Unnamed: 0
int64 0
832k
| id
float64 2.49B
32.1B
| type
stringclasses 1
value | created_at
stringlengths 19
19
| repo
stringlengths 7
112
| repo_url
stringlengths 36
141
| action
stringclasses 3
values | title
stringlengths 1
744
| labels
stringlengths 4
574
| body
stringlengths 9
211k
| index
stringclasses 10
values | text_combine
stringlengths 96
211k
| label
stringclasses 2
values | text
stringlengths 96
188k
| binary_label
int64 0
1
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
21,585
| 11,660,443,594
|
IssuesEvent
|
2020-03-03 03:21:39
|
cityofaustin/atd-knack-data-tracker
|
https://api.github.com/repos/cityofaustin/atd-knack-data-tracker
|
closed
|
Work Scheduling page - Job Calendar
|
Product: AMD Tracker Service: Apps Type: Enhancement Workgroup: AMD
|
Description: Would like to use Job Calendar on Data Tracker, but develop it like the existing schedule spreadsheet that the AMD supervisors use.
Request Date: 2018-08-22 09:34:00
Request ID: DTS18-100975
Status: Backlog
Customer Priority: 4
Level of Effort: Large Project
DTS URL: https://atd.knack.com/dts#service-requests/view-issue-details/5b7d746c9706207ba1f7640a
|
1.0
|
Work Scheduling page - Job Calendar - Description: Would like to use Job Calendar on Data Tracker, but develop it like the existing schedule spreadsheet that the AMD supervisors use.
Request Date: 2018-08-22 09:34:00
Request ID: DTS18-100975
Status: Backlog
Customer Priority: 4
Level of Effort: Large Project
DTS URL: https://atd.knack.com/dts#service-requests/view-issue-details/5b7d746c9706207ba1f7640a
|
non_process
|
work scheduling page job calendar description would like to use job calendar on data tracker but develop it like the existing schedule spreadsheet that the amd supervisors use request date request id status backlog customer priority level of effort large project dts url
| 0
|
5,993
| 8,805,375,049
|
IssuesEvent
|
2018-12-26 19:14:09
|
dita-ot/dita-ot
|
https://api.github.com/repos/dita-ot/dita-ot
|
closed
|
Keyref resolution fails if input path contains ../
|
bug preprocess/keyref stale
|
2.2.3 and `develop`.
If you do e.g. `dita -i ../docsrc/userguide.ditamap -f pdf`, keyref resolution fails:
```
[keyref] file:/tmp/docsrc/index.dita:6:55: [DOTJ047I][INFO] Unable to find key definition for key reference "release" in root scope. The href attribute may be used as fallback if it exists
```
If you do `dita -i docsrc/userguide.ditamap -f pdf` instead, it works fine.
|
1.0
|
Keyref resolution fails if input path contains ../ - 2.2.3 and `develop`.
If you do e.g. `dita -i ../docsrc/userguide.ditamap -f pdf`, keyref resolution fails:
```
[keyref] file:/tmp/docsrc/index.dita:6:55: [DOTJ047I][INFO] Unable to find key definition for key reference "release" in root scope. The href attribute may be used as fallback if it exists
```
If you do `dita -i docsrc/userguide.ditamap -f pdf` instead, it works fine.
|
process
|
keyref resolution fails if input path contains and develop if you do e g dita i docsrc userguide ditamap f pdf keyref resolution fails file tmp docsrc index dita unable to find key definition for key reference release in root scope the href attribute may be used as fallback if it exists if you do dita i docsrc userguide ditamap f pdf instead it works fine
| 1
|
16,860
| 22,142,364,059
|
IssuesEvent
|
2022-06-03 08:17:48
|
camunda/zeebe
|
https://api.github.com/repos/camunda/zeebe
|
closed
|
Reduce test pipeline time
|
kind/toil team/distributed team/process-automation area/test
|
**Description**
I have the feeling that our pipeline takes to long and it seems to be increasing over time.

If we take a look at the avg. it is around 29 min. If we add QA then it is even more. I would like to see us in improving the pipeline again that we get faster feedback from the pipeline.
Currently it takes quite long until something is merged (PR) or that I see that my branch is healthy and I can open the PR or something else. Would be awesome if we can improve here.
|
1.0
|
Reduce test pipeline time - **Description**
I have the feeling that our pipeline takes to long and it seems to be increasing over time.

If we take a look at the avg. it is around 29 min. If we add QA then it is even more. I would like to see us in improving the pipeline again that we get faster feedback from the pipeline.
Currently it takes quite long until something is merged (PR) or that I see that my branch is healthy and I can open the PR or something else. Would be awesome if we can improve here.
|
process
|
reduce test pipeline time description i have the feeling that our pipeline takes to long and it seems to be increasing over time if we take a look at the avg it is around min if we add qa then it is even more i would like to see us in improving the pipeline again that we get faster feedback from the pipeline currently it takes quite long until something is merged pr or that i see that my branch is healthy and i can open the pr or something else would be awesome if we can improve here
| 1
|
275,911
| 8,582,152,520
|
IssuesEvent
|
2018-11-13 16:18:48
|
HewlettPackard/oneview-redfish-toolkit
|
https://api.github.com/repos/HewlettPackard/oneview-redfish-toolkit
|
reopened
|
Apply concept DRY to share API classes with same Schema
|
Low priority enhancement
|
Currently, we have some case of API classes implementing a same Redfish Schema, building a similar JSONs, but replicating the code to do that.
So, it would good if we could reuse that classes, applying so the DRY concept.
The files (or classes) with same Schema:
- `api/computer_system.py` = `api/resource_block_computer_system.py`
Schema = `"ComputerSystem"`
`"@odata.type"` = `"#ComputerSystem.v1_4_0.ComputerSystem"`
@sidneifranco you had noted it, so if you would want comment more about, feel free, please. =)
|
1.0
|
Apply concept DRY to share API classes with same Schema - Currently, we have some case of API classes implementing a same Redfish Schema, building a similar JSONs, but replicating the code to do that.
So, it would good if we could reuse that classes, applying so the DRY concept.
The files (or classes) with same Schema:
- `api/computer_system.py` = `api/resource_block_computer_system.py`
Schema = `"ComputerSystem"`
`"@odata.type"` = `"#ComputerSystem.v1_4_0.ComputerSystem"`
@sidneifranco you had noted it, so if you would want comment more about, feel free, please. =)
|
non_process
|
apply concept dry to share api classes with same schema currently we have some case of api classes implementing a same redfish schema building a similar jsons but replicating the code to do that so it would good if we could reuse that classes applying so the dry concept the files or classes with same schema api computer system py api resource block computer system py schema computersystem odata type computersystem computersystem sidneifranco you had noted it so if you would want comment more about feel free please
| 0
|
10,476
| 13,248,908,776
|
IssuesEvent
|
2020-08-19 19:49:57
|
googleapis/python-firestore
|
https://api.github.com/repos/googleapis/python-firestore
|
closed
|
Synth loses import of `google.api_core.path_template`
|
api: firestore type: process
|
See PRs #141, #142, #143.
@busunkim96 thinks that we need to update `synth.py` to re-add the import, just as we add the actual helpers which use it.
|
1.0
|
Synth loses import of `google.api_core.path_template` - See PRs #141, #142, #143.
@busunkim96 thinks that we need to update `synth.py` to re-add the import, just as we add the actual helpers which use it.
|
process
|
synth loses import of google api core path template see prs thinks that we need to update synth py to re add the import just as we add the actual helpers which use it
| 1
|
684,474
| 23,419,323,302
|
IssuesEvent
|
2022-08-13 12:52:36
|
Derpius/VisTrace
|
https://api.github.com/repos/Derpius/VisTrace
|
closed
|
[bug] Add font fallbacks to extension badge
|
bug good first issue low-priority
|
**Describe the bug**
While Windows has the Franklin Gothic font used by the VisTrace logo bundled in most cases, Mac/iOS/iPadOS and possibly other operating systems do not, causing it to fall back to Times New Roman
**Expected behaviour**
The font should fall back through a Verdana font stack.
Additionally a font stack for Verdana should be added to the EXTENSION text.
**Screenshots**

**Additional context**
https://www.cssfontstack.com/Franklin-Gothic-Medium
Verdana font stack: `Verdana, "Verdana Ref", sans-serif;`
|
1.0
|
[bug] Add font fallbacks to extension badge - **Describe the bug**
While Windows has the Franklin Gothic font used by the VisTrace logo bundled in most cases, Mac/iOS/iPadOS and possibly other operating systems do not, causing it to fall back to Times New Roman
**Expected behaviour**
The font should fall back through a Verdana font stack.
Additionally a font stack for Verdana should be added to the EXTENSION text.
**Screenshots**

**Additional context**
https://www.cssfontstack.com/Franklin-Gothic-Medium
Verdana font stack: `Verdana, "Verdana Ref", sans-serif;`
|
non_process
|
add font fallbacks to extension badge describe the bug while windows has the franklin gothic font used by the vistrace logo bundled in most cases mac ios ipados and possibly other operating systems do not causing it to fall back to times new roman expected behaviour the font should fall back through a verdana font stack additionally a font stack for verdana should be added to the extension text screenshots additional context verdana font stack verdana verdana ref sans serif
| 0
|
818,712
| 30,701,236,120
|
IssuesEvent
|
2023-07-26 23:45:18
|
marbl/HG002-issues
|
https://api.github.com/repos/marbl/HG002-issues
|
closed
|
Issue: chr7_MATERNAL:4504368-4504369
|
priority element_evidence trio_based trioassembly_plus_element geno_12 onso_evidence mendel_filter correction_applied
|
### Assembly Region
chr7_MATERNAL:4504368-4504369
### Assembly Version
v0.7
### DeepVariant Call
chr7_MATERNAL 4504368 . CA C 44.7 PASS AC=2;AN=2 GT:GQ:DP:AD:VAF:PL 1/1:.:.:0,1:.:.
|
1.0
|
Issue: chr7_MATERNAL:4504368-4504369 - ### Assembly Region
chr7_MATERNAL:4504368-4504369
### Assembly Version
v0.7
### DeepVariant Call
chr7_MATERNAL 4504368 . CA C 44.7 PASS AC=2;AN=2 GT:GQ:DP:AD:VAF:PL 1/1:.:.:0,1:.:.
|
non_process
|
issue maternal assembly region maternal assembly version deepvariant call maternal ca c pass ac an gt gq dp ad vaf pl
| 0
|
15,929
| 10,417,901,206
|
IssuesEvent
|
2019-09-15 02:55:50
|
penrose/penrose
|
https://api.github.com/repos/penrose/penrose
|
closed
|
Request to be able to edit Domain and Style program in IDE
|
ide usability
|
@keenancrane and I are testing the user/developer in the experience in the IDE and think it would be really helpful to be able to edit the Domain and Style programs there. It would also be helpful for demoing the system to people.
|
True
|
Request to be able to edit Domain and Style program in IDE - @keenancrane and I are testing the user/developer in the experience in the IDE and think it would be really helpful to be able to edit the Domain and Style programs there. It would also be helpful for demoing the system to people.
|
non_process
|
request to be able to edit domain and style program in ide keenancrane and i are testing the user developer in the experience in the ide and think it would be really helpful to be able to edit the domain and style programs there it would also be helpful for demoing the system to people
| 0
|
7,366
| 10,511,144,235
|
IssuesEvent
|
2019-09-27 14:51:08
|
spring-projects/spring-hateoas
|
https://api.github.com/repos/spring-projects/spring-hateoas
|
closed
|
NPE when generating a link to POST method without RequestBody parameter
|
process: waiting for feedback type: bug
|
### New in 1.0.0.M1
I've written an endpoint that updates an object based on a provided ID (path parameter), and some variables (request parameters):
```
@PostMapping("entity/{id}")
public ResponseEntity<Void> update(@PathVariable UUID id, @RequestParam String variable)
```
When I try to generate a HATEOAS link to this resource:
```
resource.add(linkTo(methodOn(Controller.class).update(resource.getContent().getId(), null)).withRel("update"));
```
I get a NPE because my endpoint has `POST` method, but no `RequestBody` parameter, and thus following line (PropertyUtils.java:86) raises a NPE:
```
if (resolvableType.getRawClass().equals(EntityModel.class)) {
```
Stack trace is like:
```
java.lang.NullPointerException: null
at org.springframework.hateoas.mediatype.PropertyUtils.findPropertyNames(PropertyUtils.java:86) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.mediatype.collectionjson.CollectionJsonAffordanceModel.determineInputs(CollectionJsonAffordanceModel.java:69) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.mediatype.collectionjson.CollectionJsonAffordanceModel.<init>(CollectionJsonAffordanceModel.java:55) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.mediatype.collectionjson.CollectionJsonAffordanceModelFactory.getAffordanceModel(CollectionJsonAffordanceModelFactory.java:42) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.Affordance.<init>(Affordance.java:67) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.server.core.SpringAffordanceBuilder.create(SpringAffordanceBuilder.java:77) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.server.core.WebHandler.lambda$linkTo$0(WebHandler.java:146) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.server.mvc.WebMvcLinkBuilderFactory.linkTo(WebMvcLinkBuilderFactory.java:125) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.server.mvc.WebMvcLinkBuilder.linkTo(WebMvcLinkBuilder.java:174) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
```
Issue raised since I updated to 1.0.0.M1.
Same code used to work in previous versions.
|
1.0
|
NPE when generating a link to POST method without RequestBody parameter - ### New in 1.0.0.M1
I've written an endpoint that updates an object based on a provided ID (path parameter), and some variables (request parameters):
```
@PostMapping("entity/{id}")
public ResponseEntity<Void> update(@PathVariable UUID id, @RequestParam String variable)
```
When I try to generate a HATEOAS link to this resource:
```
resource.add(linkTo(methodOn(Controller.class).update(resource.getContent().getId(), null)).withRel("update"));
```
I get a NPE because my endpoint has `POST` method, but no `RequestBody` parameter, and thus following line (PropertyUtils.java:86) raises a NPE:
```
if (resolvableType.getRawClass().equals(EntityModel.class)) {
```
Stack trace is like:
```
java.lang.NullPointerException: null
at org.springframework.hateoas.mediatype.PropertyUtils.findPropertyNames(PropertyUtils.java:86) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.mediatype.collectionjson.CollectionJsonAffordanceModel.determineInputs(CollectionJsonAffordanceModel.java:69) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.mediatype.collectionjson.CollectionJsonAffordanceModel.<init>(CollectionJsonAffordanceModel.java:55) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.mediatype.collectionjson.CollectionJsonAffordanceModelFactory.getAffordanceModel(CollectionJsonAffordanceModelFactory.java:42) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.Affordance.<init>(Affordance.java:67) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.server.core.SpringAffordanceBuilder.create(SpringAffordanceBuilder.java:77) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.server.core.WebHandler.lambda$linkTo$0(WebHandler.java:146) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.server.mvc.WebMvcLinkBuilderFactory.linkTo(WebMvcLinkBuilderFactory.java:125) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
at org.springframework.hateoas.server.mvc.WebMvcLinkBuilder.linkTo(WebMvcLinkBuilder.java:174) ~[spring-hateoas-1.0.0.M1.jar:1.0.0.M1]
```
Issue raised since I updated to 1.0.0.M1.
Same code used to work in previous versions.
|
process
|
npe when generating a link to post method without requestbody parameter new in i ve written an endpoint that updates an object based on a provided id path parameter and some variables request parameters postmapping entity id public responseentity update pathvariable uuid id requestparam string variable when i try to generate a hateoas link to this resource resource add linkto methodon controller class update resource getcontent getid null withrel update i get a npe because my endpoint has post method but no requestbody parameter and thus following line propertyutils java raises a npe if resolvabletype getrawclass equals entitymodel class stack trace is like java lang nullpointerexception null at org springframework hateoas mediatype propertyutils findpropertynames propertyutils java at org springframework hateoas mediatype collectionjson collectionjsonaffordancemodel determineinputs collectionjsonaffordancemodel java at org springframework hateoas mediatype collectionjson collectionjsonaffordancemodel collectionjsonaffordancemodel java at org springframework hateoas mediatype collectionjson collectionjsonaffordancemodelfactory getaffordancemodel collectionjsonaffordancemodelfactory java at org springframework hateoas affordance affordance java at org springframework hateoas server core springaffordancebuilder create springaffordancebuilder java at org springframework hateoas server core webhandler lambda linkto webhandler java at org springframework hateoas server mvc webmvclinkbuilderfactory linkto webmvclinkbuilderfactory java at org springframework hateoas server mvc webmvclinkbuilder linkto webmvclinkbuilder java issue raised since i updated to same code used to work in previous versions
| 1
|
3,870
| 6,808,647,762
|
IssuesEvent
|
2017-11-04 06:10:16
|
Great-Hill-Corporation/quickBlocks
|
https://api.github.com/repos/Great-Hill-Corporation/quickBlocks
|
reopened
|
Should do better switch statements in generated code from grabABI/makeClass
|
apps-grabABI status-inprocess type-enhancement
|
In the code generated by grabABI, it should check the first character of the topic and do a switch as it does in the code for getFieldValueByName to avoid testing every string.
From https://github.com/Great-Hill-Corporation/ethslurp/issues/138
|
1.0
|
Should do better switch statements in generated code from grabABI/makeClass - In the code generated by grabABI, it should check the first character of the topic and do a switch as it does in the code for getFieldValueByName to avoid testing every string.
From https://github.com/Great-Hill-Corporation/ethslurp/issues/138
|
process
|
should do better switch statements in generated code from grababi makeclass in the code generated by grababi it should check the first character of the topic and do a switch as it does in the code for getfieldvaluebyname to avoid testing every string from
| 1
|
27,846
| 2,696,614,435
|
IssuesEvent
|
2015-04-02 15:05:48
|
OCHA-DAP/hdx-ckan
|
https://api.github.com/repos/OCHA-DAP/hdx-ckan
|
opened
|
Custom org page: admin menu is always displayed
|
bug Custom org page Priority-High
|
Admin menu should be displayed only for users that have the right to see it.

