shard list is too long. We can work around this, though, by increasing the shard size when we have many. 4. Bite the bullet and implement a BoundedSource. I implemented solutions 2 and 3. Solution 3 is the fastest. I suspect solution 4 wouldn't be any faster, though it would be more idiomatic for Dataflow. The graph below shows the time in the Dataflow Read phase with the new code when using the groupby method (this includes sharding, groupby, and actually reading the BAM file). ![image](https://cloud.githubusercontent.com/assets/798637/8913044/8db099d0-3464-11e5-8ee3-f2cbebb6ce2b.png) Next Steps The next step is to pick either solution 3 or 4 (or 2, I suppose, if we want to be expedient). If 3, then we need to change the sharding to deal with large files. If 4, then we need to spend the time and effort writing the new source (and of course testing that it scales as we're expecting). Comments & feedback welcome! _Copied from original issue: broadinstitute/hellbender#756_
process
choose approach to fix scaling of readbamtransform and implement fix from droazen on july from an analysis by jean philippe martin the problem doing a preliminary performance analysis of hellbender i found that readbam did not scale with the number of workers logs indicated it was running on a single worker regardless of how many were specified for the job the cause the underlying cause is a combination of readbam s design and dataflow s own perhaps over eager optimization readbam is implemented as a series of transforms it could also have been implemented as a dataflow boundedsource but the latter is much more complicated the transforms are as follows start with a collection of filenames and a collection of contigs transform input filenames side input contigs generates a list of regions to read bamshard transform input pcollection output pcollection each worker reads from the bam file using the index to find where to read from dataflow sees that transform takes as input transform s output and so these two can be run in sequence on the same machines skipping a serialization deserialization step this optimization is called fusing and it s generally a very good thing however in this case the input pcollection has a single element the file we want to read so only one worker is involved because of the fusion that same worker then ends up doing all of the reading work ruining our day the solutions there are multiple ways to solve this problem change transform to have the contig collection as a primary input in the hope that we always have more than one contig this solution s very brittle our benchmark for example reads a single chromosome so the contig list has effectively only one element i did not pursue it insert a groupby step between the two transforms pro this gets all the workers involved again con the groupby itself takes some time unnecessarily compute the bamshards at the client and then send those to workers pro this gets all the workers involved again and they do not have to spend any time on groupby con an existing dataflow bug will cause the program to crash if the shard list is too long we can work around this though by increasing the shard size when we have many bite the bullet and implement a boundedsource i implemented solutions and solution is the fastest i suspect solution wouldn t be any faster though it would be more idiomatic for dataflow the graph below shows the time in the dataflow read phase with the new code when using the groupby method this includes sharding groupby and actually reading the bam file next steps the next step is to pick either solution or or i suppose if we want to be expedient if then we need to change the sharding to deal with large files if then we need to spend the time and effort writing the new source and of course testing that it scales as we re expecting comments feedback welcome copied from original issue broadinstitute hellbender
1
750,399
26,200,680,042
IssuesEvent
2023-01-03 17:10:16
yugabyte/yugabyte-db
https://api.github.com/repos/yugabyte/yugabyte-db
closed
[CDCSDK + Connector] MySQL Driver not found on latest debezium connector.
kind/bug priority/medium area/cdcsdk status/awaiting-triage
Jira Link: [DB-4777](https://yugabyte.atlassian.net/browse/DB-4777) ### Description MySQL Driver not found on latest debezium connector. ``` ERROR || WorkerSinkTask{id=jdbc-sink-test_cdc_264f4f-8} Task threw an uncaught and unrecoverable exception. Task is being killed and will not recover until manually restarted. Error: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo [org.apache.kafka.connect.runtime.WorkerSinkTask] org.apache.kafka.connect.errors.ConnectException: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo at io.confluent.connect.jdbc.util.CachedConnectionProvider.getConnection(CachedConnectionProvider.java:59) at io.confluent.connect.jdbc.sink.JdbcDbWriter.write(JdbcDbWriter.java:64) at io.confluent.connect.jdbc.sink.JdbcSinkTask.put(JdbcSinkTask.java:84) at org.apache.kafka.connect.runtime.WorkerSinkTask.deliverMessages(WorkerSinkTask.java:581) at org.apache.kafka.connect.runtime.WorkerSinkTask.poll(WorkerSinkTask.java:333) at org.apache.kafka.connect.runtime.WorkerSinkTask.iteration(WorkerSinkTask.java:234) at org.apache.kafka.connect.runtime.WorkerSinkTask.execute(WorkerSinkTask.java:203) at org.apache.kafka.connect.runtime.WorkerTask.doRun(WorkerTask.java:188) at org.apache.kafka.connect.runtime.WorkerTask.run(WorkerTask.java:243) at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515) at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at java.base/java.lang.Thread.run(Thread.java:829) Caused by: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo at java.sql/java.sql.DriverManager.getConnection(DriverManager.java:702) at java.sql/java.sql.DriverManager.getConnection(DriverManager.java:189) at io.confluent.connect.jdbc.dialect.GenericDatabaseDialect.getConnection(GenericDatabaseDialect.java:250) at io.confluent.connect.jdbc.util.CachedConnectionProvider.newConnection(CachedConnectionProvider.java:80) at io.confluent.connect.jdbc.util.CachedConnectionProvider.getConnection(CachedConnectionProvider.java:52) ... 13 more ```
1.0
[CDCSDK + Connector] MySQL Driver not found on latest debezium connector. - Jira Link: [DB-4777](https://yugabyte.atlassian.net/browse/DB-4777) ### Description MySQL Driver not found on latest debezium connector. ``` ERROR || WorkerSinkTask{id=jdbc-sink-test_cdc_264f4f-8} Task threw an uncaught and unrecoverable exception. Task is being killed and will not recover until manually restarted. Error: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo [org.apache.kafka.connect.runtime.WorkerSinkTask] org.apache.kafka.connect.errors.ConnectException: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo at io.confluent.connect.jdbc.util.CachedConnectionProvider.getConnection(CachedConnectionProvider.java:59) at io.confluent.connect.jdbc.sink.JdbcDbWriter.write(JdbcDbWriter.java:64) at io.confluent.connect.jdbc.sink.JdbcSinkTask.put(JdbcSinkTask.java:84) at org.apache.kafka.connect.runtime.WorkerSinkTask.deliverMessages(WorkerSinkTask.java:581) at org.apache.kafka.connect.runtime.WorkerSinkTask.poll(WorkerSinkTask.java:333) at org.apache.kafka.connect.runtime.WorkerSinkTask.iteration(WorkerSinkTask.java:234) at org.apache.kafka.connect.runtime.WorkerSinkTask.execute(WorkerSinkTask.java:203) at org.apache.kafka.connect.runtime.WorkerTask.doRun(WorkerTask.java:188) at org.apache.kafka.connect.runtime.WorkerTask.run(WorkerTask.java:243) at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515) at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at java.base/java.lang.Thread.run(Thread.java:829) Caused by: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo at java.sql/java.sql.DriverManager.getConnection(DriverManager.java:702) at java.sql/java.sql.DriverManager.getConnection(DriverManager.java:189) at io.confluent.connect.jdbc.dialect.GenericDatabaseDialect.getConnection(GenericDatabaseDialect.java:250) at io.confluent.connect.jdbc.util.CachedConnectionProvider.newConnection(CachedConnectionProvider.java:80) at io.confluent.connect.jdbc.util.CachedConnectionProvider.getConnection(CachedConnectionProvider.java:52) ... 13 more ```
non_process
mysql driver not found on latest debezium connector jira link description mysql driver not found on latest debezium connector error workersinktask id jdbc sink test cdc task threw an uncaught and unrecoverable exception task is being killed and will not recover until manually restarted error java sql sqlexception no suitable driver found for jdbc mysql demo user demo password demo org apache kafka connect errors connectexception java sql sqlexception no suitable driver found for jdbc mysql demo user demo password demo at io confluent connect jdbc util cachedconnectionprovider getconnection cachedconnectionprovider java at io confluent connect jdbc sink jdbcdbwriter write jdbcdbwriter java at io confluent connect jdbc sink jdbcsinktask put jdbcsinktask java at org apache kafka connect runtime workersinktask delivermessages workersinktask java at org apache kafka connect runtime workersinktask poll workersinktask java at org apache kafka connect runtime workersinktask iteration workersinktask java at org apache kafka connect runtime workersinktask execute workersinktask java at org apache kafka connect runtime workertask dorun workertask java at org apache kafka connect runtime workertask run workertask java at java base java util concurrent executors runnableadapter call executors java at java base java util concurrent futuretask run futuretask java at java base java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java base java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java base java lang thread run thread java caused by java sql sqlexception no suitable driver found for jdbc mysql demo user demo password demo at java sql java sql drivermanager getconnection drivermanager java at java sql java sql drivermanager getconnection drivermanager java at io confluent connect jdbc dialect genericdatabasedialect getconnection genericdatabasedialect java at io confluent connect jdbc util cachedconnectionprovider newconnection cachedconnectionprovider java at io confluent connect jdbc util cachedconnectionprovider getconnection cachedconnectionprovider java more
0
3,904
6,823,010,833
IssuesEvent
2017-11-07 22:07:00
Great-Hill-Corporation/quickBlocks
https://api.github.com/repos/Great-Hill-Corporation/quickBlocks
closed
whenBlock modes clearly identified
status-inprocess tools-whenBlock type-enhancement
As we did with other commands, we need to clarify in the help that we can work in 2 modes with this tool: 1) Search mode 2) List mode This is just an improvement at help message.
1.0
whenBlock modes clearly identified - As we did with other commands, we need to clarify in the help that we can work in 2 modes with this tool: 1) Search mode 2) List mode This is just an improvement at help message.
process
whenblock modes clearly identified as we did with other commands we need to clarify in the help that we can work in modes with this tool search mode list mode this is just an improvement at help message
1
10,284
13,133,400,760
IssuesEvent
2020-08-06 20:50:42
ORNL-AMO/AMO-Tools-Desktop
https://api.github.com/repos/ORNL-AMO/AMO-Tools-Desktop
closed
O2 Enrichment Old Assessments
Calculator Process Heating
Handle saved 02 enrichment data from PHAST assessments before the refactor
1.0
O2 Enrichment Old Assessments - Handle saved 02 enrichment data from PHAST assessments before the refactor
process
enrichment old assessments handle saved enrichment data from phast assessments before the refactor
1
4,841
7,735,307,722
IssuesEvent
2018-05-27 13:45:54
rubberduck-vba/Rubberduck
https://api.github.com/repos/rubberduck-vba/Rubberduck
opened
VB6 COM documentation issues
parse-tree-preprocessing vb6-specific
Several type libraries commonly used by VB6 fail to fully load COM documentation, leading to names not being set. Need to examine how OleWoo handles these so that references are loaded correctly.
1.0
VB6 COM documentation issues - Several type libraries commonly used by VB6 fail to fully load COM documentation, leading to names not being set. Need to examine how OleWoo handles these so that references are loaded correctly.
process
com documentation issues several type libraries commonly used by fail to fully load com documentation leading to names not being set need to examine how olewoo handles these so that references are loaded correctly
1
22,387
31,142,285,528
IssuesEvent
2023-08-16 01:44:13
cypress-io/cypress
https://api.github.com/repos/cypress-io/cypress
closed
Flaky test: can delay with deprecated delayMs param
process: flaky test topic: flake ❄️ stage: fire watch priority: low topic: net_stubbing.cy.ts stale
### Link to dashboard or CircleCI failure https://dashboard.cypress.io/projects/ypt4pf/runs/38062/test-results/c2ca2d5b-7b08-40ba-80cb-35adcc3a1dcc ### Link to failing test in GitHub https://github.com/cypress-io/cypress/blob/develop/packages/driver/cypress/e2e/commands/net_stubbing.cy.ts#L1689 ### Analysis <img width="430" alt="Screen Shot 2022-08-17 at 11 02 53 AM" src="https://user-images.githubusercontent.com/26726429/185210518-357341ca-98a1-45b9-9458-faff2d6db4d5.png"> ### Cypress Version 10.4.0 ### Other Search for this issue number in the codebase to find the test(s) skipped until this issue is fixed
1.0
Flaky test: can delay with deprecated delayMs param - ### Link to dashboard or CircleCI failure https://dashboard.cypress.io/projects/ypt4pf/runs/38062/test-results/c2ca2d5b-7b08-40ba-80cb-35adcc3a1dcc ### Link to failing test in GitHub https://github.com/cypress-io/cypress/blob/develop/packages/driver/cypress/e2e/commands/net_stubbing.cy.ts#L1689 ### Analysis <img width="430" alt="Screen Shot 2022-08-17 at 11 02 53 AM" src="https://user-images.githubusercontent.com/26726429/185210518-357341ca-98a1-45b9-9458-faff2d6db4d5.png"> ### Cypress Version 10.4.0 ### Other Search for this issue number in the codebase to find the test(s) skipped until this issue is fixed
process
flaky test can delay with deprecated delayms param link to dashboard or circleci failure link to failing test in github analysis img width alt screen shot at am src cypress version other search for this issue number in the codebase to find the test s skipped until this issue is fixed
1
12,616
15,014,722,755
IssuesEvent
2021-02-01 07:08:40
GoogleCloudPlatform/fda-mystudies
https://api.github.com/repos/GoogleCloudPlatform/fda-mystudies
closed
[PM] Title is getting highlighted
Bug P2 Participant manager Process: Fixed Process: Tested dev
AR : Title is getting highlighted when user mouse hovered on the page title for the following screens 1. Add new location 2. About 3. Terms of service ER : Title should not be highlighted ![title1](https://user-images.githubusercontent.com/71445210/105684199-a8294f00-5f1a-11eb-82f6-4d9e2fac16de.png)
2.0
[PM] Title is getting highlighted - AR : Title is getting highlighted when user mouse hovered on the page title for the following screens 1. Add new location 2. About 3. Terms of service ER : Title should not be highlighted ![title1](https://user-images.githubusercontent.com/71445210/105684199-a8294f00-5f1a-11eb-82f6-4d9e2fac16de.png)
process
title is getting highlighted ar title is getting highlighted when user mouse hovered on the page title for the following screens add new location about terms of service er title should not be highlighted
1
8,995
12,104,497,279
IssuesEvent
2020-04-20 20:19:30
hashgraph/hedera-mirror-node
https://api.github.com/repos/hashgraph/hedera-mirror-node
closed
Kubernetes: API Gateway
P2 enhancement process
**Problem** Mirror node needs a reverse proxy/API Gateway in Kubernetes to route requests, load balance, canary rollouts, connection limits, throttling, etc. There are a lot of such solutions making comparison difficult. My [research](https://medium.com/flant-com/comparing-ingress-controllers-for-kubernetes-9b397483b46b) indicates that either Traefik or Kubernetes Ingress Controller are best suited for our needs. **Solution** - Add an API Gateway - Listen on ports 80, 443 and 5600 - Redirect path `/api/v1` on 80 and 443 to mirror-rest - Redirect path `/grafana` on 80 and 443 to grafana - Redirect remaining paths on 80, 443l, 5600 to mirror-grpc - Set connection limits - Research TLS termination and Let's Encrypt **Alternatives** **Additional Context**
1.0
Kubernetes: API Gateway - **Problem** Mirror node needs a reverse proxy/API Gateway in Kubernetes to route requests, load balance, canary rollouts, connection limits, throttling, etc. There are a lot of such solutions making comparison difficult. My [research](https://medium.com/flant-com/comparing-ingress-controllers-for-kubernetes-9b397483b46b) indicates that either Traefik or Kubernetes Ingress Controller are best suited for our needs. **Solution** - Add an API Gateway - Listen on ports 80, 443 and 5600 - Redirect path `/api/v1` on 80 and 443 to mirror-rest - Redirect path `/grafana` on 80 and 443 to grafana - Redirect remaining paths on 80, 443l, 5600 to mirror-grpc - Set connection limits - Research TLS termination and Let's Encrypt **Alternatives** **Additional Context**
process
kubernetes api gateway problem mirror node needs a reverse proxy api gateway in kubernetes to route requests load balance canary rollouts connection limits throttling etc there are a lot of such solutions making comparison difficult my indicates that either traefik or kubernetes ingress controller are best suited for our needs solution add an api gateway listen on ports and redirect path api on and to mirror rest redirect path grafana on and to grafana redirect remaining paths on to mirror grpc set connection limits research tls termination and let s encrypt alternatives additional context
1
3,764
6,735,271,181
IssuesEvent
2017-10-18 21:07:29
macattackftw/IntergalacticLifelineI
https://api.github.com/repos/macattackftw/IntergalacticLifelineI
opened
Markov Decision Process
Initial Strategy Classification Markov Decision Process
Implement a Markov Decision Process to classify replays in an online manner. Try unsupervised training first until labels become available for subset of the replays. || Research | Development | Testing/Tuning | | :-----: | :------------: | :---------------: | :------------------: | | Status | In progress | Todo | Todo | | Time | 30m | ~ | ~ | | Estimated | 3h | 9h | 8h |
1.0
Markov Decision Process - Implement a Markov Decision Process to classify replays in an online manner. Try unsupervised training first until labels become available for subset of the replays. || Research | Development | Testing/Tuning | | :-----: | :------------: | :---------------: | :------------------: | | Status | In progress | Todo | Todo | | Time | 30m | ~ | ~ | | Estimated | 3h | 9h | 8h |
process
markov decision process implement a markov decision process to classify replays in an online manner try unsupervised training first until labels become available for subset of the replays research development testing tuning status in progress todo todo time estimated
1
667,561
22,493,017,325
IssuesEvent
2022-06-23 04:17:51
Marri/glowfic
https://api.github.com/repos/Marri/glowfic
closed
Editing icons/characters does not update flat views
type: bug type: idea 2. high priority 8. medium
Check on this. I don't recall if they do or not. I don't expect they would, skipping validations, but maybe they do.
1.0
Editing icons/characters does not update flat views - Check on this. I don't recall if they do or not. I don't expect they would, skipping validations, but maybe they do.
non_process
editing icons characters does not update flat views check on this i don t recall if they do or not i don t expect they would skipping validations but maybe they do
0
214,202
7,267,768,985
IssuesEvent
2018-02-20 07:14:51
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.news18.com - video or audio doesn't play
browser-firefox priority-normal status-needsinfo
<!-- @browser: Firefox 60.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0 --> <!-- @reported_with: desktop-reporter --> **URL**: http://www.news18.com/livetv/ **Browser / Version**: Firefox 60.0 **Operating System**: Windows 10 **Tested Another Browser**: Yes **Problem type**: Video or audio doesn't play **Description**: The Video and Audio not playing **Steps to Reproduce**: CNN IBN Indian News Channel Live TV Streaming not working gfx.webrender.all: false gfx.webrender.blob-images: 1 gfx.webrender.enabled: false image.mem.shared: 2 [![Screenshot Description](https://webcompat.com/uploads/2018/2/3a53f2f6-58b7-4a2f-951d-152c724acd07-thumb.jpg)](https://webcompat.com/uploads/2018/2/3a53f2f6-58b7-4a2f-951d-152c724acd07.jpg) _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
www.news18.com - video or audio doesn't play - <!-- @browser: Firefox 60.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0 --> <!-- @reported_with: desktop-reporter --> **URL**: http://www.news18.com/livetv/ **Browser / Version**: Firefox 60.0 **Operating System**: Windows 10 **Tested Another Browser**: Yes **Problem type**: Video or audio doesn't play **Description**: The Video and Audio not playing **Steps to Reproduce**: CNN IBN Indian News Channel Live TV Streaming not working gfx.webrender.all: false gfx.webrender.blob-images: 1 gfx.webrender.enabled: false image.mem.shared: 2 [![Screenshot Description](https://webcompat.com/uploads/2018/2/3a53f2f6-58b7-4a2f-951d-152c724acd07-thumb.jpg)](https://webcompat.com/uploads/2018/2/3a53f2f6-58b7-4a2f-951d-152c724acd07.jpg) _From [webcompat.com](https://webcompat.com/) with ❤️_
non_process
video or audio doesn t play url browser version firefox operating system windows tested another browser yes problem type video or audio doesn t play description the video and audio not playing steps to reproduce cnn ibn indian news channel live tv streaming not working gfx webrender all false gfx webrender blob images gfx webrender enabled false image mem shared from with ❤️
0
2,497
5,271,296,991
IssuesEvent
2017-02-06 09:14:39
openvstorage/alba
https://api.github.com/repos/openvstorage/alba
closed
[ASD] error during client request: Prelude.DecodingFailure("bool: invalid tag 0x61")
priority_normal process_cantreproduce type_bug
While performing a fio test on a vpool we saw this error on a ASD: This happened during this test: https://github.com/ovs-projects/org_quality/issues/22 Also the volumedriver and proxy communication between each other has been changed to `TCP` in addition to the above ticket. ``` 2016-08-11 13:50:25 393301 +0200 - str02 - 19600/0 - alba/asd - 293 - info - server: new client connection from (172.19.12.141,41983) 2016-08-11 13:50:26 700716 +0200 - str02 - 19600/0 - alba/asd - 294 - info - reading from fd: 632120B in 11 steps 2016-08-11 13:50:37 665169 +0200 - str02 - 19600/0 - alba/asd - 295 - info - reading from fd: 994966B in 19 steps 2016-08-11 13:50:46 102283 +0200 - str02 - 19600/0 - alba/asd - 296 - info - maxrss:44920 KB, allocated:44227.726562, minor_collections:23, major_collections:2, c ompactions:0, heap_words:491520 2016-08-11 13:50:46 102540 +0200 - str02 - 19600/0 - alba/asd - 297 - info - {; creation: 2016/08/11_11:59:45.5895;; period: 0.00;; Statistics : { St at.Stat.n = 26L; avg = 3.29567835881e-05; exp_avg = 3.01622883747e-05;; m2 = 7.05007061277e-10; var = 2.82002824511e-11; min = 2.59876251221e-05;; max = 4.816 05529785e-05; alpha = 0.9 };; Range : { Stat.Stat.n = 8L; avg = 0.000156342983246; exp_avg = 9.02095691323e-05;; m2 = 6.02412342232e-09; var = 8.605890603 32e-10; min = 0.000131845474243;; max = 0.000211000442505; alpha = 0.9 };; MultiGet2 : { Stat.Stat.n = 27L; avg = 0.181439823574; exp_avg = 0.179720160651; ; m2 = 1.28912914898; var = 0.0495818903454; min = 7.5101852417e-05;; max = 0.515853881836; alpha = 0.9 };; Apply : { Stat.Stat.n = 41L; avg = 0.02284 1971095; exp_avg = 0.0594903363469;; m2 = 0.339744026786; var = 0.00849360066964; min = 0.000402927398682;; max = 0.485781908035; alpha = 0.9 };; GetD iskUsage : { Stat.Stat.n = 241L; avg = 2.39625511328e-05; exp_avg = 2.55106568546e-05;; m2 = 1.36671042505e-08; var = 5.69462677106e-11; min = 1.09672546387e-05 ;; max = 7.10487365723e-05; alpha = 0.9 };; Capabilities : { Stat.Stat.n = 215L; avg = 2.27717466133e-05; exp_avg = 1.98782618404e-05;; m2 = 9.26478362597 e-07; var = 4.32933814298e-09; min = 1.09672546387e-05;; max = 0.000981092453003; alpha = 0.9 };; } 2016-08-11 13:50:55 99090 +0200 - str02 - 19600/0 - alba/asd - 298 - info - server: new client connection from (172.19.12.141,36427) 2016-08-11 13:50:55 124672 +0200 - str02 - 19600/0 - alba/asd - 299 - info - reading from fd: 524317B in 10 steps 2016-08-11 13:50:55 227253 +0200 - str02 - 19600/0 - alba/asd - 300 - info - server: new client connection from (172.19.12.141,53341) 2016-08-11 13:50:55 231251 +0200 - str02 - 19600/0 - alba/asd - 301 - info - server: new client