|
1.0
|
Custom org page: admin menu is always displayed - Admin menu should be displayed only for users that have the right to see it.

|
non_process
|
custom org page admin menu is always displayed admin menu should be displayed only for users that have the right to see it
| 0
|
111,732
| 17,033,433,733
|
IssuesEvent
|
2021-07-05 01:15:43
|
ervin210/ApplicationInsights-Home
|
https://api.github.com/repos/ervin210/ApplicationInsights-Home
|
opened
|
CVE-2018-14042 (Medium) detected in bootstrap-3.0.0.js
|
security vulnerability
|
## CVE-2018-14042 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.0.0.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.0/js/bootstrap.js</a></p>
<p>Path to vulnerable library: ApplicationInsights-Home/Samples/WebApiTracingSample/WebHostedWebApiApplication/Scripts/bootstrap.js,ApplicationInsights-Home/Samples/PingMeshWeb/PingMeshWeb/Scripts/bootstrap.js,ApplicationInsights-Home/Samples/AzureEmailService/MvcWebRole/Scripts/bootstrap.js,ApplicationInsights-Home/Samples/PingMeshWeb/packages/bootstrap.3.0.0/content/Scripts/bootstrap.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.0.0.js** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
<p>Publish Date: 2018-07-13
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14042>CVE-2018-14042</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p>
<p>Release Date: 2018-07-13</p>
<p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2018-14042 (Medium) detected in bootstrap-3.0.0.js - ## CVE-2018-14042 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.0.0.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.0/js/bootstrap.js</a></p>
<p>Path to vulnerable library: ApplicationInsights-Home/Samples/WebApiTracingSample/WebHostedWebApiApplication/Scripts/bootstrap.js,ApplicationInsights-Home/Samples/PingMeshWeb/PingMeshWeb/Scripts/bootstrap.js,ApplicationInsights-Home/Samples/AzureEmailService/MvcWebRole/Scripts/bootstrap.js,ApplicationInsights-Home/Samples/PingMeshWeb/packages/bootstrap.3.0.0/content/Scripts/bootstrap.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.0.0.js** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
<p>Publish Date: 2018-07-13
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14042>CVE-2018-14042</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p>
<p>Release Date: 2018-07-13</p>
<p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_process
|
cve medium detected in bootstrap js cve medium severity vulnerability vulnerable library bootstrap js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library applicationinsights home samples webapitracingsample webhostedwebapiapplication scripts bootstrap js applicationinsights home samples pingmeshweb pingmeshweb scripts bootstrap js applicationinsights home samples azureemailservice mvcwebrole scripts bootstrap js applicationinsights home samples pingmeshweb packages bootstrap content scripts bootstrap js dependency hierarchy x bootstrap js vulnerable library found in base branch master vulnerability details in bootstrap before xss is possible in the data container property of tooltip publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org webjars npm bootstrap org webjars bootstrap step up your open source security game with whitesource
| 0
|
370,142
| 25,890,438,281
|
IssuesEvent
|
2022-12-14 17:29:32
|
KinsonDigital/Velaptor
|
https://api.github.com/repos/KinsonDigital/Velaptor
|
opened
|
🚧Fix small grammar issue in contributing document
|
high priority preview 📝documentation/product
|
### Complete The Item Below
- [X] I have updated the title without removing the 🚧 emoji.
### Description
Make a small change in the _**CONTRIBUTING.md**_ document.
The change will involve making the sentence more specific as to prevent confusion or misinterpretation in the future.
**Change To Implement:**
```diff
**Considerations:**
-The **Velaptor** team will merge changes that improve the library significantly. We will not merge changes that have narrowly-defined benefits or are breaking in some way. All contributions must also follow all other guidelines outlined in this document.
**Considerations:**
+ Only the **Velaptor** team will merge changes that improve the library significantly. We will not merge changes that have narrowly-defined benefits or are breaking in some way. All contributions must also follow all other guidelines outlined in this document.
```
### Acceptance Criteria
- [ ] Contribution document updated.
### ToDo Items
- [X] Change type labels added to this issue. Refer to the _**Change Type Labels**_ section below.
- [X] Priority label added to this issue. Refer to the _**Priority Type Labels**_ section below.
- [X] Issue linked to the correct project _(if applicable)_.
- [ ] Issue linked to the correct milestone _(if applicable)_.
- [ ] Draft pull request created and linked to this issue _(only required with code changes)_.
### Issue Dependencies
_No response_
### Related Work
_No response_
### Additional Information:
**_<details closed><summary>Change Type Labels</summary>_**
| Change Type | Label |
|---------------------|----------------------|
| Bug Fixes | `🐛bug` |
| Breaking Changes | `🧨breaking changes` |
| New Feature | `✨new feature` |
| Workflow Changes | `workflow` |
| Code Doc Changes | `🗒️documentation/code` |
| Product Doc Changes | `📝documentation/product` |
</details>
**_<details closed><summary>Priority Type Labels</summary>_**
| Priority Type | Label |
|---------------------|-------------------|
| Low Priority | `low priority` |
| Medium Priority | `medium priority` |
| High Priority | `high priority` |
</details>
### Code of Conduct
- [X] I agree to follow this project's Code of Conduct.
|
1.0
|
🚧Fix small grammar issue in contributing document - ### Complete The Item Below
- [X] I have updated the title without removing the 🚧 emoji.
### Description
Make a small change in the _**CONTRIBUTING.md**_ document.
The change will involve making the sentence more specific as to prevent confusion or misinterpretation in the future.
**Change To Implement:**
```diff
**Considerations:**
-The **Velaptor** team will merge changes that improve the library significantly. We will not merge changes that have narrowly-defined benefits or are breaking in some way. All contributions must also follow all other guidelines outlined in this document.
**Considerations:**
+ Only the **Velaptor** team will merge changes that improve the library significantly. We will not merge changes that have narrowly-defined benefits or are breaking in some way. All contributions must also follow all other guidelines outlined in this document.
```
### Acceptance Criteria
- [ ] Contribution document updated.
### ToDo Items
- [X] Change type labels added to this issue. Refer to the _**Change Type Labels**_ section below.
- [X] Priority label added to this issue. Refer to the _**Priority Type Labels**_ section below.
- [X] Issue linked to the correct project _(if applicable)_.
- [ ] Issue linked to the correct milestone _(if applicable)_.
- [ ] Draft pull request created and linked to this issue _(only required with code changes)_.
### Issue Dependencies
_No response_
### Related Work
_No response_
### Additional Information:
**_<details closed><summary>Change Type Labels</summary>_**
| Change Type | Label |
|---------------------|----------------------|
| Bug Fixes | `🐛bug` |
| Breaking Changes | `🧨breaking changes` |
| New Feature | `✨new feature` |
| Workflow Changes | `workflow` |
| Code Doc Changes | `🗒️documentation/code` |
| Product Doc Changes | `📝documentation/product` |
</details>
**_<details closed><summary>Priority Type Labels</summary>_**
| Priority Type | Label |
|---------------------|-------------------|
| Low Priority | `low priority` |
| Medium Priority | `medium priority` |
| High Priority | `high priority` |
</details>
### Code of Conduct
- [X] I agree to follow this project's Code of Conduct.
|
non_process
|
🚧fix small grammar issue in contributing document complete the item below i have updated the title without removing the 🚧 emoji description make a small change in the contributing md document the change will involve making the sentence more specific as to prevent confusion or misinterpretation in the future change to implement diff considerations the velaptor team will merge changes that improve the library significantly we will not merge changes that have narrowly defined benefits or are breaking in some way all contributions must also follow all other guidelines outlined in this document considerations only the velaptor team will merge changes that improve the library significantly we will not merge changes that have narrowly defined benefits or are breaking in some way all contributions must also follow all other guidelines outlined in this document acceptance criteria contribution document updated todo items change type labels added to this issue refer to the change type labels section below priority label added to this issue refer to the priority type labels section below issue linked to the correct project if applicable issue linked to the correct milestone if applicable draft pull request created and linked to this issue only required with code changes issue dependencies no response related work no response additional information change type labels change type label bug fixes 🐛bug breaking changes 🧨breaking changes new feature ✨new feature workflow changes workflow code doc changes 🗒️documentation code product doc changes 📝documentation product priority type labels priority type label low priority low priority medium priority medium priority high priority high priority code of conduct i agree to follow this project s code of conduct
| 0
|
315,324
| 9,612,110,550
|
IssuesEvent
|
2019-05-13 08:07:13
|
webcompat/web-bugs
|
https://api.github.com/repos/webcompat/web-bugs
|
closed
|
www.amazon.de - see bug description
|
browser-firefox-mobile engine-gecko priority-critical
|
<!-- @browser: Firefox Mobile 66.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 6.0.1; Mobile; rv:66.0) Gecko/66.0 Firefox/66.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://www.amazon.de/Musclealive-Fitnessstudio-Bodybuilding-Trainieren-Baumwolle/dp/B01IT1PPVK/ref=pd_aw_sim_193_2/260-2039301-6875619?_encoding=UTF8&pd_rd_i=B01IT1PPVK&pd_rd_r=1382cd70-735e-11e9-9a00-1944568fd332&pd_rd_w=sD0rL&pd_rd_wg=VOAvM&pf_rd_p=edaea299-ecba-4239-b7b0-23395517e19f&pf_rd_r=NV3M5GAY8QZPQMG1FDJ0&psc=1&refRID=NV3M5GAY8QZPQMG1FDJ0#
**Browser / Version**: Firefox Mobile 66.0
**Operating System**: Android 6.0.1
**Tested Another Browser**: No
**Problem type**: Something else
**Description**: pics cannot be viewed
**Steps to Reproduce**:
Product photos cannot be viewed
[](https://webcompat.com/uploads/2019/5/4d8594f8-1e58-4621-9967-27ddeca2cd1e.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190507034016</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: default</li>
</ul>
<p>Console Messages:</p>
<pre>
[u'[console.warn([CanvasBlocker] invalid content script order: require not defined at, https://www.amazon.de/Musclealive-Fitnessstudio-Bodybuilding-Trainieren-Baumwolle/dp/B01IT1PPVK/ref=pd_aw_sim_193_2/260-2039301-6875619?_encoding=UTF8&pd_rd_i=B01IT1PPVK&pd_rd_r=1382cd70-735e-11e9-9a00-1944568fd332&pd_rd_w=sD0rL&pd_rd_wg=VOAvM&pf_rd_p=edaea299-ecba-4239-b7b0-23395517e19f&pf_rd_r=NV3M5GAY8QZPQMG1FDJ0&psc=1&refRID=NV3M5GAY8QZPQMG1FDJ0#) blob:moz-extension://2c89d154-ea32-41c2-9375-32961f7e494b/38ade2d4-d6d4-43e4-86af-dd0b7c1606e8:17:9]', u'[JavaScript Error: "The character encoding of the plain text document was not declared. The document will render with garbled text in some browser configurations if the document contains characters from outside the US-ASCII range. The character encoding of the file needs to be declared in the transfer protocol or file needs to use a byte order mark as an encoding signature." {file: "https://coin-eu.amazonpay.com/rb?a2=0101589eef8bf70b437348c8aac62558f0ac15d5faafaa4e824bedc8e409acce8489&d=www.amazon.de" line: 0}]', u'[JavaScript Warning: "Synchrone XMLHttpRequests am Haupt-Thread sollte nicht mehr verwendet werden, weil es nachteilige Effekte fr das Erlebnis der Endbenutzer hat. Fr weitere Hilfe siehe http://xhr.spec.whatwg.org/" {file: "https://images-eu.ssl-images-amazon.com/images/I/61kzhTBl2qL._RC|11-BZEJ8lnL.js,61ei1jF9ZML.js,21Of0-9HPCL.js,01E8f3KV-NL.js,119KAWlHU6L.js,51psF-j89fL.js,11sT42sZnQL.js,016iHgpF74L.js,11aNYFFS5hL.js,116tgw9TSaL.js,211-p4GRUCL.js,01PoLXBDXWL.js,61gxNaZW3oL.js,31ys7G2VsuL.js,11BOgvnnntL.js,31xbSVcI5iL.js,01qkmZhGmAL.js,01iyxuSGj4L.js,018cNgdiX7L.js_.js?AUIClients/AmazonUI#mobile.144375-T1" line: 172}]', u'[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://d2h8zr0m6mus4x.cloudfront.net/primesignup/package.json?_=1557523450592. (Reason: CORS request did not succeed)."]', u'[JavaScript Warning: "This site appears to use a scroll-linked positioning effect. This may not work well with asynchronous panning; see https://developer.mozilla.org/docs/Mozilla/Performance/ScrollLinkedEffects for further details and to join the discussion on related tools and features!" {file: "https://www.amazon.de/Musclealive-Fitnessstudio-Bodybuilding-Trainieren-Baumwolle/dp/B01IT1PPVK/ref=pd_aw_sim_193_2/260-2039301-6875619?_encoding=UTF8&pd_rd_i=B01IT1PPVK&pd_rd_r=1382cd70-735e-11e9-9a00-1944568fd332&pd_rd_w=sD0rL&pd_rd_wg=VOAvM&pf_rd_p=edaea299-ecba-4239-b7b0-23395517e19f&pf_rd_r=NV3M5GAY8QZPQMG1FDJ0&psc=1&refRID=NV3M5GAY8QZPQMG1FDJ0#" line: 0}]', u'[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://unagi-eu.amazon.com/1/events/com.amazon.eel.SponsoredProductsEventTracking.prod. (Reason: CORS request did not succeed)."]', u'[console.error(Error logged with the Track&Report JS errors API(http://tiny/1covqr6l8/wamazindeClieUserJava): {"m":"Warning -- sushi response: | StatusText: | xhrStatusCode: 0 | url: https://unagi-eu.amazon.com/1/events/com.amazon.eel.SponsoredProductsEventTracking.prod","csm":"v5 ueLogError callee","logLevel":"WARN","attribution":"SponsoredProductsViewabilityAssets:SponsoredProductsViewabilityAssets","pageURL":"https://www.amazon.de/Musclealive-Fitnessstudio-Bodybuilding-Trainieren-Baumwolle/dp/B01IT1PPVK/ref=pd_aw_sim_193_2/260-2039301-6875619?_encoding=UTF8&pd_rd_i=B01IT1PPVK&pd_rd_r=1382cd70-735e-11e9-9a00-1944568fd332&pd_rd_w=sD0rL&pd_rd_wg=VOAvM&pf_rd_p=edaea299-ecba-4239-b7b0-23395517e19f&pf_rd_r=NV3M5GAY8QZPQMG1FDJ0&psc=1&refRID=NV3M5GAY8QZPQMG1FDJ0#","s":["function(a,b,c,d){b={message:b,logLevel:c||\\"ERROR\\",attribution:q(\\":\\",\\nthis.attribution,d)};if(g.ueLogError)return g.ueLogError(a||b,a?b:null),!0;console&&console.error&&(console.log(b),console.error(a));return!1}","function(a,b,c){return this.logError(null,a,b,c)}","function(c,d,b){k.log(\\"Warning -- sushi response: \\"+\\nb+\\" | StatusText: \\"+d+\\" | xhrStatusCode: \\"+(c.http?c.http.status:\\"could not get xhr status code. \\")+\\" | url: \\"+m.eelEndpoint,\\"WARN\\",\\"SponsoredProductsViewabilityAssets\\");e(!1,a);h(\\"batchError\\",a)}","function(){A.push(b||{attribution:f,name:c,logLevel:a});var e=d.apply(this,arguments);A.pop();return e}"],"t":33854}, [object Object]) https://images-eu.ssl-images-amazon.com/images/G/01/AUIClients/ClientSideMetricsAUIJavascript@jserrorsForesterCompressed.56f1005c3bd8e4df49d09233ac09e77ec3ab0b69._V2_.js:4:346]']
</pre>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
1.0
|
www.amazon.de - see bug description - <!-- @browser: Firefox Mobile 66.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 6.0.1; Mobile; rv:66.0) Gecko/66.0 Firefox/66.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://www.amazon.de/Musclealive-Fitnessstudio-Bodybuilding-Trainieren-Baumwolle/dp/B01IT1PPVK/ref=pd_aw_sim_193_2/260-2039301-6875619?_encoding=UTF8&pd_rd_i=B01IT1PPVK&pd_rd_r=1382cd70-735e-11e9-9a00-1944568fd332&pd_rd_w=sD0rL&pd_rd_wg=VOAvM&pf_rd_p=edaea299-ecba-4239-b7b0-23395517e19f&pf_rd_r=NV3M5GAY8QZPQMG1FDJ0&psc=1&refRID=NV3M5GAY8QZPQMG1FDJ0#
**Browser / Version**: Firefox Mobile 66.0
**Operating System**: Android 6.0.1
**Tested Another Browser**: No
**Problem type**: Something else
**Description**: pics cannot be viewed
**Steps to Reproduce**:
Product photos cannot be viewed
[](https://webcompat.com/uploads/2019/5/4d8594f8-1e58-4621-9967-27ddeca2cd1e.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190507034016</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: default</li>
</ul>
<p>Console Messages:</p>
<pre>
[u'[console.warn([CanvasBlocker] invalid content script order: require not defined at, https://www.amazon.de/Musclealive-Fitnessstudio-Bodybuilding-Trainieren-Baumwolle/dp/B01IT1PPVK/ref=pd_aw_sim_193_2/260-2039301-6875619?_encoding=UTF8&pd_rd_i=B01IT1PPVK&pd_rd_r=1382cd70-735e-11e9-9a00-1944568fd332&pd_rd_w=sD0rL&pd_rd_wg=VOAvM&pf_rd_p=edaea299-ecba-4239-b7b0-23395517e19f&pf_rd_r=NV3M5GAY8QZPQMG1FDJ0&psc=1&refRID=NV3M5GAY8QZPQMG1FDJ0#) blob:moz-extension://2c89d154-ea32-41c2-9375-32961f7e494b/38ade2d4-d6d4-43e4-86af-dd0b7c1606e8:17:9]', u'[JavaScript Error: "The character encoding of the plain text document was not declared. The document will render with garbled text in some browser configurations if the document contains characters from outside the US-ASCII range. The character encoding of the file needs to be declared in the transfer protocol or file needs to use a byte order mark as an encoding signature." {file: "https://coin-eu.amazonpay.com/rb?a2=0101589eef8bf70b437348c8aac62558f0ac15d5faafaa4e824bedc8e409acce8489&d=www.amazon.de" line: 0}]', u'[JavaScript Warning: "Synchrone XMLHttpRequests am Haupt-Thread sollte nicht mehr verwendet werden, weil es nachteilige Effekte fr das Erlebnis der Endbenutzer hat. Fr weitere Hilfe siehe http://xhr.spec.whatwg.org/" {file: "https://images-eu.ssl-images-amazon.com/images/I/61kzhTBl2qL._RC|11-BZEJ8lnL.js,61ei1jF9ZML.js,21Of0-9HPCL.js,01E8f3KV-NL.js,119KAWlHU6L.js,51psF-j89fL.js,11sT42sZnQL.js,016iHgpF74L.js,11aNYFFS5hL.js,116tgw9TSaL.js,211-p4GRUCL.js,01PoLXBDXWL.js,61gxNaZW3oL.js,31ys7G2VsuL.js,11BOgvnnntL.js,31xbSVcI5iL.js,01qkmZhGmAL.js,01iyxuSGj4L.js,018cNgdiX7L.js_.js?AUIClients/AmazonUI#mobile.144375-T1" line: 172}]', u'[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://d2h8zr0m6mus4x.cloudfront.net/primesignup/package.json?_=1557523450592. (Reason: CORS request did not succeed)."]', u'[JavaScript Warning: "This site appears to use a scroll-linked positioning effect. This may not work well with asynchronous panning; see https://developer.mozilla.org/docs/Mozilla/Performance/ScrollLinkedEffects for further details and to join the discussion on related tools and features!" {file: "https://www.amazon.de/Musclealive-Fitnessstudio-Bodybuilding-Trainieren-Baumwolle/dp/B01IT1PPVK/ref=pd_aw_sim_193_2/260-2039301-6875619?_encoding=UTF8&pd_rd_i=B01IT1PPVK&pd_rd_r=1382cd70-735e-11e9-9a00-1944568fd332&pd_rd_w=sD0rL&pd_rd_wg=VOAvM&pf_rd_p=edaea299-ecba-4239-b7b0-23395517e19f&pf_rd_r=NV3M5GAY8QZPQMG1FDJ0&psc=1&refRID=NV3M5GAY8QZPQMG1FDJ0#" line: 0}]', u'[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://unagi-eu.amazon.com/1/events/com.amazon.eel.SponsoredProductsEventTracking.prod. (Reason: CORS request did not succeed)."]', u'[console.error(Error logged with the Track&Report JS errors API(http://tiny/1covqr6l8/wamazindeClieUserJava): {"m":"Warning -- sushi response: | StatusText: | xhrStatusCode: 0 | url: https://unagi-eu.amazon.com/1/events/com.amazon.eel.SponsoredProductsEventTracking.prod","csm":"v5 ueLogError callee","logLevel":"WARN","attribution":"SponsoredProductsViewabilityAssets:SponsoredProductsViewabilityAssets","pageURL":"https://www.amazon.de/Musclealive-Fitnessstudio-Bodybuilding-Trainieren-Baumwolle/dp/B01IT1PPVK/ref=pd_aw_sim_193_2/260-2039301-6875619?_encoding=UTF8&pd_rd_i=B01IT1PPVK&pd_rd_r=1382cd70-735e-11e9-9a00-1944568fd332&pd_rd_w=sD0rL&pd_rd_wg=VOAvM&pf_rd_p=edaea299-ecba-4239-b7b0-23395517e19f&pf_rd_r=NV3M5GAY8QZPQMG1FDJ0&psc=1&refRID=NV3M5GAY8QZPQMG1FDJ0#","s":["function(a,b,c,d){b={message:b,logLevel:c||\\"ERROR\\",attribution:q(\\":\\",\\nthis.attribution,d)};if(g.ueLogError)return g.ueLogError(a||b,a?b:null),!0;console&&console.error&&(console.log(b),console.error(a));return!1}","function(a,b,c){return this.logError(null,a,b,c)}","function(c,d,b){k.log(\\"Warning -- sushi response: \\"+\\nb+\\" | StatusText: \\"+d+\\" | xhrStatusCode: \\"+(c.http?c.http.status:\\"could not get xhr status code. \\")+\\" | url: \\"+m.eelEndpoint,\\"WARN\\",\\"SponsoredProductsViewabilityAssets\\");e(!1,a);h(\\"batchError\\",a)}","function(){A.push(b||{attribution:f,name:c,logLevel:a});var e=d.apply(this,arguments);A.pop();return e}"],"t":33854}, [object Object]) https://images-eu.ssl-images-amazon.com/images/G/01/AUIClients/ClientSideMetricsAUIJavascript@jserrorsForesterCompressed.56f1005c3bd8e4df49d09233ac09e77ec3ab0b69._V2_.js:4:346]']
</pre>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
non_process
|
see bug description url browser version firefox mobile operating system android tested another browser no problem type something else description pics cannot be viewed steps to reproduce product photos cannot be viewed browser configuration mixed active content blocked false image mem shared true buildid tracking content blocked false gfx webrender blob images true hastouchscreen true mixed passive content blocked false gfx webrender enabled false gfx webrender all false channel default console messages invalid content script order require not defined at blob moz extension u u u u u u t from with ❤️
| 0
|
87,992
| 8,128,920,606
|
IssuesEvent
|
2018-08-17 13:33:44
|
IEEEKeralaSection/rescuekerala
|
https://api.github.com/repos/IEEEKeralaSection/rescuekerala
|
closed
|
IMP: Tweak CF CDN and fix redirects for speed
|
Tested low merge-now
|
**Issue 1: HTML is not cached**
fetching HTML doc alone take ~1s (location SG) and it is because CF cache by default contents with extensions like .html.
<img width="775" alt="screen shot 2018-08-17 at 11 54 08 am" src="https://user-images.githubusercontent.com/5820155/44247181-1d09e200-a215-11e8-9f9b-9e6d508ce4ee.png">
**FIx: Create page rule to cache everything**
Follow this guide >> https://support.cloudflare.com/hc/en-us/articles/236166048. Post doing this you can verify fix by inspecting http header _cf-cache-status: HIT_
**Issue 2: Redirects causing to fetch from origin 2 times and doubles latency**
For example /request is redirecting (301) to origin /requests/ and it is easy to fix.
<img width="773" alt="screen shot 2018-08-17 at 11 52 37 am" src="https://user-images.githubusercontent.com/5820155/44247226-69552200-a215-11e8-810d-00a5d0e5e55d.png">
|
1.0
|
IMP: Tweak CF CDN and fix redirects for speed - **Issue 1: HTML is not cached**
fetching HTML doc alone take ~1s (location SG) and it is because CF cache by default contents with extensions like .html.
<img width="775" alt="screen shot 2018-08-17 at 11 54 08 am" src="https://user-images.githubusercontent.com/5820155/44247181-1d09e200-a215-11e8-9f9b-9e6d508ce4ee.png">
**FIx: Create page rule to cache everything**
Follow this guide >> https://support.cloudflare.com/hc/en-us/articles/236166048. Post doing this you can verify fix by inspecting http header _cf-cache-status: HIT_