connection from (172.19.12.141,50379) 2016-08-11 13:50:55 248783 +0200 - str02 - 19600/0 - alba/asd - 302 - info - reading from fd: 626562B in 9 steps 2016-08-11 13:50:57 163284 +0200 - str02 - 19600/0 - alba/asd - 303 - info - reading from fd: 873788B in 22 steps 2016-08-11 13:50:57 172183 +0200 - str02 - 19600/0 - alba/asd - 304 - info - server: new client connection from (172.19.12.141,40760) 2016-08-11 13:50:57 177460 +0200 - str02 - 19600/0 - alba/asd - 305 - info - reading from fd: 524317B in 12 steps 2016-08-11 13:51:12 407829 +0200 - str02 - 19600/0 - alba/asd - 306 - info - server: new client connection from (172.19.12.141,59907) 2016-08-11 13:51:12 418011 +0200 - str02 - 19600/0 - alba/asd - 307 - info - reading from fd: 524317B in 10 steps 2016-08-11 13:51:29 742925 +0200 - str02 - 19600/0 - alba/asd - 308 - info - reading from fd: 961892B in 13 steps 2016-08-11 13:51:29 743125 +0200 - str02 - 19600/0 - alba/asd - 309 - info - error during client request: Prelude.DecodingFailure("bool: invalid tag 0x61"): Prelu de.DecodingFailure("bool: invalid tag 0x61"); backtrace:; Raised at file "map.ml", line 117, characters 16-25; Called from file "lib/conv.ml", line 213, character s 10-37 2016-08-11 13:51:29 800545 +0200 - str02 - 19600/0 - alba/asd - 310 - info - server: new client connection from (172.19.12.141,43535) 2016-08-11 13:51:29 807454 +0200 - str02 - 19600/0 - alba/asd - 311 - info - server: new client connection from (172.19.12.141,57840) 2016-08-11 13:51:29 816725 +0200 - str02 - 19600/0 - alba/asd - 312 - info - server: new client connection from (172.19.12.141,36049) 2016-08-11 13:51:29 817703 +0200 - str02 - 19600/0 - alba/asd - 313 - info - reading from fd: 795581B in 15 steps 2016-08-11 13:51:29 829866 +0200 - str02 - 19600/0 - alba/asd - 314 - info - server: new client connection from (172.19.12.141,40300) 2016-08-11 13:51:46 109014 +0200 - str02 - 19600/0 - alba/asd - 315 - info - maxrss:45556 KB, allocated:46280.390625, minor_collections:24, major_collections:2, c ompactions:0, heap_words:491520 2016-08-11 13:51:46 109317 +0200 - str02 - 19600/0 - alba/asd - 316 - info - {; creation: 2016/08/11_11:59:45.5895;; period: 0.00;; Statistics : { St at.Stat.n = 26L; avg = 3.29567835881e-05; exp_avg = 3.01622883747e-05;; m2 = 7.05007061277e-10; var = 2.82002824511e-11; min = 2.59876251221e-05;; max = 4.816 05529785e-05; alpha = 0.9 };; Range : { Stat.Stat.n = 8L; avg = 0.000156342983246; exp_avg = 9.02095691323e-05;; m2 = 6.02412342232e-09; var = 8.605890603 32e-10; min = 0.000131845474243;; max = 0.000211000442505; alpha = 0.9 };; MultiGet2 : { Stat.Stat.n = 27L; avg = 0.181439823574; exp_avg = 0.179720160651; ; m2 = 1.28912914898; var = 0.0495818903454; min = 7.5101852417e-05;; max = 0.515853881836; alpha = 0.9 };; Apply : { Stat.Stat.n = 48L; avg = 0.02009 16876396; exp_avg = 0.0304088216659;; m2 = 0.341921908771; var = 0.00727493422917; min = 0.000211000442505;; max = 0.485781908035; alpha = 0.9 };; GetD iskUsage : { Stat.Stat.n = 243L; avg = 2.39340856733e-05; exp_avg = 2.454508652e-05;; m2 = 1.36949232604e-08; var = 5.65905919849e-11; min = 1.09672546387e-05;; max = 7.10487365723e-05; alpha = 0.9 };; Capabilities : { Stat.Stat.n = 217L; avg = 2.26959105461e-05; exp_avg = 1.88598950509e-05;; m2 = 9.26612976341 e-07; var = 4.28987489047e-09; min = 1.09672546387e-05;; max = 0.000981092453003; alpha = 0.9 };; } 2016-08-11 13:51:47 35859 +0200 - str02 - 19600/0 - alba/asd - 317 - info - server: new client connection from (172.19.12.141,51713) 2016-08-11 13:51:47 129868 +0200 - str02 - 19600/0 - alba/asd - 318 - info - server: new client connection from (172.19.12.141,39204) ```
1.0
[ASD] error during client request: Prelude.DecodingFailure("bool: invalid tag 0x61") - While performing a fio test on a vpool we saw this error on a ASD: This happened during this test: https://github.com/ovs-projects/org_quality/issues/22 Also the volumedriver and proxy communication between each other has been changed to `TCP` in addition to the above ticket. ``` 2016-08-11 13:50:25 393301 +0200 - str02 - 19600/0 - alba/asd - 293 - info - server: new client connection from (172.19.12.141,41983) 2016-08-11 13:50:26 700716 +0200 - str02 - 19600/0 - alba/asd - 294 - info - reading from fd: 632120B in 11 steps 2016-08-11 13:50:37 665169 +0200 - str02 - 19600/0 - alba/asd - 295 - info - reading from fd: 994966B in 19 steps 2016-08-11 13:50:46 102283 +0200 - str02 - 19600/0 - alba/asd - 296 - info - maxrss:44920 KB, allocated:44227.726562, minor_collections:23, major_collections:2, c ompactions:0, heap_words:491520 2016-08-11 13:50:46 102540 +0200 - str02 - 19600/0 - alba/asd - 297 - info - {; creation: 2016/08/11_11:59:45.5895;; period: 0.00;; Statistics : { St at.Stat.n = 26L; avg = 3.29567835881e-05; exp_avg = 3.01622883747e-05;; m2 = 7.05007061277e-10; var = 2.82002824511e-11; min = 2.59876251221e-05;; max = 4.816 05529785e-05; alpha = 0.9 };; Range : { Stat.Stat.n = 8L; avg = 0.000156342983246; exp_avg = 9.02095691323e-05;; m2 = 6.02412342232e-09; var = 8.605890603 32e-10; min = 0.000131845474243;; max = 0.000211000442505; alpha = 0.9 };; MultiGet2 : { Stat.Stat.n = 27L; avg = 0.181439823574; exp_avg = 0.179720160651; ; m2 = 1.28912914898; var = 0.0495818903454; min = 7.5101852417e-05;; max = 0.515853881836; alpha = 0.9 };; Apply : { Stat.Stat.n = 41L; avg = 0.02284 1971095; exp_avg = 0.0594903363469;; m2 = 0.339744026786; var = 0.00849360066964; min = 0.000402927398682;; max = 0.485781908035; alpha = 0.9 };; GetD iskUsage : { Stat.Stat.n = 241L; avg = 2.39625511328e-05; exp_avg = 2.55106568546e-05;; m2 = 1.36671042505e-08; var = 5.69462677106e-11; min = 1.09672546387e-05 ;; max = 7.10487365723e-05; alpha = 0.9 };; Capabilities : { Stat.Stat.n = 215L; avg = 2.27717466133e-05; exp_avg = 1.98782618404e-05;; m2 = 9.26478362597 e-07; var = 4.32933814298e-09; min = 1.09672546387e-05;; max = 0.000981092453003; alpha = 0.9 };; } 2016-08-11 13:50:55 99090 +0200 - str02 - 19600/0 - alba/asd - 298 - info - server: new client connection from (172.19.12.141,36427) 2016-08-11 13:50:55 124672 +0200 - str02 - 19600/0 - alba/asd - 299 - info - reading from fd: 524317B in 10 steps 2016-08-11 13:50:55 227253 +0200 - str02 - 19600/0 - alba/asd - 300 - info - server: new client connection from (172.19.12.141,53341) 2016-08-11 13:50:55 231251 +0200 - str02 - 19600/0 - alba/asd - 301 - info - server: new client connection from (172.19.12.141,50379) 2016-08-11 13:50:55 248783 +0200 - str02 - 19600/0 - alba/asd - 302 - info - reading from fd: 626562B in 9 steps 2016-08-11 13:50:57 163284 +0200 - str02 - 19600/0 - alba/asd - 303 - info - reading from fd: 873788B in 22 steps 2016-08-11 13:50:57 172183 +0200 - str02 - 19600/0 - alba/asd - 304 - info - server: new client connection from (172.19.12.141,40760) 2016-08-11 13:50:57 177460 +0200 - str02 - 19600/0 - alba/asd - 305 - info - reading from fd: 524317B in 12 steps 2016-08-11 13:51:12 407829 +0200 - str02 - 19600/0 - alba/asd - 306 - info - server: new client connection from (172.19.12.141,59907) 2016-08-11 13:51:12 418011 +0200 - str02 - 19600/0 - alba/asd - 307 - info - reading from fd: 524317B in 10 steps 2016-08-11 13:51:29 742925 +0200 - str02 - 19600/0 - alba/asd - 308 - info - reading from fd: 961892B in 13 steps 2016-08-11 13:51:29 743125 +0200 - str02 - 19600/0 - alba/asd - 309 - info - error during client request: Prelude.DecodingFailure("bool: invalid tag 0x61"): Prelu de.DecodingFailure("bool: invalid tag 0x61"); backtrace:; Raised at file "map.ml", line 117, characters 16-25; Called from file "lib/conv.ml", line 213, character s 10-37 2016-08-11 13:51:29 800545 +0200 - str02 - 19600/0 - alba/asd - 310 - info - server: new client connection from (172.19.12.141,43535) 2016-08-11 13:51:29 807454 +0200 - str02 - 19600/0 - alba/asd - 311 - info - server: new client connection from (172.19.12.141,57840) 2016-08-11 13:51:29 816725 +0200 - str02 - 19600/0 - alba/asd - 312 - info - server: new client connection from (172.19.12.141,36049) 2016-08-11 13:51:29 817703 +0200 - str02 - 19600/0 - alba/asd - 313 - info - reading from fd: 795581B in 15 steps 2016-08-11 13:51:29 829866 +0200 - str02 - 19600/0 - alba/asd - 314 - info - server: new client connection from (172.19.12.141,40300) 2016-08-11 13:51:46 109014 +0200 - str02 - 19600/0 - alba/asd - 315 - info - maxrss:45556 KB, allocated:46280.390625, minor_collections:24, major_collections:2, c ompactions:0, heap_words:491520 2016-08-11 13:51:46 109317 +0200 - str02 - 19600/0 - alba/asd - 316 - info - {; creation: 2016/08/11_11:59:45.5895;; period: 0.00;; Statistics : { St at.Stat.n = 26L; avg = 3.29567835881e-05; exp_avg = 3.01622883747e-05;; m2 = 7.05007061277e-10; var = 2.82002824511e-11; min = 2.59876251221e-05;; max = 4.816 05529785e-05; alpha = 0.9 };; Range : { Stat.Stat.n = 8L; avg = 0.000156342983246; exp_avg = 9.02095691323e-05;; m2 = 6.02412342232e-09; var = 8.605890603 32e-10; min = 0.000131845474243;; max = 0.000211000442505; alpha = 0.9 };; MultiGet2 : { Stat.Stat.n = 27L; avg = 0.181439823574; exp_avg = 0.179720160651; ; m2 = 1.28912914898; var = 0.0495818903454; min = 7.5101852417e-05;; max = 0.515853881836; alpha = 0.9 };; Apply : { Stat.Stat.n = 48L; avg = 0.02009 16876396; exp_avg = 0.0304088216659;; m2 = 0.341921908771; var = 0.00727493422917; min = 0.000211000442505;; max = 0.485781908035; alpha = 0.9 };; GetD iskUsage : { Stat.Stat.n = 243L; avg = 2.39340856733e-05; exp_avg = 2.454508652e-05;; m2 = 1.36949232604e-08; var = 5.65905919849e-11; min = 1.09672546387e-05;; max = 7.10487365723e-05; alpha = 0.9 };; Capabilities : { Stat.Stat.n = 217L; avg = 2.26959105461e-05; exp_avg = 1.88598950509e-05;; m2 = 9.26612976341 e-07; var = 4.28987489047e-09; min = 1.09672546387e-05;; max = 0.000981092453003; alpha = 0.9 };; } 2016-08-11 13:51:47 35859 +0200 - str02 - 19600/0 - alba/asd - 317 - info - server: new client connection from (172.19.12.141,51713) 2016-08-11 13:51:47 129868 +0200 - str02 - 19600/0 - alba/asd - 318 - info - server: new client connection from (172.19.12.141,39204) ```
process
error during client request prelude decodingfailure bool invalid tag while performing a fio test on a vpool we saw this error on a asd this happened during this test also the volumedriver and proxy communication between each other has been changed to tcp in addition to the above ticket alba asd info server new client connection from alba asd info reading from fd in steps alba asd info reading from fd in steps alba asd info maxrss kb allocated minor collections major collections c ompactions heap words alba asd info creation period statistics st at stat n avg exp avg var min max alpha range stat stat n avg exp avg var min max alpha stat stat n avg exp avg var min max alpha apply stat stat n avg exp avg var min max alpha getd iskusage stat stat n avg exp avg var min max alpha capabilities stat stat n avg exp avg e var min max alpha alba asd info server new client connection from alba asd info reading from fd in steps alba asd info server new client connection from alba asd info server new client connection from alba asd info reading from fd in steps alba asd info reading from fd in steps alba asd info server new client connection from alba asd info reading from fd in steps alba asd info server new client connection from alba asd info reading from fd in steps alba asd info reading from fd in steps alba asd info error during client request prelude decodingfailure bool invalid tag prelu de decodingfailure bool invalid tag backtrace raised at file map ml line characters called from file lib conv ml line character s alba asd info server new client connection from alba asd info server new client connection from alba asd info server new client connection from alba asd info reading from fd in steps alba asd info server new client connection from alba asd info maxrss kb allocated minor collections major collections c ompactions heap words alba asd info creation period statistics st at stat n avg exp avg var min max alpha range stat stat n avg exp avg var min max alpha stat stat n avg exp avg var min max alpha apply stat stat n avg exp avg var min max alpha getd iskusage stat stat n avg exp avg var min max alpha capabilities stat stat n avg exp avg e var min max alpha alba asd info server new client connection from alba asd info server new client connection from
1
506
2,962,690,460
IssuesEvent
2015-07-10 03:12:56
spootTheLousy/saguaro
https://api.github.com/repos/spootTheLousy/saguaro
closed
Transparent image thumbnails have a black background
Bug: Minor Cosmetic change Image processing
Transparent PNG/GIF thumbnails don't maintain their transparent background.
1.0
Transparent image thumbnails have a black background - Transparent PNG/GIF thumbnails don't maintain their transparent background.
process
transparent image thumbnails have a black background transparent png gif thumbnails don t maintain their transparent background
1
5,522
8,381,047,152
IssuesEvent
2018-10-07 20:46:47
MichiganDataScienceTeam/googleanalytics
https://api.github.com/repos/MichiganDataScienceTeam/googleanalytics
opened
Preprocess: u'geoNetwork.networkDomain', u'geoNetwork.networkLocation', u'geoNetwork.region', u'geoNetwork.subContinent',
easy preprocessing
Preprocess the following features: u'geoNetwork.networkDomain', u'geoNetwork.networkLocation', u'geoNetwork.region', u'geoNetwork.subContinent', 1. Standardization: [http://scikit-learn.org/stable/modules/preprocessing.html#standardization-or-mean-removal-and-variance-scaling](http://scikit-learn.org/stable/modules/preprocessing.html#standardization-or-mean-removal-and-variance-scaling) 2. Impute missing values: [http://scikit-learn.org/stable/modules/impute.html](http://scikit-learn.org/stable/modules/impute.html) 3. Normalization: [http://scikit-learn.org/stable/modules/preprocessing.html#normalization](http://scikit-learn.org/stable/modules/preprocessing.html#normalization) 4. Encode categorical features (optional): [http://scikit-learn.org/stable/modules/preprocessing.html#encoding-categorical-features](http://scikit-learn.org/stable/modules/preprocessing.html#encoding-categorical-features) 5. Discretization (optional): [http://scikit-learn.org/stable/modules/preprocessing.html#discretization](http://scikit-learn.org/stable/modules/preprocessing.html#discretization) [http://scikit-learn.org/stable/modules/preprocessing.html](http://scikit-learn.org/stable/modules/preprocessing.html)
1.0
Preprocess: u'geoNetwork.networkDomain', u'geoNetwork.networkLocation', u'geoNetwork.region', u'geoNetwork.subContinent', - Preprocess the following features: u'geoNetwork.networkDomain', u'geoNetwork.networkLocation', u'geoNetwork.region', u'geoNetwork.subContinent', 1. Standardization: [http://scikit-learn.org/stable/modules/preprocessing.html#standardization-or-mean-removal-and-variance-scaling](http://scikit-learn.org/stable/modules/preprocessing.html#standardization-or-mean-removal-and-variance-scaling) 2. Impute missing values: [http://scikit-learn.org/stable/modules/impute.html](http://scikit-learn.org/stable/modules/impute.html) 3. Normalization: [http://scikit-learn.org/stable/modules/preprocessing.html#normalization](http://scikit-learn.org/stable/modules/preprocessing.html#normalization) 4. Encode categorical features (optional): [http://scikit-learn.org/stable/modules/preprocessing.html#encoding-categorical-features](http://scikit-learn.org/stable/modules/preprocessing.html#encoding-categorical-features) 5. Discretization (optional): [http://scikit-learn.org/stable/modules/preprocessing.html#discretization](http://scikit-learn.org/stable/modules/preprocessing.html#discretization) [http://scikit-learn.org/stable/modules/preprocessing.html](http://scikit-learn.org/stable/modules/preprocessing.html)
process
preprocess u geonetwork networkdomain u geonetwork networklocation u geonetwork region u geonetwork subcontinent preprocess the following features u geonetwork networkdomain u geonetwork networklocation u geonetwork region u geonetwork subcontinent standardization impute missing values normalization encode categorical features optional discretization optional
1
10,610
2,957,358,339
IssuesEvent
2015-07-08 15:58:41
guardian/frontend
https://api.github.com/repos/guardian/frontend
closed
Container's too tall when cut out involved
design input required Reproduced
Hello, I have seen it many times, but just now had it reported by Editorial and we've confirmed that editing in fronts tool can't really resolve it... Also, sorry, but I do not know the terminology for differently sized tiles/cards/items... When the cut out is displayed on very big tile, the adjacent boosted very big tile has an empty space below image, like so (Newtork Front, highlights, desktop BP, all browsers): ![empty space when cut out](https://cloud.githubusercontent.com/assets/6032869/7392222/64ea96da-ee7e-11e4-9f9f-3461875a1f89.jpg) The **only** way to resolve it (bar removing the cut out) is to make sure that the tile with it has only three lines of text (including byline text) which is not a realistic solution. One way to fix it would be to reduce the size of the cut out on this particular combination. Even better would be to make it dynamic depending on the amount of text. As reported by Fergal A. and Nick D. Loosely related to: https://github.com/guardian/frontend/issues/8935 Regards Mateusz
1.0
Container's too tall when cut out involved - Hello, I have seen it many times, but just now had it reported by Editorial and we've confirmed that editing in fronts tool can't really resolve it... Also, sorry, but I do not know the terminology for differently sized tiles/cards/items... When the cut out is displayed on very big tile, the adjacent boosted very big tile has an empty space below image, like so (Newtork Front, highlights, desktop BP, all browsers): ![empty space when cut out](https://cloud.githubusercontent.com/assets/6032869/7392222/64ea96da-ee7e-11e4-9f9f-3461875a1f89.jpg) The **only** way to resolve it (bar removing the cut out) is to make sure that the tile with it has only three lines of text (including byline text) which is not a realistic solution. One way to fix it would be to reduce the size of the cut out on this particular combination. Even better would be to make it dynamic depending on the amount of text. As reported by Fergal A. and Nick D. Loosely related to: https://github.com/guardian/frontend/issues/8935 Regards Mateusz
non_process
container s too tall when cut out involved hello i have seen it many times but just now had it reported by editorial and we ve confirmed that editing in fronts tool can t really resolve it also sorry but i do not know the terminology for differently sized tiles cards items when the cut out is displayed on very big tile the adjacent boosted very big tile has an empty space below image like so newtork front highlights desktop bp all browsers the only way to resolve it bar removing the cut out is to make sure that the tile with it has only three lines of text including byline text which is not a realistic solution one way to fix it would be to reduce the size of the cut out on this particular combination even better would be to make it dynamic depending on the amount of text as reported by fergal a and nick d loosely related to regards mateusz
0
5,036
7,853,049,936
IssuesEvent
2018-06-20 16:11:22
AlexsLemonade/refinebio
https://api.github.com/repos/AlexsLemonade/refinebio
opened
Add Capabilities to Process and Smash Externally Supplied Data
processor smasher
### Context It's quite likely that there will be researchers who will want to combine `refine.bio`-provided data with their own private data repositories. It'd be great if we provided some functionality to make this easier for them by either running through our processors, gene-converters and smasher. Off the top of my head, I'm imagining that this could be new management command to live inside a processor/smasher Dockerfile and a small script with documentation to wire everything up together. But I'm certainly open to suggestions here! This would also improve our own testing abilities. ### Problem or idea I think this could be a good project for @Willv19 to take on if @kurtwheeler doesn't have a grander plan in mind. ### Solution or next step Next step would probably to put some bounds on the requirements here - what kind of private data is a researcher most likely to have? Will it need to be processed, or just gene-conversion, or even just smashing?
1.0
Add Capabilities to Process and Smash Externally Supplied Data - ### Context It's quite likely that there will be researchers who will want to combine `refine.bio`-provided data with their own private data repositories. It'd be great if we provided some functionality to make this easier for them by either running through our processors, gene-converters and smasher. Off the top of my head, I'm imagining that this could be new management command to live inside a processor/smasher Dockerfile and a small script with documentation to wire everything up together. But I'm certainly open to suggestions here! This would also improve our own testing abilities. ### Problem or idea I think this could be a good project for @Willv19 to take on if @kurtwheeler doesn't have a grander plan in mind. ### Solution or next step Next step would probably to put some bounds on the requirements here - what kind of private data is a researcher most likely to have? Will it need to be processed, or just gene-conversion, or even just smashing?
process
add capabilities to process and smash externally supplied data context it s quite likely that there will be researchers who will want to combine refine bio provided data with their own private data repositories it d be great if we provided some functionality to make this easier for them by either running through our processors gene converters and smasher off the top of my head i m imagining that this could be new management command to live inside a processor smasher dockerfile and a small script with documentation to wire everything up together but i m certainly open to suggestions here this would also improve our own testing abilities problem or idea i think this could be a good project for to take on if kurtwheeler doesn t have a grander plan in mind solution or next step next step would probably to put some bounds on the requirements here what kind of private data is a researcher most likely to have will it need to be processed or just gene conversion or even just smashing
1
4,424
7,302,533,359
IssuesEvent
2018-02-27 10:00:50
qgis/QGIS-Documentation
https://api.github.com/repos/qgis/QGIS-Documentation
closed
[needs-docs] Update label in Options dialog, replacing node by vertex
Automatic new feature Easy Processing Screenshots
Original commit: https://github.com/qgis/QGIS/commit/3316d1ba86417ca7b84081a94358df2d7c8f1f7b by DelazJ Unfortunately this naughty coder did not write a description... :-(
1.0
[needs-docs] Update label in Options dialog, replacing node by vertex - Original commit: https://github.com/qgis/QGIS/commit/3316d1ba86417ca7b84081a94358df2d7c8f1f7b by DelazJ Unfortunately this naughty coder did not write a description... :-(
process
update label in options dialog replacing node by vertex original commit by delazj unfortunately this naughty coder did not write a description
1
19,658
26,018,546,459
IssuesEvent
2022-12-21 10:33:46
parcel-bundler/parcel
https://api.github.com/repos/parcel-bundler/parcel
reopened
PostHTML deletes PHP tags, ignores `directives` configuration
:bug: Bug Good First Issue HTML Preprocessing Stale
# 🐛 bug report Parcel (resp. PostHTML) deletes PHP tags from HTML input files during transformation. It also ignores any `directives` options in `.posthtmlrc` that are supposed to preserve them. ## 🎛 Configuration Minimal default configuration, see below. ## 🤔 Expected Behavior The resulting file should contain all `<?= ... ?>` and `<?php ... ?>` tags in the input file as-is. ## 😯 Current Behavior The tags are removed. ## 💁 Possible Solution Don't know, [this issue](https://github.com/parcel-bundler/parcel/issues/3975), which was wrongfully closed by the stale bot, contains some remarks that are probably outdated by now. ## 🔦 Context The bug makes it impossible to include PHP snippets in bundled HTML files, which is a hard requirement for one of my current projects. ## 💻 Code Sample **Reproduction** https://github.com/schuetzm/parcel-deletes-php-tags **index.html** ```html <!DOCTYPE html> <html> <head> </head> <body> <user-defined-tag>This is preserved.</user-defined-tag> <?php phpinfo(); ?> The above tag is removed. </body> </html> ``` **.posthtmlrc** ```json { "render": { "directives": [{"name": "?php", "start": "<", "end": ">"}] }, "directives": [{"name": "?php", "start": "<", "end": ">"}], "plugins": { } } ``` ## 🌍 Your Environment <!--- Include as many relevant details about the environment you experienced the bug in --> | Software | Version(s) | | ---------------- | ---------- | | Parcel | 2.5.0 | Node | 14.9.1 | npm/Yarn | Yarn 1.22.17 | Operating System | openSUSE 15.3
1.0
PostHTML deletes PHP tags, ignores `directives` configuration - # 🐛 bug report Parcel (resp. PostHTML) deletes PHP tags from HTML input files during transformation. It also ignores any `directives` options in `.posthtmlrc` that are supposed to preserve them. ## 🎛 Configuration Minimal default configuration, see below. ## 🤔 Expected Behavior The resulting file should contain all `<?= ... ?>` and `<?php ... ?>` tags in the input file as-is. ## 😯 Current Behavior The tags are removed. ## 💁 Possible Solution Don't know, [this issue](https://github.com/parcel-bundler/parcel/issues/3975), which was wrongfully closed by the stale bot, contains some remarks that are probably outdated by now. ## 🔦 Context The bug makes it impossible to include PHP snippets in bundled HTML files, which is a hard requirement for one of my current projects. ## 💻 Code Sample **Reproduction** https://github.com/schuetzm/parcel-deletes-php-tags **index.html** ```html <!DOCTYPE html> <html> <head> </head> <body> <user-defined-tag>This is preserved.</user-defined-tag> <?php phpinfo(); ?> The above tag is removed. </body> </html> ``` **.posthtmlrc** ```json { "render": { "directives": [{"name": "?php", "start": "<", "end": ">"}] }, "directives": [{"name": "?php", "start": "<", "end": ">"}], "plugins": { } } ``` ## 🌍 Your Environment <!--- Include as many relevant details about the environment you experienced the bug in --> | Software | Version(s) | | ---------------- | ---------- | | Parcel | 2.5.0 | Node | 14.9.1 | npm/Yarn | Yarn 1.22.17 | Operating System | openSUSE 15.3
process
posthtml deletes php tags ignores directives configuration 🐛 bug report parcel resp posthtml deletes php tags from html input files during transformation it also ignores any directives options in posthtmlrc that are supposed to preserve them 🎛 configuration minimal default configuration see below 🤔 expected behavior the resulting file should contain all and tags in the input file as is 😯 current behavior the tags are removed 💁 possible solution don t know which was wrongfully closed by the stale bot contains some remarks that are probably outdated by now 🔦 context the bug makes it impossible to include php snippets in bundled html files which is a hard requirement for one of my current projects 💻 code sample reproduction index html html this is preserved the above tag is removed posthtmlrc json render directives directives plugins 🌍 your environment software version s parcel node npm yarn yarn operating system opensuse
1
10,196
13,058,973,965
IssuesEvent
2020-07-30 09:52:28
prisma/e2e-tests
https://api.github.com/repos/prisma/e2e-tests
opened
Explicitly set `CI=1` on all systems we run the CLI in any form
kind/feature process/candidate
Github Actions, but also all the providers and hosts etc.