**Issue 2: Redirects causing to fetch from origin 2 times and doubles latency**
For example /request is redirecting (301) to origin /requests/ and it is easy to fix.
<img width="773" alt="screen shot 2018-08-17 at 11 52 37 am" src="https://user-images.githubusercontent.com/5820155/44247226-69552200-a215-11e8-810d-00a5d0e5e55d.png">
|
non_process
|
imp tweak cf cdn and fix redirects for speed issue html is not cached fetching html doc alone take location sg and it is because cf cache by default contents with extensions like html img width alt screen shot at am src fix create page rule to cache everything follow this guide post doing this you can verify fix by inspecting http header cf cache status hit issue redirects causing to fetch from origin times and doubles latency for example request is redirecting to origin requests and it is easy to fix img width alt screen shot at am src
| 0
|
12,805
| 15,181,985,047
|
IssuesEvent
|
2021-02-15 05:13:39
|
hashgraph/hedera-mirror-node
|
https://api.github.com/repos/hashgraph/hedera-mirror-node
|
closed
|
Add Scheduled Transactions Acceptance Tests
|
P1 enhancement process test
|
**Problem**
Acceptance Tests do not currently have Schedule Transactions support.
**Solution**
Add support for Schedule transactions scenarios
**Alternatives**
A clear and concise description of any alternative solutions or features you've considered.
**Additional Context**
v2 SDK seems to have most support right now, so this might need v2 acceptance tests update to go in first
|
1.0
|
Add Scheduled Transactions Acceptance Tests - **Problem**
Acceptance Tests do not currently have Schedule Transactions support.
**Solution**
Add support for Schedule transactions scenarios
**Alternatives**
A clear and concise description of any alternative solutions or features you've considered.
**Additional Context**
v2 SDK seems to have most support right now, so this might need v2 acceptance tests update to go in first
|
process
|
add scheduled transactions acceptance tests problem acceptance tests do not currently have schedule transactions support solution add support for schedule transactions scenarios alternatives a clear and concise description of any alternative solutions or features you ve considered additional context sdk seems to have most support right now so this might need acceptance tests update to go in first
| 1
|
66,722
| 27,559,399,822
|
IssuesEvent
|
2023-03-07 20:37:21
|
MicrosoftDocs/azure-docs
|
https://api.github.com/repos/MicrosoftDocs/azure-docs
|
closed
|
Unable to verify TLS bootstrapping in an AKS cluster
|
container-service/svc triaged assigned-to-author product-question Pri2
|
The [instructions](https://docs.microsoft.com/en-us/azure/aks/certificate-rotation#certificate-auto-rotation) on MS's site read as follows:
To verify if TLS Bootstrapping is enabled on your cluster browse to the following paths:
On a Linux node: /var/lib/kubelet/bootstrap-kubeconfig
This directory does not exist on any of my cluster nodes, and these clusters are less than 60 days old. However, the article also states that TLS bootstrapping is enabled in all regions by default.
What does it mean when there is no such directory? Even when this directory exists, what information in the directory indicates that TLS bootstrapping is enabled? The article gives no further information.
There is a similar article describing this issue [here](https://github.com/MicrosoftDocs/azure-docs/issues/90489), but this already assumes the existence of the bootstrap-kubeconfig file.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 9b78509d-73eb-6c32-aee1-9b34685a64ff
* Version Independent ID: 6f87cf70-1f5a-0f9e-862d-ae1436595f3b
* Content: [Certificate Rotation in Azure Kubernetes Service (AKS) - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/certificate-rotation#certificate-auto-rotation)
* Content Source: [articles/aks/certificate-rotation.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/aks/certificate-rotation.md)
* Service: **container-service**
* GitHub Login: @zr-msft
* Microsoft Alias: **zarhoads**
|
1.0
|
Unable to verify TLS bootstrapping in an AKS cluster - The [instructions](https://docs.microsoft.com/en-us/azure/aks/certificate-rotation#certificate-auto-rotation) on MS's site read as follows:
To verify if TLS Bootstrapping is enabled on your cluster browse to the following paths:
On a Linux node: /var/lib/kubelet/bootstrap-kubeconfig
This directory does not exist on any of my cluster nodes, and these clusters are less than 60 days old. However, the article also states that TLS bootstrapping is enabled in all regions by default.
What does it mean when there is no such directory? Even when this directory exists, what information in the directory indicates that TLS bootstrapping is enabled? The article gives no further information.
There is a similar article describing this issue [here](https://github.com/MicrosoftDocs/azure-docs/issues/90489), but this already assumes the existence of the bootstrap-kubeconfig file.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 9b78509d-73eb-6c32-aee1-9b34685a64ff
* Version Independent ID: 6f87cf70-1f5a-0f9e-862d-ae1436595f3b
* Content: [Certificate Rotation in Azure Kubernetes Service (AKS) - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/certificate-rotation#certificate-auto-rotation)
* Content Source: [articles/aks/certificate-rotation.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/aks/certificate-rotation.md)
* Service: **container-service**
* GitHub Login: @zr-msft
* Microsoft Alias: **zarhoads**
|
non_process
|
unable to verify tls bootstrapping in an aks cluster the on ms s site read as follows to verify if tls bootstrapping is enabled on your cluster browse to the following paths on a linux node var lib kubelet bootstrap kubeconfig this directory does not exist on any of my cluster nodes and these clusters are less than days old however the article also states that tls bootstrapping is enabled in all regions by default what does it mean when there is no such directory even when this directory exists what information in the directory indicates that tls bootstrapping is enabled the article gives no further information there is a similar article describing this issue but this already assumes the existence of the bootstrap kubeconfig file document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service container service github login zr msft microsoft alias zarhoads
| 0
|
10,388
| 13,196,701,089
|
IssuesEvent
|
2020-08-13 21:12:32
|
pacificclimate/osprey
|
https://api.github.com/repos/pacificclimate/osprey
|
closed
|
wps_convolution config builder
|
enhancement process
|
RVIC 1.1.0.post1 runs based only on config files, which degrades the user-friendliness of the software. Therefore, a `config_builder` program, which takes user inputs to create config files, is needed for each process.
For `RVIC convolution`, refer to the [document](https://rvic.readthedocs.io/en/latest/user-guide/convolution/) page to see what contents should be included in the config file. @corviday do you have some advice on setting the direction to implement this program such as setting default values?
|
1.0
|
wps_convolution config builder - RVIC 1.1.0.post1 runs based only on config files, which degrades the user-friendliness of the software. Therefore, a `config_builder` program, which takes user inputs to create config files, is needed for each process.
For `RVIC convolution`, refer to the [document](https://rvic.readthedocs.io/en/latest/user-guide/convolution/) page to see what contents should be included in the config file. @corviday do you have some advice on setting the direction to implement this program such as setting default values?
|
process
|
wps convolution config builder rvic runs based only on config files which degrades the user friendliness of the software therefore a config builder program which takes user inputs to create config files is needed for each process for rvic convolution refer to the page to see what contents should be included in the config file corviday do you have some advice on setting the direction to implement this program such as setting default values
| 1
|
14,437
| 17,485,242,529
|
IssuesEvent
|
2021-08-09 10:08:26
|
Raveesh1505/EDA
|
https://api.github.com/repos/Raveesh1505/EDA
|
opened
|
Olympics EDA
|
Under Process
|
# Exploratory Data Analysis on Olympics
An Exploratory Data Analysis on dataset provided by [**Kaggle on olympics history**](https://www.kaggle.com).
*Data available from 1896 Greek Olympics to 2016 Rio Olympics*
___
## Expected tools to be used
| | | |
| --- | --- | --- |
| SQL| Python | Jupiter Notebooks |
___
## Expected packages to be used
| | | |
| --- | --- | --- |
| Pandas | Plotly *(For graphs and charts)* | SQLITE3
___
## Expected areas to be analysed
1. Medal tally analysis based on:
a. Team
b. Players
c. Gender
d. Season
e. Sport
f. Event
g. Year *(Season and Year are 2 different categories. [Click here to know more about them](#dataset-overview))*
2. Average health analysis of height and weight based on:
a. Gender
b. Sport
c. Country
3. Age analysis
4. Exploratory Medal Analysis
*Please note these topics are expected and the final output may contain more or in rare circumstances fewer queries.*
___
## Dataset overview
The following dataset is provided by Kaggle. Details of the dataset:
**Name of dataset:** 120 Years of Olympic History
**Tables in the dataset:** 4
[**Link to the dataset**](https://www.kaggle.com/mysarahmadbhat/120-years-of-olympic-history)
**Main table:** athlete_events.csv
**Sample image of main table:**
<img width="1080" alt="Screenshot 2021-08-09 at 2 56 17 PM" src="https://user-images.githubusercontent.com/67216858/128685530-68922bc6-3a7a-4b2c-88ba-3c738030d7e6.png">
|
1.0
|
Olympics EDA - # Exploratory Data Analysis on Olympics
An Exploratory Data Analysis on dataset provided by [**Kaggle on olympics history**](https://www.kaggle.com).
*Data available from 1896 Greek Olympics to 2016 Rio Olympics*
___
## Expected tools to be used
| | | |
| --- | --- | --- |
| SQL| Python | Jupiter Notebooks |
___
## Expected packages to be used
| | | |
| --- | --- | --- |
| Pandas | Plotly *(For graphs and charts)* | SQLITE3
___
## Expected areas to be analysed
1. Medal tally analysis based on:
a. Team
b. Players
c. Gender
d. Season
e. Sport
f. Event
g. Year *(Season and Year are 2 different categories. [Click here to know more about them](#dataset-overview))*
2. Average health analysis of height and weight based on:
a. Gender
b. Sport
c. Country
3. Age analysis
4. Exploratory Medal Analysis
*Please note these topics are expected and the final output may contain more or in rare circumstances fewer queries.*
___
## Dataset overview
The following dataset is provided by Kaggle. Details of the dataset:
**Name of dataset:** 120 Years of Olympic History
**Tables in the dataset:** 4
[**Link to the dataset**](https://www.kaggle.com/mysarahmadbhat/120-years-of-olympic-history)
**Main table:** athlete_events.csv
**Sample image of main table:**
<img width="1080" alt="Screenshot 2021-08-09 at 2 56 17 PM" src="https://user-images.githubusercontent.com/67216858/128685530-68922bc6-3a7a-4b2c-88ba-3c738030d7e6.png">
|
process
|
olympics eda exploratory data analysis on olympics an exploratory data analysis on dataset provided by data available from greek olympics to rio olympics expected tools to be used sql python jupiter notebooks expected packages to be used pandas plotly for graphs and charts expected areas to be analysed medal tally analysis based on a team b players c gender d season e sport f event g year season and year are different categories dataset overview average health analysis of height and weight based on a gender b sport c country age analysis exploratory medal analysis please note these topics are expected and the final output may contain more or in rare circumstances fewer queries dataset overview the following dataset is provided by kaggle details of the dataset name of dataset years of olympic history tables in the dataset main table athlete events csv sample image of main table img width alt screenshot at pm src
| 1
|
80,755
| 30,521,505,778
|
IssuesEvent
|
2023-07-19 08:24:13
|
vector-im/element-web
|
https://api.github.com/repos/vector-im/element-web
|
closed
|
new invites don't appear when filtered
|
T-Defect A-Room-List
|
i filtered on Foo, got invited to a room called Foo, and it didn't show unless i unfiltered
|
1.0
|
new invites don't appear when filtered - i filtered on Foo, got invited to a room called Foo, and it didn't show unless i unfiltered
|
non_process
|
new invites don t appear when filtered i filtered on foo got invited to a room called foo and it didn t show unless i unfiltered
| 0
|
102,952
| 4,163,327,256
|
IssuesEvent
|
2016-06-18 01:52:15
|
gravityview/GravityView
|
https://api.github.com/repos/gravityview/GravityView
|
opened
|
Updating an entry which in turns remove this entry from that view makes the entry unreachable
|
Core: Edit Entry Priority: Low
|
It's hard to describe this in the title, here's what one of our users have to say:
```
We are using the gravityview plugin as part of an internal crm-type solution. Recently we have run into the following issue:
There is 1 form. There are several views, one that lists form entries which are new (based on the value of the field 'status'.) And one that lists entries where the status field has a value of 'in process'.
We open the 'new' view and click on the edit link. The entry opens. Then the status is manually changed to 'in process' and the entry is updated.
After the update, we're still in the form edit screen. But when another field value is changed and we try to save, we receive the error: "You have attempted to view an entry that is not visible or may not exist".
Apparently changing the status field value removes the entry from the 'new' view. The entry edit screen is still shown but it can no longer be saved.
Can you advise on how to make it so that after an update of an entry, where the entry has been removed from the present view to another, we can continue editing the entry and update it without problem?
The alternative would be to manually seek out the entry every time an update changes the view in which it is visible. This is cumbersome in day to day use for the team that is using it.
```
|
1.0
|
Updating an entry which in turns remove this entry from that view makes the entry unreachable - It's hard to describe this in the title, here's what one of our users have to say:
```
We are using the gravityview plugin as part of an internal crm-type solution. Recently we have run into the following issue:
There is 1 form. There are several views, one that lists form entries which are new (based on the value of the field 'status'.) And one that lists entries where the status field has a value of 'in process'.
We open the 'new' view and click on the edit link. The entry opens. Then the status is manually changed to 'in process' and the entry is updated.
After the update, we're still in the form edit screen. But when another field value is changed and we try to save, we receive the error: "You have attempted to view an entry that is not visible or may not exist".
Apparently changing the status field value removes the entry from the 'new' view. The entry edit screen is still shown but it can no longer be saved.
Can you advise on how to make it so that after an update of an entry, where the entry has been removed from the present view to another, we can continue editing the entry and update it without problem?
The alternative would be to manually seek out the entry every time an update changes the view in which it is visible. This is cumbersome in day to day use for the team that is using it.
```
|
non_process
|
updating an entry which in turns remove this entry from that view makes the entry unreachable it s hard to describe this in the title here s what one of our users have to say we are using the gravityview plugin as part of an internal crm type solution recently we have run into the following issue there is form there are several views one that lists form entries which are new based on the value of the field status and one that lists entries where the status field has a value of in process we open the new view and click on the edit link the entry opens then the status is manually changed to in process and the entry is updated after the update we re still in the form edit screen but when another field value is changed and we try to save we receive the error you have attempted to view an entry that is not visible or may not exist apparently changing the status field value removes the entry from the new view the entry edit screen is still shown but it can no longer be saved can you advise on how to make it so that after an update of an entry where the entry has been removed from the present view to another we can continue editing the entry and update it without problem the alternative would be to manually seek out the entry every time an update changes the view in which it is visible this is cumbersome in day to day use for the team that is using it
| 0
|
8,659
| 11,798,046,378
|
IssuesEvent
|
2020-03-18 13:47:19
|
qgis/QGIS-Documentation
|
https://api.github.com/repos/qgis/QGIS-Documentation
|
closed
|
[FEATURE][processing] New parameter type for datetime (or date, or time) values
|
3.14 Automatic new feature Processing
|
Original commit: https://github.com/qgis/QGIS/commit/0efc6f531c26b0157e45c91b968b019d0cdee9e6 by nyalldawson
Adds a new parameter type QgsProcessingParameterDateTime for handling
date/datetime/time values
|
1.0
|
[FEATURE][processing] New parameter type for datetime (or date, or time) values - Original commit: https://github.com/qgis/QGIS/commit/0efc6f531c26b0157e45c91b968b019d0cdee9e6 by nyalldawson
Adds a new parameter type QgsProcessingParameterDateTime for handling
date/datetime/time values
|
process
|
new parameter type for datetime or date or time values original commit by nyalldawson adds a new parameter type qgsprocessingparameterdatetime for handling date datetime time values
| 1
|
112,313
| 9,560,244,017
|
IssuesEvent
|
2019-05-03 19:01:25
|
saltstack/salt
|
https://api.github.com/repos/saltstack/salt
|
closed
|
Fedora tests are hanging
|
2017.7 2017.7.9 2019.2 2019.2.1 Blocker Fixed Pending Verification Test Failure develop
|
### Description of Issue/Question
The fedora test run is not completing and hanging on this test: `test_present_when_stage_associating_to_new_deployment_errored_on_resource_creation`
https://jenkinsci.saltstack.com/job/2017.7.9/job/salt-fedora-28-py2/15/console
also affects fedora 29
```
17:57:54 test_present_when_stage_associating_to_new_deployment_errored_on_resource_creation (unit.states.test_boto_apigateway.BotoApiGatewayTestCase) ... OK (0.135s)
18:27:54 Build timed out (after 30 minutes). Marking the build as aborted.
```
|
1.0
|
Fedora tests are hanging - ### Description of Issue/Question
The fedora test run is not completing and hanging on this test: `test_present_when_stage_associating_to_new_deployment_errored_on_resource_creation`
https://jenkinsci.saltstack.com/job/2017.7.9/job/salt-fedora-28-py2/15/console
also affects fedora 29
```
17:57:54 test_present_when_stage_associating_to_new_deployment_errored_on_resource_creation (unit.states.test_boto_apigateway.BotoApiGatewayTestCase) ... OK (0.135s)
18:27:54 Build timed out (after 30 minutes). Marking the build as aborted.
```
|
non_process
|
fedora tests are hanging description of issue question the fedora test run is not completing and hanging on this test test present when stage associating to new deployment errored on resource creation also affects fedora test present when stage associating to new deployment errored on resource creation unit states test boto apigateway botoapigatewaytestcase ok build timed out after minutes marking the build as aborted
| 0
|
47,643
| 19,686,238,780
|
IssuesEvent
|
2022-01-11 22:34:22
|
hashicorp/terraform-provider-aws
|
https://api.github.com/repos/hashicorp/terraform-provider-aws
|
closed
|
Feature Request: AppStream support
|
new-resource service/appstream
|
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
### Description
Add support for AppStream resources like fleets, stacks, and image builders.
These resources are now supported by [CloudFormation](https://aws.amazon.com/about-aws/whats-new/2018/10/introducing-amazon-appstream-2-0-aws-cloudformation-support-and-/)
There are still gaps in AppStream automation -- images must be configured manually -- but being able to create the supported resources via terraform would be a big help.
### New Resources
- [x] aws_appstream_fleet
- [x] aws_appstream_directory_config #21505
- [x] aws_appstream_imagebuilder
- [x] aws_appstream_stack
- [x] aws_appstream_imagebuilder
- [x] aws_appstream_stack_fleet_association #21484
- [x] aws_appstream_stack_user_association #21485
- [x] aws_appstream_user #21485
|
1.0
|
Feature Request: AppStream support - ### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
### Description
Add support for AppStream resources like fleets, stacks, and image builders.
These resources are now supported by [CloudFormation](https://aws.amazon.com/about-aws/whats-new/2018/10/introducing-amazon-appstream-2-0-aws-cloudformation-support-and-/)
There are still gaps in AppStream automation -- images must be configured manually -- but being able to create the supported resources via terraform would be a big help.
### New Resources
- [x] aws_appstream_fleet
- [x] aws_appstream_directory_config #21505
- [x] aws_appstream_imagebuilder
- [x] aws_appstream_stack
- [x] aws_appstream_imagebuilder
- [x] aws_appstream_stack_fleet_association #21484
- [x] aws_appstream_stack_user_association #21485
- [x] aws_appstream_user #21485
|
non_process
|
feature request appstream support community note please vote on this issue by adding a 👍 to the original issue to help the community and maintainers prioritize this request please do not leave or me too comments they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment description add support for appstream resources like fleets stacks and image builders these resources are now supported by there are still gaps in appstream automation images must be configured manually but being able to create the supported resources via terraform would be a big help new resources aws appstream fleet aws appstream directory config aws appstream imagebuilder aws appstream stack aws appstream imagebuilder aws appstream stack fleet association aws appstream stack user association aws appstream user
| 0
|
678,933
| 23,216,154,337
|
IssuesEvent
|
2022-08-02 14:14:09
|
status-im/status-desktop
|
https://api.github.com/repos/status-im/status-desktop
|
closed
|
Update Help & Glossary to the new design
|
ui Profile feature priority F3: nice to have
|
### Description
~~design: https://www.figma.com/file/idUoxN7OIW2Jpp3PMJ1Rl8/%E2%9A%99%EF%B8%8F-Settings-%7C-Desktop?node-id=1511%3A137592~~ Design needs to be updated