1.0
Explicitly set `CI=1` on all systems we run the CLI in any form - Github Actions, but also all the providers and hosts etc.
process
explicitly set ci on all systems we run the cli in any form github actions but also all the providers and hosts etc
1
359,551
10,677,930,503
IssuesEvent
2019-10-21 16:16:38
googleapis/nodejs-pubsub
https://api.github.com/repos/googleapis/nodejs-pubsub
reopened
not all grpc libraries are consistently installing 0.6.9 dependency
priority: p1 type: bug
### Problem Some dependencies still pin on older versions of `grpc`. ### Original Message @ericpearson I've moved your comments here, since it's unrelated to the memory issues that are reported in #788 An update here on our issues: We use a ton of google libraries (stackdriver trace, debug, cloud tasks, pubsub etc). They all seem to share the same common dependecies what I did was go into the package-lock and update all of these to make sure they are pinned at grpc-js 0.6.9 and pinned google-gax which a lot of them depend on to 1.7.5. This has resolved most of the issues we were having across multiple client libraries (this issue is not limited to pubsub). This was more effective than just pinning 0.6.9 in the package.json, which caused a ton of memory leaks and did not fix the timeout issues. It seems to be that there are a lot of problems or conflicts with other google libraries using different versions of grpc-js and google-gax (this looks like the brains behind things). We also had issues where google-gax was upgraded, stopped working and when we attempted to downgrade again, completely killled our developers machines and pubsub wouldn't even work locally until their machines were rebooted. This seems similar to the issues observed when running in the cloud. Is some sort of weird state keeping going on in here? This would also maybe explain the versions conflicting with each other. As of writing we are still seeing message timeouts but they are not on the scale as they were before but we are still impacted by this issue.
1.0
not all grpc libraries are consistently installing 0.6.9 dependency - ### Problem Some dependencies still pin on older versions of `grpc`. ### Original Message @ericpearson I've moved your comments here, since it's unrelated to the memory issues that are reported in #788 An update here on our issues: We use a ton of google libraries (stackdriver trace, debug, cloud tasks, pubsub etc). They all seem to share the same common dependecies what I did was go into the package-lock and update all of these to make sure they are pinned at grpc-js 0.6.9 and pinned google-gax which a lot of them depend on to 1.7.5. This has resolved most of the issues we were having across multiple client libraries (this issue is not limited to pubsub). This was more effective than just pinning 0.6.9 in the package.json, which caused a ton of memory leaks and did not fix the timeout issues. It seems to be that there are a lot of problems or conflicts with other google libraries using different versions of grpc-js and google-gax (this looks like the brains behind things). We also had issues where google-gax was upgraded, stopped working and when we attempted to downgrade again, completely killled our developers machines and pubsub wouldn't even work locally until their machines were rebooted. This seems similar to the issues observed when running in the cloud. Is some sort of weird state keeping going on in here? This would also maybe explain the versions conflicting with each other. As of writing we are still seeing message timeouts but they are not on the scale as they were before but we are still impacted by this issue.
non_process
not all grpc libraries are consistently installing dependency problem some dependencies still pin on older versions of grpc original message ericpearson i ve moved your comments here since it s unrelated to the memory issues that are reported in an update here on our issues we use a ton of google libraries stackdriver trace debug cloud tasks pubsub etc they all seem to share the same common dependecies what i did was go into the package lock and update all of these to make sure they are pinned at grpc js and pinned google gax which a lot of them depend on to this has resolved most of the issues we were having across multiple client libraries this issue is not limited to pubsub this was more effective than just pinning in the package json which caused a ton of memory leaks and did not fix the timeout issues it seems to be that there are a lot of problems or conflicts with other google libraries using different versions of grpc js and google gax this looks like the brains behind things we also had issues where google gax was upgraded stopped working and when we attempted to downgrade again completely killled our developers machines and pubsub wouldn t even work locally until their machines were rebooted this seems similar to the issues observed when running in the cloud is some sort of weird state keeping going on in here this would also maybe explain the versions conflicting with each other as of writing we are still seeing message timeouts but they are not on the scale as they were before but we are still impacted by this issue
0
314,583
9,600,009,609
IssuesEvent
2019-05-10 08:18:34
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
tune.pk - see bug description
browser-firefox-tablet engine-gecko priority-normal
<!-- @browser: Firefox Mobile (Tablet) 67.0 --> <!-- @ua_header: Mozilla/5.0 (Android 5.1.1; Tablet; rv:67.0) Gecko/67.0 Firefox/67.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://tune.pk/ **Browser / Version**: Firefox Mobile (Tablet) 67.0 **Operating System**: Android 5.1.1 **Tested Another Browser**: No **Problem type**: Something else **Description**: page layout out of bounds **Steps to Reproduce**: Created a new account. All pages seemingly stretching to the right side on Mozilla Beta 67.0b18. I have the screenshot as well but unfortunately I am unable to find any control on this page to submit it currently. [![Screenshot Description](https://webcompat.com/uploads/2019/5/a5247698-1aab-40e3-9905-076cb2af2c65-thumb.jpeg)](https://webcompat.com/uploads/2019/5/a5247698-1aab-40e3-9905-076cb2af2c65.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190506235559</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: beta</li> </ul> <p>Console Messages:</p> <pre> [u'[JavaScript Warning: "Content Security Policy: Interpreting self as a hostname, not a keyword. If you intended this to be a keyword, use self (wrapped in single quotes)."]', u'[JavaScript Warning: "The resource at https://pk-gmtdmp.mookie1.com/t/v2/learn?tagid=V2_386595&src.rand=1557423680 was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.googletagservices.com/tag/js/gpt.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "Loading failed for the <script> with source https://tune.pk/plugins/cb_ads_manager/front_end/js/dist/master.js." {file: "https://tune.pk/" line: 622}]', u'[JavaScript Warning: "The resource at https://pk-gmtdmp.mookie1.com/t/v2/learn?tagid=V2_386595&src.rand=1557423680 was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.googletagservices.com/tag/js/gpt.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.google-analytics.com/analytics.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://mc.yandex.ru/metrika/tag.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://secure.quantserve.com/quant.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]'] </pre> </details> Submitted in the name of `@snasg` _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
tune.pk - see bug description - <!-- @browser: Firefox Mobile (Tablet) 67.0 --> <!-- @ua_header: Mozilla/5.0 (Android 5.1.1; Tablet; rv:67.0) Gecko/67.0 Firefox/67.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://tune.pk/ **Browser / Version**: Firefox Mobile (Tablet) 67.0 **Operating System**: Android 5.1.1 **Tested Another Browser**: No **Problem type**: Something else **Description**: page layout out of bounds **Steps to Reproduce**: Created a new account. All pages seemingly stretching to the right side on Mozilla Beta 67.0b18. I have the screenshot as well but unfortunately I am unable to find any control on this page to submit it currently. [![Screenshot Description](https://webcompat.com/uploads/2019/5/a5247698-1aab-40e3-9905-076cb2af2c65-thumb.jpeg)](https://webcompat.com/uploads/2019/5/a5247698-1aab-40e3-9905-076cb2af2c65.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190506235559</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: beta</li> </ul> <p>Console Messages:</p> <pre> [u'[JavaScript Warning: "Content Security Policy: Interpreting self as a hostname, not a keyword. If you intended this to be a keyword, use self (wrapped in single quotes)."]', u'[JavaScript Warning: "The resource at https://pk-gmtdmp.mookie1.com/t/v2/learn?tagid=V2_386595&src.rand=1557423680 was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.googletagservices.com/tag/js/gpt.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "Loading failed for the <script> with source https://tune.pk/plugins/cb_ads_manager/front_end/js/dist/master.js." {file: "https://tune.pk/" line: 622}]', u'[JavaScript Warning: "The resource at https://pk-gmtdmp.mookie1.com/t/v2/learn?tagid=V2_386595&src.rand=1557423680 was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.googletagservices.com/tag/js/gpt.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.google-analytics.com/analytics.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://mc.yandex.ru/metrika/tag.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://secure.quantserve.com/quant.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]'] </pre> </details> Submitted in the name of `@snasg` _From [webcompat.com](https://webcompat.com/) with ❤️_
non_process
tune pk see bug description url browser version firefox mobile tablet operating system android tested another browser no problem type something else description page layout out of bounds steps to reproduce created a new account all pages seemingly stretching to the right side on mozilla beta i have the screenshot as well but unfortunately i am unable to find any control on this page to submit it currently browser configuration mixed active content blocked false image mem shared true buildid tracking content blocked false gfx webrender blob images true hastouchscreen true mixed passive content blocked false gfx webrender enabled false gfx webrender all false channel beta console messages u u u u u u u u submitted in the name of snasg from with ❤️
0
22,274
30,823,445,635
IssuesEvent
2023-08-01 18:05:27
serai-dex/serai
https://api.github.com/repos/serai-dex/serai
opened
Automatically retry TXs which failed to submit
bug feature processor
Bitcoin, I believe, will reject perfectly valid TXs if its mempool is full. If all nodes have full mempools, this will cause a valid TX to fail to be published. The only solution for this is if we automatically retry publishing TXs, less we have to manually intervene and publish the TXs in question (requiring adding an RPC to view the locally saved TXs we failed to publish). While I note Bitcoin, this is a theoretical problem not exclusive to Bitcoin.
1.0
Automatically retry TXs which failed to submit - Bitcoin, I believe, will reject perfectly valid TXs if its mempool is full. If all nodes have full mempools, this will cause a valid TX to fail to be published. The only solution for this is if we automatically retry publishing TXs, less we have to manually intervene and publish the TXs in question (requiring adding an RPC to view the locally saved TXs we failed to publish). While I note Bitcoin, this is a theoretical problem not exclusive to Bitcoin.