|
1.0
|
Update Help & Glossary to the new design - ### Description
~~design: https://www.figma.com/file/idUoxN7OIW2Jpp3PMJ1Rl8/%E2%9A%99%EF%B8%8F-Settings-%7C-Desktop?node-id=1511%3A137592~~ Design needs to be updated

|
non_process
|
update help glossary to the new design description design design needs to be updated
| 0
|
445,522
| 31,239,523,480
|
IssuesEvent
|
2023-08-20 17:37:38
|
omgnetwork/ex_plasma
|
https://api.github.com/repos/omgnetwork/ex_plasma
|
closed
|
Add Example Usage on README
|
documentation
|
We should add example usage of the library on the README. We can also link to example code to perform some of the more complex interactions, like managing the `UTXO` list for inputs to be used in a payment transaction.
|
1.0
|
Add Example Usage on README - We should add example usage of the library on the README. We can also link to example code to perform some of the more complex interactions, like managing the `UTXO` list for inputs to be used in a payment transaction.
|
non_process
|
add example usage on readme we should add example usage of the library on the readme we can also link to example code to perform some of the more complex interactions like managing the utxo list for inputs to be used in a payment transaction
| 0
|
159,249
| 13,758,872,159
|
IssuesEvent
|
2020-10-07 01:19:30
|
opendatacube/datacube-ows
|
https://api.github.com/repos/opendatacube/datacube-ows
|
closed
|
Point to GHA Status Badge
|
documentation
|
`datacube-ows` version: master
`ows_config.py` version/link:: dea-config
### Description
Status badge in README.md still points to Travis.
### What I Did
Grabbed Status badge from GHA. Making this small change in a PR.

|
1.0
|
Point to GHA Status Badge - `datacube-ows` version: master
`ows_config.py` version/link:: dea-config
### Description
Status badge in README.md still points to Travis.
### What I Did
Grabbed Status badge from GHA. Making this small change in a PR.

|
non_process
|
point to gha status badge datacube ows version master ows config py version link dea config description status badge in readme md still points to travis what i did grabbed status badge from gha making this small change in a pr
| 0
|
2,133
| 4,973,380,287
|
IssuesEvent
|
2016-12-06 00:46:58
|
jlm2017/jlm-video-subtitles
|
https://api.github.com/repos/jlm2017/jlm-video-subtitles
|
closed
|
[subtitles] [FR] LA CASTE, LES PRIMAIRES ET LA SOUVERAINETÉ DU PEUPLE
|
Language: French Process: [6] Approved
|
# Video title
MÉLENCHON - LA CASTE, LES PRIMAIRES ET LA SOUVERAINETÉ DU PEUPLE
# URL
https://www.youtube.com/watch?v=Y_V0k4fDnuw
# Youtube subtitles language
Français
# Duration
27:33
# Subtitles URL
https://www.youtube.com/timedtext_editor?v=Y_V0k4fDnuw&tab=captions&ui=hd&action_mde_edit_form=1&ref=player&lang=fr&bl=vmp
|
1.0
|
[subtitles] [FR] LA CASTE, LES PRIMAIRES ET LA SOUVERAINETÉ DU PEUPLE - # Video title
MÉLENCHON - LA CASTE, LES PRIMAIRES ET LA SOUVERAINETÉ DU PEUPLE
# URL
https://www.youtube.com/watch?v=Y_V0k4fDnuw
# Youtube subtitles language
Français
# Duration
27:33
# Subtitles URL
https://www.youtube.com/timedtext_editor?v=Y_V0k4fDnuw&tab=captions&ui=hd&action_mde_edit_form=1&ref=player&lang=fr&bl=vmp
|
process
|
la caste les primaires et la souveraineté du peuple video title mélenchon la caste les primaires et la souveraineté du peuple url youtube subtitles language français duration subtitles url
| 1
|
243,831
| 18,727,153,992
|
IssuesEvent
|
2021-11-03 17:25:05
|
tektoncd/website
|
https://api.github.com/repos/tektoncd/website
|
closed
|
Improve the documentation landing page
|
help wanted good first issue kind/documentation lifecycle/rotten priority/important-soon
|
The landing page could use a few improvements:
- change the title to "Welcome to Tekton"
- expand more on the initial paragraph
- inline part of the concepts page, add a diagram or two
- we could add a list of projects with a one sentence description about each
- the "what's next" does not seem to add much value, I would remove it
- rending of the TOC below seems broken, there is too much space between sections:

|
1.0
|
Improve the documentation landing page - The landing page could use a few improvements:
- change the title to "Welcome to Tekton"
- expand more on the initial paragraph
- inline part of the concepts page, add a diagram or two
- we could add a list of projects with a one sentence description about each
- the "what's next" does not seem to add much value, I would remove it
- rending of the TOC below seems broken, there is too much space between sections:

|
non_process
|
improve the documentation landing page the landing page could use a few improvements change the title to welcome to tekton expand more on the initial paragraph inline part of the concepts page add a diagram or two we could add a list of projects with a one sentence description about each the what s next does not seem to add much value i would remove it rending of the toc below seems broken there is too much space between sections
| 0
|
120,742
| 12,093,596,475
|
IssuesEvent
|
2020-04-19 20:16:58
|
MicroClub-USTHB/Zitcode19
|
https://api.github.com/repos/MicroClub-USTHB/Zitcode19
|
opened
|
Updating project details
|
documentation
|
Project info need more details:
- [ ] Project presentation and pitch
- [ ] Contribution rules
- [ ] App's prototype GIFs
- [ ] App features ( needs details on what's to be built)
- [ ] Tech used
- [ ] Contact
|
1.0
|
Updating project details - Project info need more details:
- [ ] Project presentation and pitch
- [ ] Contribution rules
- [ ] App's prototype GIFs
- [ ] App features ( needs details on what's to be built)
- [ ] Tech used
- [ ] Contact
|
non_process
|
updating project details project info need more details project presentation and pitch contribution rules app s prototype gifs app features needs details on what s to be built tech used contact
| 0
|
161,071
| 12,530,291,993
|
IssuesEvent
|
2020-06-04 12:51:00
|
sebuaa2020/Team208
|
https://api.github.com/repos/sebuaa2020/Team208
|
closed
|
Test-Basic
|
test
|
- [ ] `RobotMove`
- [ ] `RobotAvoidance`
## RobotMove
该模块介绍与运行方法参考`robot2077_basic`包中`README`文件。
由于该模块没有与用户直接交互的接口,所以主要测试为:
- [x] 单元测试
- [ ] 节点测试
测试方法:
- 单元测试:构造测试样例,向函数`move_listen`输入测试样例,然后检测`vel_temp`的变化。
需保证:`vel_temp`中的速度始终没有超过设定最大速度,并需覆盖`check_vel`函数中的所有分支。
- 节点测试:使用黑箱测试,向`RobotMove`节点发送`Movemsg`消息,然后监听`/cmd_vel`话题,查看`RobotMove`的输出。
需保证:`/cmd_vel`中的速度始终没有超过设定最大速度,并且使用`rqt_graph`检测保证只有`RobotMove`可以向`/cmd_vel`发送消息。
需反馈:
- 移动控制模块是否运行正常
- 移动速度参数是否设置合理
## RobotAvoidance
该模块运行需要经模拟,故主要进行:
- [x] 单元测试
- [ ] 节点测试
测试方法:
- 单元测试:对`getTheta`函数进行测试,构造测试样例,保证分支覆盖。
- 节点测试:开启模拟器、主动控制模块、移动控制与避障模块。控制机器人向障碍物或墙壁移动,监听避障模块的返回值`k`,保证其取值范围为`[0,1]`,并检测其值变化是否正常。同时需检查机器人是否能够及时减速或停止移动,以及停止后离障碍物的位置。在停止后,如果换一个方向移动(无障碍物),机器人可以正常启动。
需反馈:
- 避障模块是否运行正常
- 避障参数是否设置合理
|
1.0
|
Test-Basic - - [ ] `RobotMove`
- [ ] `RobotAvoidance`
## RobotMove
该模块介绍与运行方法参考`robot2077_basic`包中`README`文件。
由于该模块没有与用户直接交互的接口,所以主要测试为:
- [x] 单元测试
- [ ] 节点测试
测试方法:
- 单元测试:构造测试样例,向函数`move_listen`输入测试样例,然后检测`vel_temp`的变化。
需保证:`vel_temp`中的速度始终没有超过设定最大速度,并需覆盖`check_vel`函数中的所有分支。
- 节点测试:使用黑箱测试,向`RobotMove`节点发送`Movemsg`消息,然后监听`/cmd_vel`话题,查看`RobotMove`的输出。
需保证:`/cmd_vel`中的速度始终没有超过设定最大速度,并且使用`rqt_graph`检测保证只有`RobotMove`可以向`/cmd_vel`发送消息。
需反馈:
- 移动控制模块是否运行正常
- 移动速度参数是否设置合理
## RobotAvoidance
该模块运行需要经模拟,故主要进行:
- [x] 单元测试
- [ ] 节点测试
测试方法:
- 单元测试:对`getTheta`函数进行测试,构造测试样例,保证分支覆盖。
- 节点测试:开启模拟器、主动控制模块、移动控制与避障模块。控制机器人向障碍物或墙壁移动,监听避障模块的返回值`k`,保证其取值范围为`[0,1]`,并检测其值变化是否正常。同时需检查机器人是否能够及时减速或停止移动,以及停止后离障碍物的位置。在停止后,如果换一个方向移动(无障碍物),机器人可以正常启动。
需反馈:
- 避障模块是否运行正常
- 避障参数是否设置合理
|
non_process
|
test basic robotmove robotavoidance robotmove 该模块介绍与运行方法参考 basic 包中 readme 文件。 由于该模块没有与用户直接交互的接口,所以主要测试为: 单元测试 节点测试 测试方法: 单元测试:构造测试样例,向函数 move listen 输入测试样例,然后检测 vel temp 的变化。 需保证: vel temp 中的速度始终没有超过设定最大速度,并需覆盖 check vel 函数中的所有分支。 节点测试:使用黑箱测试,向 robotmove 节点发送 movemsg 消息,然后监听 cmd vel 话题,查看 robotmove 的输出。 需保证: cmd vel 中的速度始终没有超过设定最大速度,并且使用 rqt graph 检测保证只有 robotmove 可以向 cmd vel 发送消息。 需反馈: 移动控制模块是否运行正常 移动速度参数是否设置合理 robotavoidance 该模块运行需要经模拟,故主要进行: 单元测试 节点测试 测试方法: 单元测试:对 gettheta 函数进行测试,构造测试样例,保证分支覆盖。 节点测试:开启模拟器、主动控制模块、移动控制与避障模块。控制机器人向障碍物或墙壁移动,监听避障模块的返回值 k ,保证其取值范围为 ,并检测其值变化是否正常。同时需检查机器人是否能够及时减速或停止移动,以及停止后离障碍物的位置。在停止后,如果换一个方向移动(无障碍物),机器人可以正常启动。 需反馈: 避障模块是否运行正常 避障参数是否设置合理
| 0
|
814,832
| 30,523,887,164
|
IssuesEvent
|
2023-07-19 09:53:24
|
Weiver-project/Weiver
|
https://api.github.com/repos/Weiver-project/Weiver
|
closed
|
BE_[Feat]: 배우 정보 조회
|
✨feat 🟡 Priority: Medium
|
## 📃To do List
- [x] 오늘의 배우 조회
- 랜덤으로 배우ID 통해서 정보[배우 이미지, 이름, 출연작(10개)] 가져오기
- [x] 배우 상세 페이지에서 배우 정보 조회
- 배우ID 통해 정보[이름, 프로필 사진, 작품 포스터] 가져오기
- [x] 뮤지컬 상세 페이지에서 배우 정보 조회
- 조회한 뮤지컬에 따라 배우 매칭 정보를 기반으로 [프로필 사진, 이름, 배역] 가져오기
|
1.0
|
BE_[Feat]: 배우 정보 조회 - ## 📃To do List
- [x] 오늘의 배우 조회
- 랜덤으로 배우ID 통해서 정보[배우 이미지, 이름, 출연작(10개)] 가져오기
- [x] 배우 상세 페이지에서 배우 정보 조회
- 배우ID 통해 정보[이름, 프로필 사진, 작품 포스터] 가져오기
- [x] 뮤지컬 상세 페이지에서 배우 정보 조회
- 조회한 뮤지컬에 따라 배우 매칭 정보를 기반으로 [프로필 사진, 이름, 배역] 가져오기
|
non_process
|
be 배우 정보 조회 📃to do list 오늘의 배우 조회 랜덤으로 배우id 통해서 정보 가져오기 배우 상세 페이지에서 배우 정보 조회 배우id 통해 정보 가져오기 뮤지컬 상세 페이지에서 배우 정보 조회 조회한 뮤지컬에 따라 배우 매칭 정보를 기반으로 가져오기
| 0
|
15,270
| 19,250,065,884
|
IssuesEvent
|
2021-12-09 03:22:58
|
pytorch/pytorch
|
https://api.github.com/repos/pytorch/pytorch
|
opened
|
DISABLED test_fd_pool (__main__.TestMultiprocessing)
|
module: multiprocessing module: flaky-tests
|
This test has been determined flaky through reruns in CI and its instances are reported in our flaky_tests table here https://metrics.pytorch.org/d/L0r6ErGnk/github-status?orgId=1&from=1636426818307&to=1639018818307&viewPanel=57.
It is our second flakiest test in the last 15 days with 28 failed instances.
```
======================================================================
FAIL [4.720s]: test_fd_pool (__main__.TestMultiprocessing)
----------------------------------------------------------------------
Traceback (most recent call last):
File "test_multiprocessing.py", line 341, in test_fd_pool
self._test_pool(repeat=TEST_REPEATS)
File "test_multiprocessing.py", line 327, in _test_pool
do_test()
File "test_multiprocessing.py", line 206, in __exit__
self.test_case.assertFalse(self.has_shm_files())
AssertionError: True is not false
```
Please look at the table for details from the past 30 days such as
* number of failed instances
* an example url
* which platforms it failed on
* the number of times it failed on trunk vs on PRs.
|
1.0
|
DISABLED test_fd_pool (__main__.TestMultiprocessing) - This test has been determined flaky through reruns in CI and its instances are reported in our flaky_tests table here https://metrics.pytorch.org/d/L0r6ErGnk/github-status?orgId=1&from=1636426818307&to=1639018818307&viewPanel=57.
It is our second flakiest test in the last 15 days with 28 failed instances.
```
======================================================================
FAIL [4.720s]: test_fd_pool (__main__.TestMultiprocessing)
----------------------------------------------------------------------
Traceback (most recent call last):
File "test_multiprocessing.py", line 341, in test_fd_pool
self._test_pool(repeat=TEST_REPEATS)
File "test_multiprocessing.py", line 327, in _test_pool
do_test()
File "test_multiprocessing.py", line 206, in __exit__
self.test_case.assertFalse(self.has_shm_files())
AssertionError: True is not false
```
Please look at the table for details from the past 30 days such as
* number of failed instances
* an example url
* which platforms it failed on
* the number of times it failed on trunk vs on PRs.
|
process
|
disabled test fd pool main testmultiprocessing this test has been determined flaky through reruns in ci and its instances are reported in our flaky tests table here it is our second flakiest test in the last days with failed instances fail test fd pool main testmultiprocessing traceback most recent call last file test multiprocessing py line in test fd pool self test pool repeat test repeats file test multiprocessing py line in test pool do test file test multiprocessing py line in exit self test case assertfalse self has shm files assertionerror true is not false please look at the table for details from the past days such as number of failed instances an example url which platforms it failed on the number of times it failed on trunk vs on prs
| 1
|
267,110
| 28,497,428,001
|
IssuesEvent
|
2023-04-18 15:04:18
|
lukebrogan-mend/vulnerable-node
|
https://api.github.com/repos/lukebrogan-mend/vulnerable-node
|
opened
|
bootstrap-3.3.6.min.js: 6 vulnerabilities (highest severity is: 6.1)
|
Mend: dependency security vulnerability
|
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (bootstrap version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2019-8331](https://www.mend.io/vulnerability-database/CVE-2019-8331) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1 | ❌ |
| [CVE-2018-14040](https://www.mend.io/vulnerability-database/CVE-2018-14040) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0 | ❌ |
| [CVE-2018-20677](https://www.mend.io/vulnerability-database/CVE-2018-20677) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0 | ❌ |
| [CVE-2018-14042](https://www.mend.io/vulnerability-database/CVE-2018-14042) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0 | ❌ |
| [CVE-2018-20676](https://www.mend.io/vulnerability-database/CVE-2018-20676) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | bootstrap - 3.4.0 | ❌ |
| [CVE-2016-10735](https://www.mend.io/vulnerability-database/CVE-2016-10735) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | bootstrap - 3.4.0, 4.0.0-beta.2 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2019-8331</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
<p>Publish Date: 2019-02-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-8331>CVE-2019-8331</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2019-02-20</p>
<p>Fix Resolution: bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2018-14040</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
<p>Publish Date: 2018-07-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-14040>CVE-2018-14040</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2018-07-13</p>
<p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2018-20677</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
<p>Publish Date: 2019-01-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-20677>CVE-2018-20677</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677</a></p>
<p>Release Date: 2019-01-09</p>
<p>Fix Resolution: Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2018-14042</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
<p>Publish Date: 2018-07-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-14042>CVE-2018-14042</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2018-07-13</p>
<p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2018-20676</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
<p>Publish Date: 2019-01-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-20676>CVE-2018-20676</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676</a></p>
<p>Release Date: 2019-01-09</p>
<p>Fix Resolution: bootstrap - 3.4.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2016-10735</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
Mend Note: Converted from WS-2018-0021, on 2022-11-08.
<p>Publish Date: 2019-01-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10735>CVE-2016-10735</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735</a></p>
<p>Release Date: 2019-01-09</p>
<p>Fix Resolution: bootstrap - 3.4.0, 4.0.0-beta.2</p>
</p>
<p></p>
</details>
|
True
|
bootstrap-3.3.6.min.js: 6 vulnerabilities (highest severity is: 6.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (bootstrap version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2019-8331](https://www.mend.io/vulnerability-database/CVE-2019-8331) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1 | ❌ |
| [CVE-2018-14040](https://www.mend.io/vulnerability-database/CVE-2018-14040) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0 | ❌ |
| [CVE-2018-20677](https://www.mend.io/vulnerability-database/CVE-2018-20677) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0 | ❌ |
| [CVE-2018-14042](https://www.mend.io/vulnerability-database/CVE-2018-14042) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0 | ❌ |
| [CVE-2018-20676](https://www.mend.io/vulnerability-database/CVE-2018-20676) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | bootstrap - 3.4.0 | ❌ |
| [CVE-2016-10735](https://www.mend.io/vulnerability-database/CVE-2016-10735) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.1 | bootstrap-3.3.6.min.js | Direct | bootstrap - 3.4.0, 4.0.0-beta.2 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2019-8331</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
<p>Publish Date: 2019-02-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-8331>CVE-2019-8331</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2019-02-20</p>
<p>Fix Resolution: bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2018-14040</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
<p>Publish Date: 2018-07-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-14040>CVE-2018-14040</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2018-07-13</p>
<p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2018-20677</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
<p>Publish Date: 2019-01-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-20677>CVE-2018-20677</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677</a></p>
<p>Release Date: 2019-01-09</p>
<p>Fix Resolution: Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2018-14042</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
<p>Publish Date: 2018-07-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-14042>CVE-2018-14042</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2018-07-13</p>
<p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2018-20676</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
<p>Publish Date: 2019-01-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-20676>CVE-2018-20676</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676</a></p>
<p>Release Date: 2019-01-09</p>
<p>Fix Resolution: bootstrap - 3.4.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2016-10735</summary>
### Vulnerable Library - <b>bootstrap-3.3.6.min.js</b></p>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.6/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /public/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/vulnerable-node/commit/9915a9218e97b39a26c1718a20660d544bbd8499">9915a9218e97b39a26c1718a20660d544bbd8499</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
Mend Note: Converted from WS-2018-0021, on 2022-11-08.
<p>Publish Date: 2019-01-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10735>CVE-2016-10735</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735</a></p>
<p>Release Date: 2019-01-09</p>
<p>Fix Resolution: bootstrap - 3.4.0, 4.0.0-beta.2</p>
</p>
<p></p>
</details>
|
non_process
|
bootstrap min js vulnerabilities highest severity is vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library public js bootstrap min js found in head commit a href vulnerabilities cve severity cvss dependency type fixed in bootstrap version remediation available medium bootstrap min js direct bootstrap bootstrap sass medium bootstrap min js direct org webjars npm bootstrap org webjars bootstrap medium bootstrap min js direct bootstrap nordron angulartemplate dynamic net express projecttemplates dotnetng template znxtapp core module theme beta jmeter medium bootstrap min js direct org webjars npm bootstrap org webjars bootstrap medium bootstrap min js direct bootstrap medium bootstrap min js direct bootstrap beta details cve vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library public js bootstrap min js dependency hierarchy x bootstrap min js vulnerable library found in head commit a href found in base branch master vulnerability details in bootstrap before and x before xss is possible in the tooltip or popover data template attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution bootstrap bootstrap sass cve vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library public js bootstrap min js dependency hierarchy x bootstrap min js vulnerable library found in head commit a href found in base branch master vulnerability details in bootstrap before xss is possible in the collapse data parent attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution org webjars npm bootstrap org webjars bootstrap cve vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library public js bootstrap min js dependency hierarchy x bootstrap min js vulnerable library found in head commit a href found in base branch master vulnerability details in bootstrap before xss is possible in the affix configuration target property publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bootstrap nordron angulartemplate dynamic net express projecttemplates dotnetng template znxtapp core module theme beta jmeter cve vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library public js bootstrap min js dependency hierarchy x bootstrap min js vulnerable library found in head commit a href found in base branch master vulnerability details in bootstrap before xss is possible in the data container property of tooltip publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution org webjars npm bootstrap org webjars bootstrap cve vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library public js bootstrap min js dependency hierarchy x bootstrap min js vulnerable library found in head commit a href found in base branch master vulnerability details in bootstrap before xss is possible in the tooltip data viewport attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bootstrap cve vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library public js bootstrap min js dependency hierarchy x bootstrap min js vulnerable library found in head commit a href found in base branch master vulnerability details in bootstrap x before and x beta before beta xss is possible in the data target attribute a different vulnerability than cve mend note converted from ws on publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bootstrap beta
| 0
|
611,871
| 18,983,669,081
|
IssuesEvent
|
2021-11-21 10:44:27
|
26F-Studio/Techmino
|
https://api.github.com/repos/26F-Studio/Techmino
|
opened
|
Disconnecting a controller on the fly leaves phantom held keys
|
bug low priority
|
Screenshot with unintended behaviors (*Image(s) Here*):
If you can reproduce it, write the steps here. If you can't, try to describe the exactly time the game crash, like pressing which key or which button (*Details Here*):
- Connect a controller.
- Open a mode, and hold left key (or whatever this action is mapped to) on the controller.
- Disconnect the controller while the key is still held.
- The game will behave as if the key is still held. For example, if you drop a piece, the next piece will move to the left.
This phantom key-held status can be overwritten (and thus fixed) by pressing and releasing the corresponding button on another input device (eg, keyboard or another controller), thus this is a minor problem.
|
1.0
|
Disconnecting a controller on the fly leaves phantom held keys - Screenshot with unintended behaviors (*Image(s) Here*):
If you can reproduce it, write the steps here. If you can't, try to describe the exactly time the game crash, like pressing which key or which button (*Details Here*):
- Connect a controller.
- Open a mode, and hold left key (or whatever this action is mapped to) on the controller.
- Disconnect the controller while the key is still held.
- The game will behave as if the key is still held. For example, if you drop a piece, the next piece will move to the left.
This phantom key-held status can be overwritten (and thus fixed) by pressing and releasing the corresponding button on another input device (eg, keyboard or another controller), thus this is a minor problem.
|
non_process
|
disconnecting a controller on the fly leaves phantom held keys screenshot with unintended behaviors image s here if you can reproduce it write the steps here if you can t try to describe the exactly time the game crash like pressing which key or which button details here connect a controller open a mode and hold left key or whatever this action is mapped to on the controller disconnect the controller while the key is still held the game will behave as if the key is still held for example if you drop a piece the next piece will move to the left this phantom key held status can be overwritten and thus fixed by pressing and releasing the corresponding button on another input device eg keyboard or another controller thus this is a minor problem