process
automatically retry txs which failed to submit bitcoin i believe will reject perfectly valid txs if its mempool is full if all nodes have full mempools this will cause a valid tx to fail to be published the only solution for this is if we automatically retry publishing txs less we have to manually intervene and publish the txs in question requiring adding an rpc to view the locally saved txs we failed to publish while i note bitcoin this is a theoretical problem not exclusive to bitcoin
1
10,634
27,174,124,772
IssuesEvent
2023-02-17 22:40:44
Arquisoft/lomap_es5a
https://api.github.com/repos/Arquisoft/lomap_es5a
closed
ADR. Propuesta y decisión en relación a la arquitectura a definir para el lado del cliente
documentation 🏗️ architecture design
## Arquitectura lado del cliente de la aplicación. Tomar la decisión y completar la documentación relativa al ADR [https://github.com/Arquisoft/lomap_es5a/wiki/ADR.-Estructura-Cliente-%5BFront-End%5D](https://github.com/Arquisoft/lomap_es5a/wiki/ADR.-Estructura-Cliente-%5BFront-End%5D)
1.0
ADR. Propuesta y decisión en relación a la arquitectura a definir para el lado del cliente - ## Arquitectura lado del cliente de la aplicación. Tomar la decisión y completar la documentación relativa al ADR [https://github.com/Arquisoft/lomap_es5a/wiki/ADR.-Estructura-Cliente-%5BFront-End%5D](https://github.com/Arquisoft/lomap_es5a/wiki/ADR.-Estructura-Cliente-%5BFront-End%5D)
non_process
adr propuesta y decisión en relación a la arquitectura a definir para el lado del cliente arquitectura lado del cliente de la aplicación tomar la decisión y completar la documentación relativa al adr
0
8,325
11,489,877,197
IssuesEvent
2020-02-11 16:10:50
cypress-io/cypress
https://api.github.com/repos/cypress-io/cypress
closed
Broken links in CONTRIBUTING.md file
process: contributing stage: needs review type: chore
<!-- Is this a question? Questions WILL BE CLOSED. Ask in our chat https://on.cypress.io/chat --> ### Current behavior: Multiple broken links and a few typos in CONTRIBUTING.md - [x] _Blog about Cypress. We display blogs featuring Cypress on our Examples page. If you'd like your blog featured, **open a PR to add it to our docs**._ Broken link: https://github.com/cypress-io/cypress-documentation/blob/develop/.github/CONTRIBUTING.md#adding-examples - [x] _Write some documentation or improve our existing docs. Know another language? You can help us translate them. **See our guide to contributing to our docs**._ Broken link: https://github.com/cypress-io/cypress-documentation/blob/master/.github/CONTRIBUTING.md - [x] _Issues may be opened about wanting changes to our **documentation**, our example-kitchensink app, or another repository. In this case you should_ Broken link: https://github.com/cypress-io/cypress/blob/develop - [x] _Cypress documentation lives in a separate repository with its own dependencies and build tools. See **Documentation Contributing Guideline**._ Broken link: https://github.com/cypress-io/cypress-documentation/blob/master/.github/CONTRIBUTING.md - [x] _Fill out the **Pull Request Tempalte** completely within the body of the PR. If you feel some areas are not relevant add N/A as opposed to **deleteing** those sections. PR's will not be reviewed if this template is not filled in._ (Some typos) Broken link: https://github.com/cypress-io/cypress/blob/develop/PULL_REQUEST_TEMPLATE.md <!-- A description including screenshots, stack traces, DEBUG logs, etc --> ### Desired behavior: all links go to a real page 👍🏽 <!-- A clear description of what you want to happen --> ### Test code to reproduce N/A <!-- If we cannot fully run the tests as provided the issue WILL BE CLOSED --> <!-- Issues without a reproducible example WILL BE CLOSED --> <!-- You can fork https://github.com/cypress-io/cypress-test-tiny repo, set up a failing test, then link to your fork --> ### Versions <!-- Cypress, operating system, browser -->
1.0
Broken links in CONTRIBUTING.md file - <!-- Is this a question? Questions WILL BE CLOSED. Ask in our chat https://on.cypress.io/chat --> ### Current behavior: Multiple broken links and a few typos in CONTRIBUTING.md - [x] _Blog about Cypress. We display blogs featuring Cypress on our Examples page. If you'd like your blog featured, **open a PR to add it to our docs**._ Broken link: https://github.com/cypress-io/cypress-documentation/blob/develop/.github/CONTRIBUTING.md#adding-examples - [x] _Write some documentation or improve our existing docs. Know another language? You can help us translate them. **See our guide to contributing to our docs**._ Broken link: https://github.com/cypress-io/cypress-documentation/blob/master/.github/CONTRIBUTING.md - [x] _Issues may be opened about wanting changes to our **documentation**, our example-kitchensink app, or another repository. In this case you should_ Broken link: https://github.com/cypress-io/cypress/blob/develop - [x] _Cypress documentation lives in a separate repository with its own dependencies and build tools. See **Documentation Contributing Guideline**._ Broken link: https://github.com/cypress-io/cypress-documentation/blob/master/.github/CONTRIBUTING.md - [x] _Fill out the **Pull Request Tempalte** completely within the body of the PR. If you feel some areas are not relevant add N/A as opposed to **deleteing** those sections. PR's will not be reviewed if this template is not filled in._ (Some typos) Broken link: https://github.com/cypress-io/cypress/blob/develop/PULL_REQUEST_TEMPLATE.md <!-- A description including screenshots, stack traces, DEBUG logs, etc --> ### Desired behavior: all links go to a real page 👍🏽 <!-- A clear description of what you want to happen --> ### Test code to reproduce N/A <!-- If we cannot fully run the tests as provided the issue WILL BE CLOSED --> <!-- Issues without a reproducible example WILL BE CLOSED --> <!-- You can fork https://github.com/cypress-io/cypress-test-tiny repo, set up a failing test, then link to your fork --> ### Versions <!-- Cypress, operating system, browser -->
process
broken links in contributing md file current behavior multiple broken links and a few typos in contributing md blog about cypress we display blogs featuring cypress on our examples page if you d like your blog featured open a pr to add it to our docs broken link write some documentation or improve our existing docs know another language you can help us translate them see our guide to contributing to our docs broken link issues may be opened about wanting changes to our documentation our example kitchensink app or another repository in this case you should broken link cypress documentation lives in a separate repository with its own dependencies and build tools see documentation contributing guideline broken link fill out the pull request tempalte completely within the body of the pr if you feel some areas are not relevant add n a as opposed to deleteing those sections pr s will not be reviewed if this template is not filled in some typos broken link desired behavior all links go to a real page 👍🏽 test code to reproduce n a versions
1
685,541
23,460,090,639
IssuesEvent
2022-08-16 12:26:00
blindnet-io/product-management
https://api.github.com/repos/blindnet-io/product-management
closed
Search Filter Name Not Working
type: bug env: staging need: investigation priority: 2 (required)
When I enter just the name field and form type filters, the search still shows records clearly not fitting the criteria of this name. ![image](https://user-images.githubusercontent.com/317424/166669298-44e0d655-11de-46f5-867a-0a28815efa8d.png) Also, the interaction in PrivateForm is immagined with the idea of **reactivity** in mind, meaning that whenever the user inputs something, the system should repond with some sort of feedback (a noticable change, indicating the input has been taken into account). See [Ben Shneiderman's golden rule No3](http://www.cs.umd.edu/~ben/goldenrules.html). In this case, the user makes an input by typing the something in the name field. The user can see what they typed, but can naturally expect some additional feedback (like in the case of the choice of a form type, where the chosen type appears as a filter the user can remove). The system should respond at lest in one of the following ways: - show the name criteria taken into account AND/OR - change the results to filter-out those not fitting the name criteria
1.0
Search Filter Name Not Working - When I enter just the name field and form type filters, the search still shows records clearly not fitting the criteria of this name. ![image](https://user-images.githubusercontent.com/317424/166669298-44e0d655-11de-46f5-867a-0a28815efa8d.png) Also, the interaction in PrivateForm is immagined with the idea of **reactivity** in mind, meaning that whenever the user inputs something, the system should repond with some sort of feedback (a noticable change, indicating the input has been taken into account). See [Ben Shneiderman's golden rule No3](http://www.cs.umd.edu/~ben/goldenrules.html). In this case, the user makes an input by typing the something in the name field. The user can see what they typed, but can naturally expect some additional feedback (like in the case of the choice of a form type, where the chosen type appears as a filter the user can remove). The system should respond at lest in one of the following ways: - show the name criteria taken into account AND/OR - change the results to filter-out those not fitting the name criteria
non_process
search filter name not working when i enter just the name field and form type filters the search still shows records clearly not fitting the criteria of this name also the interaction in privateform is immagined with the idea of reactivity in mind meaning that whenever the user inputs something the system should repond with some sort of feedback a noticable change indicating the input has been taken into account see in this case the user makes an input by typing the something in the name field the user can see what they typed but can naturally expect some additional feedback like in the case of the choice of a form type where the chosen type appears as a filter the user can remove the system should respond at lest in one of the following ways show the name criteria taken into account and or change the results to filter out those not fitting the name criteria
0
638,104
20,712,812,388
IssuesEvent
2022-03-12 06:23:10
AY2122S2-CS2103T-W12-1/tp
https://api.github.com/repos/AY2122S2-CS2103T-W12-1/tp
closed
As a Teaching Assistant, I can know the number of students in each of my tutorial classes and their names
type.Story priority.High
... so that I can keep track of attendance for each session
1.0
As a Teaching Assistant, I can know the number of students in each of my tutorial classes and their names - ... so that I can keep track of attendance for each session
non_process
as a teaching assistant i can know the number of students in each of my tutorial classes and their names so that i can keep track of attendance for each session
0
28,643
4,425,234,102
IssuesEvent
2016-08-16 14:55:01
brave/browser-ios
https://api.github.com/repos/brave/browser-ios
closed
Manual tests for iPad 3 1.2.12 beta 1
checked by qa tests
## Installer 1. [x] Check that installer is close to the size of last release. 2. [ ] Check the Brave version in About and make sure it is EXACTLY as expected. ## Data 1. [ ] Make sure that data from the last version appears in the new version OK. 2. [ ] Test that the previous version's cookies are preserved in the next version. ## Bookmarks 1. [x] Test that creating a bookmark in the left well works 2. [x] Test that clicking a bookmark in the left well loads the bookmark. 3. [x] Test that deleting a bookmark in the left well works ## Context menus 1. [x] Make sure context menu items in the URL bar work 2. [x] Make sure context menu items on content work with no selected text. 3. [x] Make sure context menu items on content work with selected text. 4. [x] Make sure context menu items on content work inside an editable control (input, textarea, or contenteditable). ## Find on page 1. [x] Ensure search box is shown when selected via the share menu 2. [x] Test successful find 3. [x] Test forward and backward find navigation 4. [x] Test failed find shows 0 results ## Site hacks 1. [x] Test https://www.twitch.tv/adobe sub-page loads a video and you can play it ## Downloads 1. [x] Test downloading a file works and that all actions on the download item works. ## Fullscreen 1. [x] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com) ## Zoom 1. [x] Test zoom in / out gestures work 2. [x] Test that navigating to a different origin resets the zoom ## Bravery settings 1. [x] Check that HTTPS Everywhere works by loading http://www.apple.com 2. [x] Turning HTTPS Everywhere off and shields off both disable the redirect to https://www.apple.com 3. [x] Check that ad replacement works on http://slashdot.org 4. [x] Check that toggling to blocking and allow ads works as expected. 5. [x] Test that clicking through a cert error in https://badssl.com/ works. 6. [x] Test that Safe Browsing works (http://excellentmovies.net/) 7. [x] Turning Safe Browsing off and shields off both disable safe browsing for http://excellentmovies.net/. 8. [x] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work. 9. [x] Test that about:preferences default Bravery settings take effect on pages with no site settings. 10. [x] Test that turning on fingerprinting protection in about:preferences shows 3 fingerprints blocked at https://jsfiddle.net/bkf50r8v/13/. Test that turning it off in the Bravery menu shows 0 fingerprints blocked. 11. [x] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/7/ when 3rd party cookies are blocked. 12. [x] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on. ## Content tests 1. [x] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab. 2. [x] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows. 3. [x] Go to http://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown. 4. [x] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`. 5. [x] Open a github issue and type some misspellings, make sure they are underlined. 6. [x] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text. 7. [x] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded. 8. [x] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works. 9. [x] Test that PDF is loaded at http://www.orimi.com/pdf-test.pdf 10. [x] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run). ## Top sites view 1. [x] long-press on top sites to get to deletion mode, and delete a top site (note this will stop that site from showing up again on top sites, so you may not want to do this a site you want to keep there) ## Background 1. [x] Start loading a page, background the app, wait >5 sec, then bring to front, ensure splash screen is not shown ## Per release specialty tests 1. [ ] Test each item in release notes for the release that's going out. ## Session storage 1. [x] Test that tabs restore when closed, including active tab.
1.0
Manual tests for iPad 3 1.2.12 beta 1 - ## Installer 1. [x] Check that installer is close to the size of last release. 2. [ ] Check the Brave version in About and make sure it is EXACTLY as expected. ## Data 1. [ ] Make sure that data from the last version appears in the new version OK. 2. [ ] Test that the previous version's cookies are preserved in the next version. ## Bookmarks 1. [x] Test that creating a bookmark in the left well works 2. [x] Test that clicking a bookmark in the left well loads the bookmark. 3. [x] Test that deleting a bookmark in the left well works ## Context menus 1. [x] Make sure context menu items in the URL bar work 2. [x] Make sure context menu items on content work with no selected text. 3. [x] Make sure context menu items on content work with selected text. 4. [x] Make sure context menu items on content work inside an editable control (input, textarea, or contenteditable). ## Find on page 1. [x] Ensure search box is shown when selected via the share menu 2. [x] Test successful find 3. [x] Test forward and backward find navigation 4. [x] Test failed find shows 0 results ## Site hacks 1. [x] Test https://www.twitch.tv/adobe sub-page loads a video and you can play it ## Downloads 1. [x] Test downloading a file works and that all actions on the download item works. ## Fullscreen 1. [x] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com) ## Zoom 1. [x] Test zoom in / out gestures work 2. [x] Test that navigating to a different origin resets the zoom ## Bravery settings 1. [x] Check that HTTPS Everywhere works by loading http://www.apple.com 2. [x] Turning HTTPS Everywhere off and shields off both disable the redirect to https://www.apple.com 3. [x] Check that ad replacement works on http://slashdot.org 4. [x] Check that toggling to blocking and allow ads works as expected. 5. [x] Test that clicking through a cert error in https://badssl.com/ works. 6. [x] Test that Safe Browsing works (http://excellentmovies.net/) 7. [x] Turning Safe Browsing off and shields off both disable safe browsing for http://excellentmovies.net/. 8. [x] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work. 9. [x] Test that about:preferences default Bravery settings take effect on pages with no site settings. 10. [x] Test that turning on fingerprinting protection in about:preferences shows 3 fingerprints blocked at https://jsfiddle.net/bkf50r8v/13/. Test that turning it off in the Bravery menu shows 0 fingerprints blocked. 11. [x] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/7/ when 3rd party cookies are blocked. 12. [x] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on. ## Content tests 1. [x] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab. 2. [x] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows. 3. [x] Go to http://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown. 4. [x] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`. 5. [x] Open a github issue and type some misspellings, make sure they are underlined. 6. [x] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text. 7. [x] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded. 8. [x] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works. 9. [x] Test that PDF is loaded at http://www.orimi.com/pdf-test.pdf 10. [x] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run). ## Top sites view 1. [x] long-press on top sites to get to deletion mode, and delete a top site (note this will stop that site from showing up again on top sites, so you may not want to do this a site you want to keep there) ## Background 1. [x] Start loading a page, background the app, wait >5 sec, then bring to front, ensure splash screen is not shown ## Per release specialty tests 1. [ ] Test each item in release notes for the release that's going out. ## Session storage 1. [x] Test that tabs restore when closed, including active tab.
non_process
manual tests for ipad beta installer check that installer is close to the size of last release check the brave version in about and make sure it is exactly as expected data make sure that data from the last version appears in the new version ok test that the previous version s cookies are preserved in the next version bookmarks test that creating a bookmark in the left well works test that clicking a bookmark in the left well loads the bookmark test that deleting a bookmark in the left well works context menus make sure context menu items in the url bar work make sure context menu items on content work with no selected text make sure context menu items on content work with selected text make sure context menu items on content work inside an editable control input textarea or contenteditable find on page ensure search box is shown when selected via the share menu test successful find test forward and backward find navigation test failed find shows results site hacks test sub page loads a video and you can play it downloads test downloading a file works and that all actions on the download item works fullscreen test that entering full screen works and esc to go back youtube com zoom test zoom in out gestures work test that navigating to a different origin resets the zoom bravery settings check that https everywhere works by loading turning https everywhere off and shields off both disable the redirect to check that ad replacement works on check that toggling to blocking and allow ads works as expected test that clicking through a cert error in works test that safe browsing works turning safe browsing off and shields off both disable safe browsing for visit and then turn on script blocking nothing should load allow it from the script blocking ui in the url bar and it should work test that about preferences default bravery settings take effect on pages with no site settings test that turning on fingerprinting protection in about preferences shows fingerprints blocked at test that turning it off in the bravery menu shows fingerprints blocked test that party storage results are blank at when party cookies are blocked test that audio fingerprint is blocked at when fingerprinting protection is on content tests go to and click on the twitter icon on the top right test that context menus work in the new twitter tab load twitter and click on a tweet so the popup div shows click to dismiss and repeat with another div make sure it shows go to and test that clicking on show pops up a notification asking for permission make sure that clicking deny leads to no notifications being shown go to and make sure that the password can be saved make sure the saved password shows up in about passwords open a github issue and type some misspellings make sure they are underlined make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text make sure that command click control click on windows control click on ubuntu on a link opens a new tab but does not switch to it click on it and make sure it is already loaded open an email on or inbox google com and click on a link make sure it works test that pdf is loaded at test that shows up as grey not red no mixed content scripts are run top sites view long press on top sites to get to deletion mode and delete a top site note this will stop that site from showing up again on top sites so you may not want to do this a site you want to keep there background start loading a page background the app wait sec then bring to front ensure splash screen is not shown per release specialty tests test each item in release notes for the release that s going out session storage test that tabs restore when closed including active tab
0
140,336
31,898,232,604
IssuesEvent
2023-09-18 05:14:28
SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348
https://api.github.com/repos/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348
opened
Code Security Report: 24 high severity findings, 39 total findings
Mend: code security findings
# Code Security Report ### Scan Metadata **Latest Scan:** 2023-09-18 05:12am **Total Findings:** 39 | **New Findings:** 0 | **Resolved Findings:** 0 **Tested Project Files:** 422 **Detected Programming Languages:** 2 (JavaScript / Node.js, Java*) <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ### Most Relevant Findings > The below list presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend Application](https://dev.whitesourcesoftware.com/app/orgs/UP-QA-ORG/scans/7d054dde-08ff-421d-bbc5-d22be591c167/sast?project=ba156f30-d62f-4ceb-b8d8-7811ad8b30ab). <table role='table'><thead><tr><th>Severity</th><th>Vulnerability Type</th><th>CWE</th><th>File</th><th>Data Flows</th><th>Date</th></tr></thead><tbody><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson8.java:66](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L61-L66 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L55 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L58 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L128 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson3.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60-L65 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson5.java:73](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L68-L73 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L67 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L70 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson6a.java:67](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67) </td><td>3</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L62-L67 <details> <summary>3 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidation.java#L48 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidation.java#L52 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67 </details> <details> <summary>View Data Flow 2</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L51 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L52 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67 </details> <details> <summary>View Data Flow 3</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L48 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L53 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionChallenge.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L60-L65 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L63 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson9.java:66](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L66) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L61-L66 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L55 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L59 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L61 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L128 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L66 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson5a.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57-L62 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L53 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson4.java:63](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L58-L63 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson2.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L57-L62 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L55 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L59 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [Assignment5.java:59](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L54-L59 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L51 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr></tbody></table> ### Findings Overview | Severity | Vulnerability Type | CWE | Language | Count | |-|-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Path/Directory Traversal|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Java*|6| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|SQL Injection|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|Java*|14| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Deserialization of Untrusted Data|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|DOM Based Cross-Site Scripting|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|JavaScript / Node.js|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Server Side Request Forgery|[CWE-918](https://cwe.mitre.org/data/definitions/918.html)|Java*|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Error Messages Information Exposure|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Java*|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Weak Pseudo-Random|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|JavaScript / Node.js|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Hardcoded Password/Credentials|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Java*|4| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|XML External Entity (XXE) Injection|[CWE-611](https://cwe.mitre.org/data/definitions/611.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|System Properties Disclosure|[CWE-497](https://cwe.mitre.org/data/definitions/497.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Weak Hash Strength|[CWE-328](https://cwe.mitre.org/data/definitions/328.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Log Forging|[CWE-117](https://cwe.mitre.org/data/definitions/117.html)|Java*|1|
1.0
Code Security Report: 24 high severity findings, 39 total findings - # Code Security Report ### Scan Metadata **Latest Scan:** 2023-09-18 05:12am **Total Findings:** 39 | **New Findings:** 0 | **Resolved Findings:** 0 **Tested Project Files:** 422 **Detected Programming Languages:** 2 (JavaScript / Node.js, Java*) <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ### Most Relevant Findings > The below list presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend Application](https://dev.whitesourcesoftware.com/app/orgs/UP-QA-ORG/scans/7d054dde-08ff-421d-bbc5-d22be591c167/sast?project=ba156f30-d62f-4ceb-b8d8-7811ad8b30ab). <table role='table'><thead><tr><th>Severity</th><th>Vulnerability Type</th><th>CWE</th><th>File</th><th>Data Flows</th><th>Date</th></tr></thead><tbody><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson8.java:66](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L61-L66 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L55 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L58 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L128 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson3.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60-L65 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson5.java:73](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L68-L73 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L67 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L70 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson6a.java:67](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67) </td><td>3</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L62-L67 <details> <summary>3 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidation.java#L48 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidation.java#L52 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67 </details> <details> <summary>View Data Flow 2</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L51 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L52 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67 </details> <details> <summary>View Data Flow 3</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L48 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L53 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionChallenge.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L60-L65 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L63 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson9.java:66](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L66) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L61-L66 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L55 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L59 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L61 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L128 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L66 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson5a.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57-L62 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L53 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson4.java:63](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L58-L63 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson2.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L57-L62 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L55 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L59 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [Assignment5.java:59](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59) </td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L54-L59 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L51 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59 https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li> <li> [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li> <li> [OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li> </ul></li> </ul> </details> </td></tr></tbody></table> ### Findings Overview | Severity | Vulnerability Type | CWE | Language | Count | |-|-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Path/Directory Traversal|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Java*|6| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|SQL Injection|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|Java*|14| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Deserialization of Untrusted Data|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|DOM Based Cross-Site Scripting|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|JavaScript / Node.js|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Server Side Request Forgery|[CWE-918](https://cwe.mitre.org/data/definitions/918.html)|Java*|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Error Messages Information Exposure|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Java*|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Weak Pseudo-Random|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|JavaScript / Node.js|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Hardcoded Password/Credentials|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Java*|4| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|XML External Entity (XXE) Injection|[CWE-611](https://cwe.mitre.org/data/definitions/611.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|System Properties Disclosure|[CWE-497](https://cwe.mitre.org/data/definitions/497.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Weak Hash Strength|[CWE-328](https://cwe.mitre.org/data/definitions/328.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Log Forging|[CWE-117](https://cwe.mitre.org/data/definitions/117.html)|Java*|1|
non_process
code security report high severity findings total findings code security report scan metadata latest scan total findings new findings resolved findings tested project files detected programming languages javascript node js java check this box to manually trigger a scan most relevant findings the below list presents the most relevant findings that need your attention to view information on the remaining findings navigate to the severity vulnerability type cwe file data flows date high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow view data flow view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading findings overview severity vulnerability type cwe language count high path directory traversal high sql injection high deserialization of untrusted data high dom based cross site scripting node js high server side request forgery medium error messages information exposure medium weak pseudo random node js medium hardcoded password credentials medium xml external entity xxe injection low system properties disclosure low weak hash strength low log forging
0
9,088
12,155,240,161
IssuesEvent
2020-04-25 12:14:28
code4romania/expert-consultation-api
https://api.github.com/repos/code4romania/expert-consultation-api
closed
Assign entire document to one ore more users in the platform
document processing documents java spring
As an admin of the Legal Consultation platform I want to be able to assign a document to a user in the platform. We need to create a new entity that will contain the relationship between the document and the user. A user that has been added to a document will be able to post comments on that document. Every user will be able to view the documents in the platform. ![Adauga membri](https://user-images.githubusercontent.com/15039873/58744312-dc6f0400-83f5-11e9-80d1-a74049f75f3d.png)
1.0
Assign entire document to one ore more users in the platform - As an admin of the Legal Consultation platform I want to be able to assign a document to a user in the platform. We need to create a new entity that will contain the relationship between the document and the user. A user that has been added to a document will be able to post comments on that document. Every user will be able to view the documents in the platform. ![Adauga membri](https://user-images.githubusercontent.com/15039873/58744312-dc6f0400-83f5-11e9-80d1-a74049f75f3d.png)
process
assign entire document to one ore more users in the platform as an admin of the legal consultation platform i want to be able to assign a document to a user in the platform we need to create a new entity that will contain the relationship between the document and the user a user that has been added to a document will be able to post comments on that document every user will be able to view the documents in the platform
1
281,538
30,888,885,639
IssuesEvent
2023-08-04 01:58:04
artsking/linux-4.1.15_noPatch
https://api.github.com/repos/artsking/linux-4.1.15_noPatch
reopened
CVE-2016-2069 (High) detected in linux-stable-rtv4.1.33
Mend: dependency security vulnerability
## CVE-2016-2069 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/artsking/linux-4.1.15_noPatch/commit/2a4fd3afc623ae79fea13880ff39350d42fea4e6">2a4fd3afc623ae79fea13880ff39350d42fea4e6</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU. <p>Publish Date: 2016-04-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-2069>CVE-2016-2069</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2069">https://nvd.nist.gov/vuln/detail/CVE-2016-2069</a></p> <p>Release Date: 2016-04-27</p> <p>Fix Resolution: 4.4.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-2069 (High) detected in linux-stable-rtv4.1.33 - ## CVE-2016-2069 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/artsking/linux-4.1.15_noPatch/commit/2a4fd3afc623ae79fea13880ff39350d42fea4e6">2a4fd3afc623ae79fea13880ff39350d42fea4e6</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU. <p>Publish Date: 2016-04-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-2069>CVE-2016-2069</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2069">https://nvd.nist.gov/vuln/detail/CVE-2016-2069</a></p> <p>Release Date: 2016-04-27</p> <p>Fix Resolution: 4.4.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details race condition in arch mm tlb c in the linux kernel before allows local users to gain privileges by triggering access to a paging structure by a different cpu publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
172,523
14,365,132,930
IssuesEvent
2020-12-01 01:03:24
True-Stay/true-stay-app
https://api.github.com/repos/True-Stay/true-stay-app
closed
Code General Listings UI
documentation user story
<img width="342" alt="Screen Shot 2020-11-19 at 11 42 14 AM" src="https://user-images.githubusercontent.com/45430120/99696071-46e98900-2a5c-11eb-9504-86287868d343.png"> **Listing details will be shown, the following info is included: Listing Title/ Listing Pic/Listing Price/Listing Description/Listing Location/Listing Map/Listing Landlord/Listing Review**
1.0
Code General Listings UI - <img width="342" alt="Screen Shot 2020-11-19 at 11 42 14 AM" src="https://user-images.githubusercontent.com/45430120/99696071-46e98900-2a5c-11eb-9504-86287868d343.png"> **Listing details will be shown, the following info is included: Listing Title/ Listing Pic/Listing Price/Listing Description/Listing Location/Listing Map/Listing Landlord/Listing Review**
non_process
code general listings ui img width alt screen shot at am src listing details will be shown the following info is included listing title listing pic listing price listing description listing location listing map listing landlord listing review
0
19,083
25,127,845,472
IssuesEvent
2022-11-09 13:07:58
FreeCAD/FreeCAD
https://api.github.com/repos/FreeCAD/FreeCAD
closed
[Problem] PR Template does not match CONTRIBUTING.md
Process
### Is there an existing issue for this? - [X] I have searched the existing issues ### Version 0.21 (Development) ### Full version info ```shell n/a ``` ### Subproject(s) affected? Other (specify in description) ### Problem description The [Pull Request template](https://github.com/FreeCAD/FreeCAD/blob/master/.github/PULL_REQUEST_TEMPLATE.md) does not match the requirements in CONTRIBUTING.md -- it specifies some additional "rules" that don't correspond to our current process, and likely needs to be updated. ### Anything else? _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
1.0
[Problem] PR Template does not match CONTRIBUTING.md - ### Is there an existing issue for this? - [X] I have searched the existing issues ### Version 0.21 (Development) ### Full version info ```shell n/a ``` ### Subproject(s) affected? Other (specify in description) ### Problem description The [Pull Request template](https://github.com/FreeCAD/FreeCAD/blob/master/.github/PULL_REQUEST_TEMPLATE.md) does not match the requirements in CONTRIBUTING.md -- it specifies some additional "rules" that don't correspond to our current process, and likely needs to be updated. ### Anything else? _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
process
pr template does not match contributing md is there an existing issue for this i have searched the existing issues version development full version info shell n a subproject s affected other specify in description problem description the does not match the requirements in contributing md it specifies some additional rules that don t correspond to our current process and likely needs to be updated anything else no response code of conduct i agree to follow this project s code of conduct
1
3,672
6,706,513,749
IssuesEvent
2017-10-12 07:24:45
nuclio/nuclio
https://api.github.com/repos/nuclio/nuclio
closed
Handler panics / exceptions in synchronous events should return a traceback
area/processor priority/medium
1. If a panic occurs in a handler, the response body should contain the panic traceback 2. If an exception occurs in a handler, the response body should contain the exception traceback 3. There should be a configuration variable that disables this The above should have integration tests verifying this
1.0
Handler panics / exceptions in synchronous events should return a traceback - 1. If a panic occurs in a handler, the response body should contain the panic traceback 2. If an exception occurs in a handler, the response body should contain the exception traceback 3. There should be a configuration variable that disables this The above should have integration tests verifying this
process
handler panics exceptions in synchronous events should return a traceback if a panic occurs in a handler the response body should contain the panic traceback if an exception occurs in a handler the response body should contain the exception traceback there should be a configuration variable that disables this the above should have integration tests verifying this
1
215,244
7,292,808,034
IssuesEvent
2018-02-25 06:26:54
PaulL48/SOEN341-SC4
https://api.github.com/repos/PaulL48/SOEN341-SC4
closed
Add question asking back-end
back-end feature priority: high risk: low sp 3
Add a database containing questions asked by users and a function to add new questions.
1.0
Add question asking back-end - Add a database containing questions asked by users and a function to add new questions.
non_process
add question asking back end add a database containing questions asked by users and a function to add new questions
0
8,078
11,252,476,853
IssuesEvent
2020-01-11 08:59:11
QuodAI/semantic-engine
https://api.github.com/repos/QuodAI/semantic-engine
opened
Preprocess and analyze subtokens from 14 top JS repos
dataprocessing statistical
vbudhram/fantasy-football-io/ muffinista/wayback_exe Matterwiki/Matterwiki Flagship repo: timeoff-management/application sdelements/lets-chat proshoumma/ReForum sahat/tvshow-tracker mashery/iodocs Cezerin2/cezerin2 gilbitron/Raneto joeferner/redis-commander tellform/tellform thelounge/thelounge hackmdio/codimd
1.0
Preprocess and analyze subtokens from 14 top JS repos - vbudhram/fantasy-football-io/ muffinista/wayback_exe Matterwiki/Matterwiki Flagship repo: timeoff-management/application sdelements/lets-chat proshoumma/ReForum sahat/tvshow-tracker mashery/iodocs Cezerin2/cezerin2 gilbitron/Raneto joeferner/redis-commander tellform/tellform thelounge/thelounge hackmdio/codimd
process
preprocess and analyze subtokens from top js repos vbudhram fantasy football io muffinista wayback exe matterwiki matterwiki flagship repo timeoff management application sdelements lets chat proshoumma reforum sahat tvshow tracker mashery iodocs gilbitron raneto joeferner redis commander tellform tellform thelounge thelounge hackmdio codimd
1
47,973
13,298,461,911
IssuesEvent
2020-08-25 08:18:07
YauheniPo/Atlas_Popo_GUI_Framework
https://api.github.com/repos/YauheniPo/Atlas_Popo_GUI_Framework
opened
WS-2019-0379 (Medium) detected in commons-codec-1.10.jar
security vulnerability
## WS-2019-0379 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-codec-1.10.jar</b></p></summary> <p>The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.</p> <p>Path to dependency file: /tmp/ws-scm/Atlas_Popo_GUI_Framework/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-codec/commons-codec/1.10/commons-codec-1.10.jar</p> <p> Dependency Hierarchy: - webdrivermanager-3.4.0.jar (Root Library) - httpclient-4.5.6.jar - :x: **commons-codec-1.10.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/YauheniPo/Atlas_Popo_GUI_Framework/commit/865d1eab5956d1b38c4acaaa788e8fb4996089b5">865d1eab5956d1b38c4acaaa788e8fb4996089b5</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation. <p>Publish Date: 2019-05-20 <p>URL: <a href=https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113>WS-2019-0379</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113">https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113</a></p> <p>Release Date: 2019-05-12</p> <p>Fix Resolution: 1.13-RC1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2019-0379 (Medium) detected in commons-codec-1.10.jar - ## WS-2019-0379 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-codec-1.10.jar</b></p></summary> <p>The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.</p> <p>Path to dependency file: /tmp/ws-scm/Atlas_Popo_GUI_Framework/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-codec/commons-codec/1.10/commons-codec-1.10.jar</p> <p> Dependency Hierarchy: - webdrivermanager-3.4.0.jar (Root Library) - httpclient-4.5.6.jar - :x: **commons-codec-1.10.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/YauheniPo/Atlas_Popo_GUI_Framework/commit/865d1eab5956d1b38c4acaaa788e8fb4996089b5">865d1eab5956d1b38c4acaaa788e8fb4996089b5</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation. <p>Publish Date: 2019-05-20 <p>URL: <a href=https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113>WS-2019-0379</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113">https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113</a></p> <p>Release Date: 2019-05-12</p> <p>Fix Resolution: 1.13-RC1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
ws medium detected in commons codec jar ws medium severity vulnerability vulnerable library commons codec jar the apache commons codec package contains simple encoder and decoders for various formats such as and hexadecimal in addition to these widely used encoders and decoders the codec package also maintains a collection of phonetic encoding utilities path to dependency file tmp ws scm atlas popo gui framework pom xml path to vulnerable library home wss scanner repository commons codec commons codec commons codec jar dependency hierarchy webdrivermanager jar root library httpclient jar x commons codec jar vulnerable library found in head commit a href vulnerability details apache commons codec before version “commons codec ” is vulnerable to information disclosure due to improper input validation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
316,887
9,658,236,676
IssuesEvent
2019-05-20 10:28:47
mozilla/addons-server
https://api.github.com/repos/mozilla/addons-server
closed
Search results don't boost recommended addons when searching without a query string
component: search priority: p3
[Recommended add-ons] Follow up for #11066 **STR:** 1. Open AMO -dev 2. Try to search for add-on without providing a query string- i.e. https://addons-dev.allizom.org/en-US/firefox/search/ or https://addons-dev.allizom.org/en-US/firefox/search/?type=extension 3. Observe the results **Actual result:** As per @eviljeff 's comment in https://github.com/mozilla/addons-server/issues/11066#issuecomment-492254041, when no search string is provided , the API defaults to weekly downloads. On -dev, at least, this means that recommended add-ons are not boosted in search results **Expected result:** Since we plan to boost recommended extensions in search results, I would expect to see the add-ons from the [curated list](https://addons-internal.dev.mozaws.net/en-US/admin/models/discovery/discoveryitem/) on the first pages of results when no search string was provided. **Notes:** - the [PRD](https://docs.google.com/document/d/1fRxLy7h02tn1HBIlsTU_6h9DHmN8c3N6bg4JoxHF7J8/edit#heading=h.5kvm14zbadi2) doesn't mention an approach for this specific scenario
1.0
Search results don't boost recommended addons when searching without a query string - [Recommended add-ons] Follow up for #11066 **STR:** 1. Open AMO -dev 2. Try to search for add-on without providing a query string- i.e. https://addons-dev.allizom.org/en-US/firefox/search/ or https://addons-dev.allizom.org/en-US/firefox/search/?type=extension 3. Observe the results **Actual result:** As per @eviljeff 's comment in https://github.com/mozilla/addons-server/issues/11066#issuecomment-492254041, when no search string is provided , the API defaults to weekly downloads. On -dev, at least, this means that recommended add-ons are not boosted in search results **Expected result:** Since we plan to boost recommended extensions in search results, I would expect to see the add-ons from the [curated list](https://addons-internal.dev.mozaws.net/en-US/admin/models/discovery/discoveryitem/) on the first pages of results when no search string was provided. **Notes:** - the [PRD](https://docs.google.com/document/d/1fRxLy7h02tn1HBIlsTU_6h9DHmN8c3N6bg4JoxHF7J8/edit#heading=h.5kvm14zbadi2) doesn't mention an approach for this specific scenario
non_process
search results don t boost recommended addons when searching without a query string follow up for str open amo dev try to search for add on without providing a query string i e or observe the results actual result as per eviljeff s comment in when no search string is provided the api defaults to weekly downloads on dev at least this means that recommended add ons are not boosted in search results expected result since we plan to boost recommended extensions in search results i would expect to see the add ons from the on the first pages of results when no search string was provided notes the doesn t mention an approach for this specific scenario
0
112,272
9,559,202,505
IssuesEvent
2019-05-03 16:02:09
SunwellTracker/issues
https://api.github.com/repos/SunwellTracker/issues
closed
QUEST: "The Captive Prospectors"
Works locally OR Requires testing
Description: You need to find a key and open cages to free NPCs. Its a quest in Grizzly Hills. How it works: You get the key (the drop rate is pretty low, so its hard to find one), you open the cage, but the NPC is not moving out, so the quest can not be completed. How it should work: https://www.youtube.com/watch?v=2hbsGrb65z0 Source (you should point out proofs of your report, please give us some source):
1.0
QUEST: "The Captive Prospectors" - Description: You need to find a key and open cages to free NPCs. Its a quest in Grizzly Hills. How it works: You get the key (the drop rate is pretty low, so its hard to find one), you open the cage, but the NPC is not moving out, so the quest can not be completed. How it should work: https://www.youtube.com/watch?v=2hbsGrb65z0 Source (you should point out proofs of your report, please give us some source):
non_process
quest the captive prospectors description you need to find a key and open cages to free npcs its a quest in grizzly hills how it works you get the key the drop rate is pretty low so its hard to find one you open the cage but the npc is not moving out so the quest can not be completed how it should work source you should point out proofs of your report please give us some source
0
20,854
27,634,520,053
IssuesEvent
2023-03-10 13:29:07
notofonts/nushu
https://api.github.com/repos/notofonts/nushu
closed
NotoTraditionalNushu-Regular include Latin glyphs from Source Sans
Noto-Process-Issue
## Defect Report ### Title The NotoTraditionalNushu fonts include Latin glyphs from Source Sans in addition to the Nushu glyphs. This is inconsistent with the general Noto practice. Is this intentional? The NotoSansNushu fonts only have Nushu glyphs/ ### Font NotoTraditionalNushu-Regular.ttf, NotoTraditionalNushu-Regular.otf, NotoTraditionalNushu-Medium-VF.ttf, ### Where the font came from, and when This repo ### Screenshot <img width="1536" alt="scr- 2021-03-31 at 09 56 21" src="https://user-images.githubusercontent.com/519108/113110451-6319e580-9207-11eb-91f2-9310a9ee6d4a.png">
1.0
NotoTraditionalNushu-Regular include Latin glyphs from Source Sans - ## Defect Report ### Title The NotoTraditionalNushu fonts include Latin glyphs from Source Sans in addition to the Nushu glyphs. This is inconsistent with the general Noto practice. Is this intentional? The NotoSansNushu fonts only have Nushu glyphs/ ### Font NotoTraditionalNushu-Regular.ttf, NotoTraditionalNushu-Regular.otf, NotoTraditionalNushu-Medium-VF.ttf, ### Where the font came from, and when This repo ### Screenshot <img width="1536" alt="scr- 2021-03-31 at 09 56 21" src="https://user-images.githubusercontent.com/519108/113110451-6319e580-9207-11eb-91f2-9310a9ee6d4a.png">
process
nototraditionalnushu regular include latin glyphs from source sans defect report title the nototraditionalnushu fonts include latin glyphs from source sans in addition to the nushu glyphs this is inconsistent with the general noto practice is this intentional the notosansnushu fonts only have nushu glyphs font nototraditionalnushu regular ttf nototraditionalnushu regular otf nototraditionalnushu medium vf ttf where the font came from and when this repo screenshot img width alt scr at src
1