| 0
|
20,184
| 26,745,213,931
|
IssuesEvent
|
2023-01-30 15:33:21
|
Open-EO/openeo-processes
|
https://api.github.com/repos/Open-EO/openeo-processes
|
closed
|
Vector data cubes + processes
|
help wanted new process breaking minor platform vector
|
We basically ignored vector data cubes and related processes until now and will need to add more related processes in 1.0, which will be a major work package!
We also need to update existing processes, which currently only support raster-cubes and add vector-cube support to processes that currently only allow geojson.
|
1.0
|
Vector data cubes + processes - We basically ignored vector data cubes and related processes until now and will need to add more related processes in 1.0, which will be a major work package!
We also need to update existing processes, which currently only support raster-cubes and add vector-cube support to processes that currently only allow geojson.
|
process
|
vector data cubes processes we basically ignored vector data cubes and related processes until now and will need to add more related processes in which will be a major work package we also need to update existing processes which currently only support raster cubes and add vector cube support to processes that currently only allow geojson
| 1
|
16,053
| 20,194,739,296
|
IssuesEvent
|
2022-02-11 09:37:21
|
PPHubApp/PPHub-Feedback
|
https://api.github.com/repos/PPHubApp/PPHub-Feedback
|
closed
|
v2.4.7 - “文本转换为UTF8编码时失败”
当代码...
|
Enhancement💯 Processing 👨🏻💻🚧
|
“文本转换为UTF8编码时失败”
当代码中含有中文的时候,无法查看线上代码;虽然提供了前往网页查看的功能,但是如果是自己私有仓库的话需要登录才能查看;会略显不方便。
能否支持UTF8编码的解析功能?
运行环境: iPhone11 - iOS13.5.1 - v2.4.7(180)
|
1.0
|
v2.4.7 - “文本转换为UTF8编码时失败”
当代码... - “文本转换为UTF8编码时失败”
当代码中含有中文的时候,无法查看线上代码;虽然提供了前往网页查看的功能,但是如果是自己私有仓库的话需要登录才能查看;会略显不方便。
能否支持UTF8编码的解析功能?
运行环境: iPhone11 - iOS13.5.1 - v2.4.7(180)
|
process
|
“ ” 当代码 “ ” 当代码中含有中文的时候,无法查看线上代码;虽然提供了前往网页查看的功能,但是如果是自己私有仓库的话需要登录才能查看;会略显不方便。 ? 运行环境
| 1
|
2,368
| 5,167,535,875
|
IssuesEvent
|
2017-01-17 19:06:11
|
w3c/mediacapture-record
|
https://api.github.com/repos/w3c/mediacapture-record
|
closed
|
Convert mediacapture-record spec to bikeshed
|
process/infra
|
I propose moving this Spec to bikeshed in the spirit of w3c/mediacapture-image#139. Like in this issue, the only blocker is the WG boilerplate in tabatkins/bikeshed#890. Otherwise, I _love_ being able to fold those `<a href="https://www.w3.org/TR/FileAPI/#blob"><code>Blob</code></a>` into just `{{Blob}}`, and add a lot of direct links into `MediaStream` and `MediaStreamTrack` sections.
I already added the bs version in [a branch](http://rawgit.com/Miguelao/mediacapture-record/prP__bikeshed/index3.html).
|
1.0
|
Convert mediacapture-record spec to bikeshed - I propose moving this Spec to bikeshed in the spirit of w3c/mediacapture-image#139. Like in this issue, the only blocker is the WG boilerplate in tabatkins/bikeshed#890. Otherwise, I _love_ being able to fold those `<a href="https://www.w3.org/TR/FileAPI/#blob"><code>Blob</code></a>` into just `{{Blob}}`, and add a lot of direct links into `MediaStream` and `MediaStreamTrack` sections.
I already added the bs version in [a branch](http://rawgit.com/Miguelao/mediacapture-record/prP__bikeshed/index3.html).
|
process
|
convert mediacapture record spec to bikeshed i propose moving this spec to bikeshed in the spirit of mediacapture image like in this issue the only blocker is the wg boilerplate in tabatkins bikeshed otherwise i love being able to fold those a href into just blob and add a lot of direct links into mediastream and mediastreamtrack sections i already added the bs version in
| 1
|
52,563
| 6,260,920,409
|
IssuesEvent
|
2017-07-14 22:02:32
|
geoffhumphrey/brewcompetitiononlineentry
|
https://api.github.com/repos/geoffhumphrey/brewcompetitiononlineentry
|
closed
|
Pay pal not updating some paid users
|
enhancement in latest master commit v2.1.10
|
Not exactly sure why, but a good amount of users don't get updated when the pay with paypal. Not sure how to replicate, but might be good to look at. Thanks
|
1.0
|
Pay pal not updating some paid users - Not exactly sure why, but a good amount of users don't get updated when the pay with paypal. Not sure how to replicate, but might be good to look at. Thanks
|
non_process
|
pay pal not updating some paid users not exactly sure why but a good amount of users don t get updated when the pay with paypal not sure how to replicate but might be good to look at thanks
| 0
|
224,691
| 7,472,053,471
|
IssuesEvent
|
2018-04-03 11:20:51
|
salesagility/SuiteCRM
|
https://api.github.com/repos/salesagility/SuiteCRM
|
closed
|
Problem exporting account when filter is applied
|
Fix Proposed Medium Priority Resolved: Next Release bug
|
Hi everybody:
I've found a problem, maybe a bug, when I tried to export an accounts list after applied a filter by campaign name.
I haven't found any topic on forum about this and the help in forum haven't solve the problem.
This is the way to reproduce the problem:
1. Add the field 'campaign_name' to the available fields on layaouts filter and list views using studio
2. Filter accounts by any campaign, filter works fine
3. Select all accounts after filter and export them using export on 'bulk action' menu
4. The page goes blank
I hope that SuiteCRM export the CSV filtering only the accounts with the corresponding campaign name given, but fails with white page.
As I see on suitecrm.log file, there are a problem with the SQL query:
`Query Failed:
SELECT
accounts.*, email_addresses.email_address email_address, '' email_addresses_non_primary, accounts.name as account_name,
users.user_name as assigned_user_name ,accounts_cstm.jjwg_maps_lng_c,accounts_cstm.jjwg_maps_lat_c,accounts_cstm.jjwg_maps_geocode_status_c,accounts_cstm.jjwg_maps_address_c
FROM
accounts LEFT JOIN users
ON accounts.assigned_user_id=users.id
LEFT JOIN email_addr_bean_rel
on accounts.id = email_addr_bean_rel.bean_id and email_addr_bean_rel.bean_module='Accounts' and email_addr_bean_rel.deleted=0 and email_addr_bean_rel.primary_address=1
LEFT JOIN email_addresses
on email_addresses.id = email_addr_bean_rel.email_address_id
LEFT JOIN accounts_cstm
ON accounts.id = accounts_cstm.id_c
where
((campaign_name like 'CAMPAIGN1%')) AND ( accounts.deleted IS NULL OR accounts.deleted=0 )
: MySQL error 1054: Unknown column 'campaign_name' in 'where clause'
Fri Jan 12 17:18:16 2018 [10499][d7feffe7-41cb-10c1-d063-5a37de0929cc][FATAL] Exception handling in /var/www/html/include/MVC/Controller/SugarController.php:402
Fri Jan 12 17:18:16 2018 [10499][d7feffe7-41cb-10c1-d063-5a37de0929cc][FATAL] Exception in Controller: Database failure. Please refer to suitecrm.log for details.
Fri Jan 12 17:18:16 2018 [10499][d7feffe7-41cb-10c1-d063-5a37de0929cc][FATAL] backtrace:
#0 /var/www/html/include/database/DBManager.php(353): sugar_die('Database failur...')
#1 /var/www/html/include/database/DBManager.php(328): DBManager->registerError('Error exporting...', 'Error exporting...', true)
#2 /var/www/html/include/database/MysqliManager.php(160): DBManager->checkError('Error exporting...', true)
#3 /var/www/html/include/export_utils.php(172): MysqliManager->query('SELECT\n ...', true, 'Error exporting...')
#4 /var/www/html/export.php(67): export('Accounts')
#5 /var/www/html/include/MVC/Controller/SugarController.php(1014): require_once('/var/www/html/a...')
#6 /var/www/html/include/MVC/Controller/SugarController.php(465): SugarController->handleEntryPoint()
#7 /var/www/html/include/MVC/Controller/SugarController.php(373): SugarController->process()
#8 /var/www/html/include/MVC/SugarApplication.php(105): SugarController->execute()
#9 /var/www/html/index.php(52): SugarApplication->execute()
#10 {main}`
the only error I see on ssl_error_log is:
`[Mon Jan 15 10:20:34.578925 2018] [:error] [pid 9557] [client 186.155.36.130:19278] PHP Notice: Only variables should be passed by reference in /var/www/html/include/export_utils.php on line 556, referer: https://mydomain.com/index.php?module=Accounts&action=index`
There is clear that the where clause is trying to search all records where 'campaign_name' is like the desired Campaign Name, but the column campaign_name does not exist on accounts table or any other table on this query.
I have discus this bug on forum at [https://suitecrm.com/forum/suitecrm-7-0-discussion/17301-problem-exporting-account-when-filter-is-applied](url), but can't solve the problem, it seems that there are one more user who has the same or very similar problem.
Maybe is a problem when SuiteCRM tries to build the query or as the forum says could be something related with module deploying or something like that.
Environment
* SuiteCRM Version used: 7.9.8
* Browser name and version: Versión 63.0.3239.132
* mysql Ver 15.1 Distrib 5.5.56-MariaDB, for Linux (x86_64) using readline 5.1, PHP 7.0.26, Zend Engine v3.0.0, Apache 2
* Operating System and version: CentOS Linux release 7.4.1708 (Core)
Thanks for your help.
David.
|
1.0
|
Problem exporting account when filter is applied - Hi everybody:
I've found a problem, maybe a bug, when I tried to export an accounts list after applied a filter by campaign name.
I haven't found any topic on forum about this and the help in forum haven't solve the problem.
This is the way to reproduce the problem:
1. Add the field 'campaign_name' to the available fields on layaouts filter and list views using studio
2. Filter accounts by any campaign, filter works fine
3. Select all accounts after filter and export them using export on 'bulk action' menu
4. The page goes blank
I hope that SuiteCRM export the CSV filtering only the accounts with the corresponding campaign name given, but fails with white page.
As I see on suitecrm.log file, there are a problem with the SQL query:
`Query Failed:
SELECT
accounts.*, email_addresses.email_address email_address, '' email_addresses_non_primary, accounts.name as account_name,
users.user_name as assigned_user_name ,accounts_cstm.jjwg_maps_lng_c,accounts_cstm.jjwg_maps_lat_c,accounts_cstm.jjwg_maps_geocode_status_c,accounts_cstm.jjwg_maps_address_c
FROM
accounts LEFT JOIN users
ON accounts.assigned_user_id=users.id
LEFT JOIN email_addr_bean_rel
on accounts.id = email_addr_bean_rel.bean_id and email_addr_bean_rel.bean_module='Accounts' and email_addr_bean_rel.deleted=0 and email_addr_bean_rel.primary_address=1
LEFT JOIN email_addresses
on email_addresses.id = email_addr_bean_rel.email_address_id
LEFT JOIN accounts_cstm
ON accounts.id = accounts_cstm.id_c
where
((campaign_name like 'CAMPAIGN1%')) AND ( accounts.deleted IS NULL OR accounts.deleted=0 )
: MySQL error 1054: Unknown column 'campaign_name' in 'where clause'
Fri Jan 12 17:18:16 2018 [10499][d7feffe7-41cb-10c1-d063-5a37de0929cc][FATAL] Exception handling in /var/www/html/include/MVC/Controller/SugarController.php:402
Fri Jan 12 17:18:16 2018 [10499][d7feffe7-41cb-10c1-d063-5a37de0929cc][FATAL] Exception in Controller: Database failure. Please refer to suitecrm.log for details.
Fri Jan 12 17:18:16 2018 [10499][d7feffe7-41cb-10c1-d063-5a37de0929cc][FATAL] backtrace:
#0 /var/www/html/include/database/DBManager.php(353): sugar_die('Database failur...')
#1 /var/www/html/include/database/DBManager.php(328): DBManager->registerError('Error exporting...', 'Error exporting...', true)
#2 /var/www/html/include/database/MysqliManager.php(160): DBManager->checkError('Error exporting...', true)
#3 /var/www/html/include/export_utils.php(172): MysqliManager->query('SELECT\n ...', true, 'Error exporting...')
#4 /var/www/html/export.php(67): export('Accounts')
#5 /var/www/html/include/MVC/Controller/SugarController.php(1014): require_once('/var/www/html/a...')
#6 /var/www/html/include/MVC/Controller/SugarController.php(465): SugarController->handleEntryPoint()
#7 /var/www/html/include/MVC/Controller/SugarController.php(373): SugarController->process()
#8 /var/www/html/include/MVC/SugarApplication.php(105): SugarController->execute()
#9 /var/www/html/index.php(52): SugarApplication->execute()
#10 {main}`
the only error I see on ssl_error_log is:
`[Mon Jan 15 10:20:34.578925 2018] [:error] [pid 9557] [client 186.155.36.130:19278] PHP Notice: Only variables should be passed by reference in /var/www/html/include/export_utils.php on line 556, referer: https://mydomain.com/index.php?module=Accounts&action=index`
There is clear that the where clause is trying to search all records where 'campaign_name' is like the desired Campaign Name, but the column campaign_name does not exist on accounts table or any other table on this query.
I have discus this bug on forum at [https://suitecrm.com/forum/suitecrm-7-0-discussion/17301-problem-exporting-account-when-filter-is-applied](url), but can't solve the problem, it seems that there are one more user who has the same or very similar problem.
Maybe is a problem when SuiteCRM tries to build the query or as the forum says could be something related with module deploying or something like that.
Environment
* SuiteCRM Version used: 7.9.8
* Browser name and version: Versión 63.0.3239.132
* mysql Ver 15.1 Distrib 5.5.56-MariaDB, for Linux (x86_64) using readline 5.1, PHP 7.0.26, Zend Engine v3.0.0, Apache 2
* Operating System and version: CentOS Linux release 7.4.1708 (Core)
Thanks for your help.
David.
|
non_process
|
problem exporting account when filter is applied hi everybody i ve found a problem maybe a bug when i tried to export an accounts list after applied a filter by campaign name i haven t found any topic on forum about this and the help in forum haven t solve the problem this is the way to reproduce the problem add the field campaign name to the available fields on layaouts filter and list views using studio filter accounts by any campaign filter works fine select all accounts after filter and export them using export on bulk action menu the page goes blank i hope that suitecrm export the csv filtering only the accounts with the corresponding campaign name given but fails with white page as i see on suitecrm log file there are a problem with the sql query query failed select accounts email addresses email address email address email addresses non primary accounts name as account name users user name as assigned user name accounts cstm jjwg maps lng c accounts cstm jjwg maps lat c accounts cstm jjwg maps geocode status c accounts cstm jjwg maps address c from accounts left join users on accounts assigned user id users id left join email addr bean rel on accounts id email addr bean rel bean id and email addr bean rel bean module accounts and email addr bean rel deleted and email addr bean rel primary address left join email addresses on email addresses id email addr bean rel email address id left join accounts cstm on accounts id accounts cstm id c where campaign name like and accounts deleted is null or accounts deleted mysql error unknown column campaign name in where clause fri jan exception handling in var www html include mvc controller sugarcontroller php fri jan exception in controller database failure please refer to suitecrm log for details fri jan backtrace var www html include database dbmanager php sugar die database failur var www html include database dbmanager php dbmanager registererror error exporting error exporting true var www html include database mysqlimanager php dbmanager checkerror error exporting true var www html include export utils php mysqlimanager query select n true error exporting var www html export php export accounts var www html include mvc controller sugarcontroller php require once var www html a var www html include mvc controller sugarcontroller php sugarcontroller handleentrypoint var www html include mvc controller sugarcontroller php sugarcontroller process var www html include mvc sugarapplication php sugarcontroller execute var www html index php sugarapplication execute main the only error i see on ssl error log is php notice only variables should be passed by reference in var www html include export utils php on line referer there is clear that the where clause is trying to search all records where campaign name is like the desired campaign name but the column campaign name does not exist on accounts table or any other table on this query i have discus this bug on forum at url but can t solve the problem it seems that there are one more user who has the same or very similar problem maybe is a problem when suitecrm tries to build the query or as the forum says could be something related with module deploying or something like that environment suitecrm version used browser name and version versión mysql ver distrib mariadb for linux using readline php zend engine apache operating system and version centos linux release core thanks for your help david
| 0
|
17,897
| 23,872,820,085
|
IssuesEvent
|
2022-09-07 16:09:20
|
GregTechCEu/gt-ideas
|
https://api.github.com/repos/GregTechCEu/gt-ideas
|
opened
|
The Mond Process
|
processing chain
|
## Details
The Mond Process produces Nickel and a Cobalt byproduct from Garnierite.
## Products
Main Product: Nickel
Side Product(s): Cobalt
## Steps
2 Garnierite (s) + 2 Hydrogen (g) -> Impure Nickel (s) + Steam (g)
`NiO (s) + 2H (g) -> Ni (s) + H2O (g)`
This step is performend at 473K.
Impure Nickel (s) + 5 Carbon Monoxide (g) -> Nickel Carbonyl (g) + 1 Tetracobalt Dodecacarbonyl (s)
`Ni (s) + 5CO (g) -> Ni(CO)4 (g) + 1/12 Co4(CO)12 (s)`
Nickel Carbonyl (g) -> Nickel (s) + 4 Carbon Monoxide (g)
`Ni(CO)4 (g) -> Ni (s) + 4CO (g)`
This step is performed at 493K in a chamber filled with solid nickel spheres.
3 Tetracobalt Dodecacarbonyl (s) -> Cobalt (s) + 3 Carbon Monoxide (g)
`Co4(CO)12 -> 4Co (s) + 12CO (g)`
## Yield
2 Garnierite -> 1 Nickel
6 Garnierite -> 1 Cobalt
## Sources
https://en.wikipedia.org/wiki/Mond_process
https://en.wikipedia.org/wiki/Nickel
|
1.0
|
The Mond Process - ## Details
The Mond Process produces Nickel and a Cobalt byproduct from Garnierite.
## Products
Main Product: Nickel
Side Product(s): Cobalt
## Steps
2 Garnierite (s) + 2 Hydrogen (g) -> Impure Nickel (s) + Steam (g)
`NiO (s) + 2H (g) -> Ni (s) + H2O (g)`
This step is performend at 473K.
Impure Nickel (s) + 5 Carbon Monoxide (g) -> Nickel Carbonyl (g) + 1 Tetracobalt Dodecacarbonyl (s)
`Ni (s) + 5CO (g) -> Ni(CO)4 (g) + 1/12 Co4(CO)12 (s)`
Nickel Carbonyl (g) -> Nickel (s) + 4 Carbon Monoxide (g)
`Ni(CO)4 (g) -> Ni (s) + 4CO (g)`
This step is performed at 493K in a chamber filled with solid nickel spheres.
3 Tetracobalt Dodecacarbonyl (s) -> Cobalt (s) + 3 Carbon Monoxide (g)
`Co4(CO)12 -> 4Co (s) + 12CO (g)`
## Yield
2 Garnierite -> 1 Nickel
6 Garnierite -> 1 Cobalt
## Sources
https://en.wikipedia.org/wiki/Mond_process
https://en.wikipedia.org/wiki/Nickel
|
process
|
the mond process details the mond process produces nickel and a cobalt byproduct from garnierite products main product nickel side product s cobalt steps garnierite s hydrogen g impure nickel s steam g nio s g ni s g this step is performend at impure nickel s carbon monoxide g nickel carbonyl g tetracobalt dodecacarbonyl s ni s g ni co g co s nickel carbonyl g nickel s carbon monoxide g ni co g ni s g this step is performed at in a chamber filled with solid nickel spheres tetracobalt dodecacarbonyl s cobalt s carbon monoxide g co s g yield garnierite nickel garnierite cobalt sources
| 1
|
80,981
| 30,640,639,410
|
IssuesEvent
|
2023-07-24 21:37:36
|
NREL/EnergyPlus
|
https://api.github.com/repos/NREL/EnergyPlus
|
closed
|
EnergyPlus fail to run when IDF file path has special character
|
Defect
|
Issue overview
--------------
EnergyPlus fail to run calculation when I have accented character in the path of the IDF file. For example, I have an IDF file in the folder "D:\térmica Oficinas". When I run simulation with EPLaunch, I get the following error:

If I run simulation in Command Line, I get the following error message:

### Details
Some additional details for this issue (if relevant):
- Platform: Windows 10
- Version of EnergyPlus: EnergyPlus 22.2.0
- Unmethours link or helpdesk ticket number: N/A
### Checklist
Add to this list or remove from it as applicable. This is a simple templated set of guidelines.
- [ ] Defect file added (list location of defect file here)
- [x] Ticket added to Pivotal for defect (development team task)
- [ ] Pull request created (the pull request will have additional tasks related to reviewing changes that fix this defect)
|
1.0
|
EnergyPlus fail to run when IDF file path has special character - Issue overview
--------------
EnergyPlus fail to run calculation when I have accented character in the path of the IDF file. For example, I have an IDF file in the folder "D:\térmica Oficinas". When I run simulation with EPLaunch, I get the following error:

If I run simulation in Command Line, I get the following error message:

### Details
Some additional details for this issue (if relevant):
- Platform: Windows 10
- Version of EnergyPlus: EnergyPlus 22.2.0
- Unmethours link or helpdesk ticket number: N/A
### Checklist
Add to this list or remove from it as applicable. This is a simple templated set of guidelines.
- [ ] Defect file added (list location of defect file here)
- [x] Ticket added to Pivotal for defect (development team task)
- [ ] Pull request created (the pull request will have additional tasks related to reviewing changes that fix this defect)
|
non_process
|
energyplus fail to run when idf file path has special character issue overview energyplus fail to run calculation when i have accented character in the path of the idf file for example i have an idf file in the folder d térmica oficinas when i run simulation with eplaunch i get the following error if i run simulation in command line i get the following error message details some additional details for this issue if relevant platform windows version of energyplus energyplus unmethours link or helpdesk ticket number n a checklist add to this list or remove from it as applicable this is a simple templated set of guidelines defect file added list location of defect file here ticket added to pivotal for defect development team task pull request created the pull request will have additional tasks related to reviewing changes that fix this defect
| 0
|
2,753
| 5,664,348,438
|
IssuesEvent
|
2017-04-11 01:59:24
|
dotnet/corefx
|
https://api.github.com/repos/dotnet/corefx
|
closed
|
[Netfx bug]: ProcessStartInfo.Verbs throws InvalidCastException when an int value is present in the RegistryKey
|
area-System.Diagnostics.Process netfx-port-consider
|
On netfx we try to do this when getting the verbs:
```cs
string value = (string)key.GetValue(String.Empty);
```
Where we cast the value to string no matter what is the type of that value.
On netcoreapp we do:
```cs
string value = key.GetValue(string.Empty) as string;
if (string.IsNullOrEmpty(value))
return Array.Empty<string>();
```
Where we use safe cast and verify that the value is not null or empty.
If we run the following code (has to be as an administrator) in full framework we will get an `InvalidCastException` since it is adding an int value to the `RegistryKey`:
```cs
const string Extension = ".nonstringextension";
const string FileName = "file" + Extension;
try
{
RegistryKey key = Registry.ClassesRoot.CreateSubKey(Extension);
key.SetValue("", 123);
}
catch (UnauthorizedAccessException)
{
return;
}
try
{
var info = new ProcessStartInfo { FileName = FileName };
Assert.Empty(info.Verbs); // netfx: throws InvalidCastException. netcoreapp: returns empty
}
finally
{
Registry.ClassesRoot.DeleteSubKeyTree(Extension);
}
```
Thanks @hughbe for finding this.
|
1.0
|
[Netfx bug]: ProcessStartInfo.Verbs throws InvalidCastException when an int value is present in the RegistryKey - On netfx we try to do this when getting the verbs:
```cs
string value = (string)key.GetValue(String.Empty);
```
Where we cast the value to string no matter what is the type of that value.
On netcoreapp we do:
```cs
string value = key.GetValue(string.Empty) as string;
if (string.IsNullOrEmpty(value))
return Array.Empty<string>();
```
Where we use safe cast and verify that the value is not null or empty.
If we run the following code (has to be as an administrator) in full framework we will get an `InvalidCastException` since it is adding an int value to the `RegistryKey`:
```cs
const string Extension = ".nonstringextension";
const string FileName = "file" + Extension;
try
{
RegistryKey key = Registry.ClassesRoot.CreateSubKey(Extension);
key.SetValue("", 123);
}
catch (UnauthorizedAccessException)
{
return;
}
try
{
var info = new ProcessStartInfo { FileName = FileName };
Assert.Empty(info.Verbs); // netfx: throws InvalidCastException. netcoreapp: returns empty
}
finally
{
Registry.ClassesRoot.DeleteSubKeyTree(Extension);
}
```
Thanks @hughbe for finding this.
|
process
|
processstartinfo verbs throws invalidcastexception when an int value is present in the registrykey on netfx we try to do this when getting the verbs cs string value string key getvalue string empty where we cast the value to string no matter what is the type of that value on netcoreapp we do cs string value key getvalue string empty as string if string isnullorempty value return array empty where we use safe cast and verify that the value is not null or empty if we run the following code has to be as an administrator in full framework we will get an invalidcastexception since it is adding an int value to the registrykey cs const string extension nonstringextension const string filename file extension try registrykey key registry classesroot createsubkey extension key setvalue catch unauthorizedaccessexception return try var info new processstartinfo filename filename assert empty info verbs netfx throws invalidcastexception netcoreapp returns empty finally registry classesroot deletesubkeytree extension thanks hughbe for finding this
| 1
|
16,892
| 22,194,885,007
|
IssuesEvent
|
2022-06-07 05:37:02
|
camunda/zeebe
|
https://api.github.com/repos/camunda/zeebe
|
closed
|
Expand Elastic Search exporter for ProcessInstanceCreation record
|
team/process-automation
|
Specifically, we'll need to expand the [template of ProcessInstanceCreation record](https://github.com/camunda/zeebe/blob/main/exporters/elasticsearch-exporter/src/main/resources/zeebe-record-process-instance-creation-template.json)) with the start instructions.
Blocked by #9388
|
1.0
|
Expand Elastic Search exporter for ProcessInstanceCreation record - Specifically, we'll need to expand the [template of ProcessInstanceCreation record](https://github.com/camunda/zeebe/blob/main/exporters/elasticsearch-exporter/src/main/resources/zeebe-record-process-instance-creation-template.json)) with the start instructions.
Blocked by #9388
|
process
|
expand elastic search exporter for processinstancecreation record specifically we ll need to expand the with the start instructions blocked by
| 1
|
743,966
| 25,921,575,837
|
IssuesEvent
|
2022-12-15 22:34:12
|
rokwire/illinois-app
|
https://api.github.com/repos/rokwire/illinois-app
|
closed
|
[FEATURE] Please add link to Video Tutorials in Campus Guide.
|
Type: Feature Request Priority: High
|
[[ @vburgett - Would you please review this and assign it to Mark when it's OK? (thanks, joe) ]]
So that we can make new videos available within the app as they are created, we would like to add new videos via Campus Guide.
Please confirm with JP, but he asked to have a landing page for Video Tutorials in Campus Guide that could be linked from Browse > App Help.
_Browse > App Help > Video Tutorial_
can point to
_Campus Guide :: Help > Video Tutorials > Video Tutorials for the Illinois App_
Make Video Tutorial plural in the menu item name.
|
1.0
|
[FEATURE] Please add link to Video Tutorials in Campus Guide. - [[ @vburgett - Would you please review this and assign it to Mark when it's OK? (thanks, joe) ]]
So that we can make new videos available within the app as they are created, we would like to add new videos via Campus Guide.
Please confirm with JP, but he asked to have a landing page for Video Tutorials in Campus Guide that could be linked from Browse > App Help.
_Browse > App Help > Video Tutorial_
can point to
_Campus Guide :: Help > Video Tutorials > Video Tutorials for the Illinois App_
Make Video Tutorial plural in the menu item name.
|
non_process
|
please add link to video tutorials in campus guide so that we can make new videos available within the app as they are created we would like to add new videos via campus guide please confirm with jp but he asked to have a landing page for video tutorials in campus guide that could be linked from browse app help browse app help video tutorial can point to campus guide help video tutorials video tutorials for the illinois app make video tutorial plural in the menu item name
| 0
|
164,001
| 6,218,077,105
|
IssuesEvent
|
2017-07-08 21:12:43
|
Tamaized/VoidCraft
|
https://api.github.com/repos/Tamaized/VoidCraft
|
closed
|
Xia generation problems
|
Bug Priority
|
In the most recent version of voidcraft (1.12-0.22.1) the Xia dimension doesn't generate right. none of the voidbrick blocks generate, nor do most of the holes in reality and the voidcraft:blocknobreak. I've tried in three different worlds (two of which were only voidcraft and TamModized
|
1.0
|
Xia generation problems - In the most recent version of voidcraft (1.12-0.22.1) the Xia dimension doesn't generate right. none of the voidbrick blocks generate, nor do most of the holes in reality and the voidcraft:blocknobreak. I've tried in three different worlds (two of which were only voidcraft and TamModized
|
non_process
|
xia generation problems in the most recent version of voidcraft the xia dimension doesn t generate right none of the voidbrick blocks generate nor do most of the holes in reality and the voidcraft blocknobreak i ve tried in three different worlds two of which were only voidcraft and tammodized
| 0
|
286,710
| 31,757,803,037
|
IssuesEvent
|
2023-09-12 01:02:18
|
Pio1006/envoy
|
https://api.github.com/repos/Pio1006/envoy
|
opened
|
CVE-2022-41721 (High) detected in github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b, github.com/golang/net-v0.0.0-20200301022130-244492dfa37a
|
Mend: dependency security vulnerability
|
## CVE-2022-41721 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b</b>, <b>github.com/golang/net-v0.0.0-20200301022130-244492dfa37a</b></p></summary>
<p>
<details><summary><b>github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b</b></p></summary>
<p>[mirror] Go supplementary network libraries</p>
<p>Library home page: <a href="https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20190403144856-b630fd6fe46b.zip">https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20190403144856-b630fd6fe46b.zip</a></p>
<p>
Dependency Hierarchy:
- github.com/grpc/grpc-go-v1.25.1 (Root Library)
- :x: **github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b** (Vulnerable Library)
</details>
<details><summary><b>github.com/golang/net-v0.0.0-20200301022130-244492dfa37a</b></p></summary>
<p>[mirror] Go supplementary network libraries</p>
<p>Library home page: <a href="https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20200301022130-244492dfa37a.zip">https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20200301022130-244492dfa37a.zip</a></p>
<p>
Dependency Hierarchy:
- github.com/grpc/grpc-go-v1.25.1 (Root Library)
- :x: **github.com/golang/net-v0.0.0-20200301022130-244492dfa37a** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Pio1006/envoy/commit/d853fd7abd23b213e8ecb1eded4fd77944aa8ed5">d853fd7abd23b213e8ecb1eded4fd77944aa8ed5</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.
<p>Publish Date: 2023-01-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41721>CVE-2022-41721</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2023-01-13</p>
<p>Fix Resolution: v0.2.0</p>
</p>
</details>
<p></p>
|
True
|
CVE-2022-41721 (High) detected in github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b, github.com/golang/net-v0.0.0-20200301022130-244492dfa37a - ## CVE-2022-41721 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b</b>, <b>github.com/golang/net-v0.0.0-20200301022130-244492dfa37a</b></p></summary>
<p>
<details><summary><b>github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b</b></p></summary>
<p>[mirror] Go supplementary network libraries</p>
<p>Library home page: <a href="https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20190403144856-b630fd6fe46b.zip">https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20190403144856-b630fd6fe46b.zip</a></p>
<p>
Dependency Hierarchy:
- github.com/grpc/grpc-go-v1.25.1 (Root Library)
- :x: **github.com/golang/net-v0.0.0-20190403144856-b630fd6fe46b** (Vulnerable Library)
</details>
<details><summary><b>github.com/golang/net-v0.0.0-20200301022130-244492dfa37a</b></p></summary>
<p>[mirror] Go supplementary network libraries</p>
<p>Library home page: <a href="https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20200301022130-244492dfa37a.zip">https://proxy.golang.org/github.com/golang/net/@v/v0.0.0-20200301022130-244492dfa37a.zip</a></p>
<p>
Dependency Hierarchy:
- github.com/grpc/grpc-go-v1.25.1 (Root Library)
- :x: **github.com/golang/net-v0.0.0-20200301022130-244492dfa37a** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Pio1006/envoy/commit/d853fd7abd23b213e8ecb1eded4fd77944aa8ed5">d853fd7abd23b213e8ecb1eded4fd77944aa8ed5</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.
<p>Publish Date: 2023-01-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41721>CVE-2022-41721</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2023-01-13</p>
<p>Fix Resolution: v0.2.0</p>
</p>
</details>
<p></p>
|
non_process
|
cve high detected in github com golang net github com golang net cve high severity vulnerability vulnerable libraries github com golang net github com golang net github com golang net go supplementary network libraries library home page a href dependency hierarchy github com grpc grpc go root library x github com golang net vulnerable library github com golang net go supplementary network libraries library home page a href dependency hierarchy github com grpc grpc go root library x github com golang net vulnerable library found in head commit a href found in base branch main vulnerability details a request smuggling attack is possible when using maxbyteshandler when using maxbyteshandler the body of an http request is not fully consumed when the server attempts to read frames from the connection it will instead be reading the body of the http request which could be attacker manipulated to represent arbitrary requests publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution
| 0
|
17,454
| 23,272,673,263
|
IssuesEvent
|
2022-08-05 02:06:02
|
MicrosoftDocs/azure-devops-docs
|
https://api.github.com/repos/MicrosoftDocs/azure-devops-docs
|
closed
|
Extract Year and Month from Date
|
devops/prod support-request cba Pri1 devops-cicd-process/tech
|
I need to get into Azure yaml file a variable that would consist of only year and month from the current date. How do I accomplish this?
I've already tried:
```
$(Year:yyyy).$(Month).$(Build.BuildNumber)
datetime_part("year", $(date)).datetime_part("month", $(date)).$(Build.BuildNumber)
format_datetime($(date)), 'yyyy.MM').$(Build.BuildNumber)
$(format('$(Year:yyyy)', pipeline.startTime)).$(format('$(Month)', pipeline.startTime)).$(Build.BuildNumber)
```
There must be some simple solution to this, but I failed to find a documentation for it. Please advise.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: a57f8545-bb15-3a71-1876-3a9ec1a59b93
* Version Independent ID: 28c87c8d-c28d-7493-0c7c-8c38b04fbcd7
* Content: [Run (build) number - Azure Pipelines](https://docs.microsoft.com/en-us/azure/devops/pipelines/process/run-number?view=azure-devops&tabs=yaml)
* Content Source: [docs/pipelines/process/run-number.md](https://github.com/MicrosoftDocs/azure-devops-docs/blob/main/docs/pipelines/process/run-number.md)
* Product: **devops**
* Technology: **devops-cicd-process**
* GitHub Login: @juliakm
* Microsoft Alias: **jukullam**
|
1.0
|
Extract Year and Month from Date - I need to get into Azure yaml file a variable that would consist of only year and month from the current date. How do I accomplish this?
I've already tried:
```
$(Year:yyyy).$(Month).$(Build.BuildNumber)
datetime_part("year", $(date)).datetime_part("month", $(date)).$(Build.BuildNumber)
format_datetime($(date)), 'yyyy.MM').$(Build.BuildNumber)
$(format('$(Year:yyyy)', pipeline.startTime)).$(format('$(Month)', pipeline.startTime)).$(Build.BuildNumber)
```
There must be some simple solution to this, but I failed to find a documentation for it. Please advise.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: a57f8545-bb15-3a71-1876-3a9ec1a59b93
* Version Independent ID: 28c87c8d-c28d-7493-0c7c-8c38b04fbcd7
* Content: [Run (build) number - Azure Pipelines](https://docs.microsoft.com/en-us/azure/devops/pipelines/process/run-number?view=azure-devops&tabs=yaml)
* Content Source: [docs/pipelines/process/run-number.md](https://github.com/MicrosoftDocs/azure-devops-docs/blob/main/docs/pipelines/process/run-number.md)
* Product: **devops**
* Technology: **devops-cicd-process**
* GitHub Login: @juliakm
* Microsoft Alias: **jukullam**
|
process
|
extract year and month from date i need to get into azure yaml file a variable that would consist of only year and month from the current date how do i accomplish this i ve already tried year yyyy month build buildnumber datetime part year date datetime part month date build buildnumber format datetime date yyyy mm build buildnumber format year yyyy pipeline starttime format month pipeline starttime build buildnumber there must be some simple solution to this but i failed to find a documentation for it please advise document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source product devops technology devops cicd process github login juliakm microsoft alias jukullam
| 1
|
22,555
| 31,765,418,058
|
IssuesEvent
|
2023-09-12 08:28:57
|
ppy/osu-web
|
https://api.github.com/repos/ppy/osu-web
|
closed
|
The mode field is null on beatmap object if mode_int is unknown.
|
type:api area:beatmap-processing external component
|
Current docs shows that mode is not nullable: https://osu.ppy.sh/docs/index.html#beatmapcompact
Rather than putting a PR in the documentation, I'm adding this as an issue because I think there's a better way to handle it.
/api/v2/beatmaps/1482781
```js
{
"beatmapset_id": 700402,
"difficulty_rating": 4.53,
"id": 1482781,
"mode": null, // <--- Null
"status": "graveyard",
"total_length": 91,
"user_id": 7726082,
"version": "Snowflake",
"accuracy": 8,
"ar": 9,
"bpm": 166.06,
"convert": false,
"count_circles": 234,
"count_sliders": 40,
"count_spinners": 3,
"cs": 4,
"deleted_at": null,
"drain": 5,
"hit_length": 85,
"is_scoreable": false,
"last_updated": "2017-12-01T03:25:33Z",
"mode_int": 4, // <-- ruleset_id is > 3.
"passcount": 1,
"playcount": 6,
"ranked": -2,
...
```
```
"mode": null, // <--- Null
"mode_int": 4, // <-- ruleset_id is > 3.
```
|
1.0
|
The mode field is null on beatmap object if mode_int is unknown. - Current docs shows that mode is not nullable: https://osu.ppy.sh/docs/index.html#beatmapcompact
Rather than putting a PR in the documentation, I'm adding this as an issue because I think there's a better way to handle it.
/api/v2/beatmaps/1482781
```js
{
"beatmapset_id": 700402,
"difficulty_rating": 4.53,
"id": 1482781,
"mode": null, // <--- Null
"status": "graveyard",
"total_length": 91,
"user_id": 7726082,
"version": "Snowflake",
"accuracy": 8,
"ar": 9,
"bpm": 166.06,
"convert": false,
"count_circles": 234,
"count_sliders": 40,
"count_spinners": 3,
"cs": 4,
"deleted_at": null,
"drain": 5,
"hit_length": 85,
"is_scoreable": false,
"last_updated": "2017-12-01T03:25:33Z",
"mode_int": 4, // <-- ruleset_id is > 3.
"passcount": 1,
"playcount": 6,
"ranked": -2,
...
```
```
"mode": null, // <--- Null
"mode_int": 4, // <-- ruleset_id is > 3.
```
|
process
|
the mode field is null on beatmap object if mode int is unknown current docs shows that mode is not nullable rather than putting a pr in the documentation i m adding this as an issue because i think there s a better way to handle it api beatmaps js beatmapset id difficulty rating id mode null null status graveyard total length user id version snowflake accuracy ar bpm convert false count circles count sliders count spinners cs deleted at null drain hit length is scoreable false last updated mode int passcount playcount ranked mode null null mode int
| 1
|
219,801
| 17,112,320,325
|
IssuesEvent
|
2021-07-10 15:30:59
|
mreidt/gf-app
|
https://api.github.com/repos/mreidt/gf-app
|
closed
|
Test operations management endpoints
|
enhancement operations tests
|
- [ ] Test create operation
- [ ] Test edit operation
- [ ] Test remove operation
- [ ] Test list operations
|
1.0
|
Test operations management endpoints - - [ ] Test create operation
- [ ] Test edit operation
- [ ] Test remove operation
- [ ] Test list operations
|
non_process
|
test operations management endpoints test create operation test edit operation test remove operation test list operations
| 0
|
21,394
| 29,202,232,376
|
IssuesEvent
|
2023-05-21 00:37:45
|
devssa/onde-codar-em-salvador
|
https://api.github.com/repos/devssa/onde-codar-em-salvador
|
closed
|
[Remoto] Fullstack Developer na Coodesh
|
SALVADOR BACK-END FRONT-END PJ BANCO DE DADOS JAVASCRIPT FULL-STACK MVC HTML SQL GIT REST JSON REACT AWS REQUISITOS REMOTO ASP.NET PROCESSOS INOVAÇÃO GITHUB E-COMMERCE IONIC UMA TFS C R APIs METODOLOGIAS ÁGEIS SAAS MANUTENÇÃO AUTOMAÇÃO DE PROCESSOS Stale
|
## Descrição da vaga:
Esta é uma vaga de um parceiro da plataforma Coodesh, ao candidatar-se você terá acesso as informações completas sobre a empresa e benefícios.
Fique atento ao redirecionamento que vai te levar para uma url [https://coodesh.com](https://coodesh.com/vagas/pessoa-desenvolvedora-fullstack-115921468?utm_source=github&utm_medium=devssa-onde-codar-em-salvador&modal=open) com o pop-up personalizado de candidatura. 👋
<p>A <strong>Tecnologia Única</strong> está em busca de <strong><ins>Fullstack Developer</ins></strong> para compor seu time!</p>
<p>Venha fazer parte de uma empresa que acredita e aposta em novas ideias, com um time forte, e com propósito que já soma mais de 200 pessoas. Somos uma empresa de desenvolvimento de sistemas fundada em 2004. Nossas principais soluções são para o mercado segurador e de fidelização para diversos segmentos, desde o varejo até o agronegócio. Também mantemos um ecossistema de startups, nosso pilar de inovação. Parceira de grandes players do mercado de tecnologia, entre eles Microsoft e AWS, temos a missão de impactar a vida das pessoas provendo soluções disruptivas, investindo massivamente em nosso time, sempre perseguindo e incentivando processos criativos.</p>
<p>Sentiu a energia única e se identificou com o nosso propósito?</p>
<p><strong>Responsabilidades:</strong></p>
<ul>
<li>Desenvolvimento e manutenção de aplicações web; </li>
<li>Desenvolvimento de funcionalidades no Front-End;</li>
<li>Desenvolvimento de funcionalidades no Back-End.</li>
</ul>
<p></p>
<p>Contratação: Regime PJ + Auxílios + Gympass + Apoio psicológico (Psicologia Viva) + Day Off Remunerado no Aniversário + Dias de Descanso Remunerado + Bônus para Certificação;</p>
<p>Local de trabalho: 100% Home Office - São Paulo, SP.</p>
<p></p>
<p>Aqui na única você pode ser quem é verdadeiramente, pois temos como premissa respeitar e valorizar as diferenças. Somos diversos e buscamos criar um ambiente cada vez mais inclusivo.</p>
## Tecnologia Única:
<p>Nascemos em 2004 com o propósito de trazer ao mercado soluções analíticas voltadas para o atendimento ao cliente do mercado segurador. Prestamos diversos serviços na área de fidelização. Desde o varejo até o agronegócio, incluindo plataformas de e-commerce cross indústria, bem como serviços de tecnologia como integração, automação de processos, construção de sistemas especializados. Inovação é um de nossos principais pilares e contamos com um ambiente para incubação de startups. Com mais de 150 colaboradores e faturamento de mais de R$20M, a maioria de nossas soluções é comercializada na modalidade SaaS e temos como principais parceiros de tecnologia a Microsoft e a AWS.</p>
</p>
## Habilidades:
- .NET Framework
- Banco de dados relacionais (SQL)
- API
- Javascript
- GIT
- TFS
## Local:
100% Remoto
## Requisitos:
- Ser habituado com Metodologias ágeis;
- Forte base de Javascript/HTML/CSS;
- Experiência em .NET, C#, ASP.NET, APIS REST/JSON;
- Experiência com plataforma Microsoft SQL;
- Formação em Tecnologia (completo ou cursando);
- Conhecimento de JavaScript, CSS, HTML para criação de Front-ends Web;
- Conhecimento em Arquitetura MVC;
- GIT/TFS.
## Diferenciais:
- Conhecimento em React.js;
- Conhecimento em IONIC;
- Experiência em microsserviços.
## Benefícios:
- Vale Alimentação;
- Auxílio Saúde;
- Gympass;
- Apoio psicológico;
- Day off remunerado no aniversário;
- Descanso remunerado após 1 ano de contrato.
## Como se candidatar:
Candidatar-se exclusivamente através da plataforma Coodesh no link a seguir: [Fullstack Developer na Tecnologia Única](https://coodesh.com/vagas/pessoa-desenvolvedora-fullstack-115921468?utm_source=github&utm_medium=devssa-onde-codar-em-salvador&modal=open)
Após candidatar-se via plataforma Coodesh e validar o seu login, você poderá acompanhar e receber todas as interações do processo por lá. Utilize a opção **Pedir Feedback** entre uma etapa e outra na vaga que se candidatou. Isso fará com que a pessoa **Recruiter** responsável pelo processo na empresa receba a notificação.
## Labels
#### Alocação
Remoto
#### Regime
PJ
#### Categoria
Full-Stack
|
2.0
|
[Remoto] Fullstack Developer na Coodesh - ## Descrição da vaga:
Esta é uma vaga de um parceiro da plataforma Coodesh, ao candidatar-se você terá acesso as informações completas sobre a empresa e benefícios.
Fique atento ao redirecionamento que vai te levar para uma url [https://coodesh.com](https://coodesh.com/vagas/pessoa-desenvolvedora-fullstack-115921468?utm_source=github&utm_medium=devssa-onde-codar-em-salvador&modal=open) com o pop-up personalizado de candidatura. 👋
<p>A <strong>Tecnologia Única</strong> está em busca de <strong><ins>Fullstack Developer</ins></strong> para compor seu time!</p>
<p>Venha fazer parte de uma empresa que acredita e aposta em novas ideias, com um time forte, e com propósito que já soma mais de 200 pessoas. Somos uma empresa de desenvolvimento de sistemas fundada em 2004. Nossas principais soluções são para o mercado segurador e de fidelização para diversos segmentos, desde o varejo até o agronegócio. Também mantemos um ecossistema de startups, nosso pilar de inovação. Parceira de grandes players do mercado de tecnologia, entre eles Microsoft e AWS, temos a missão de impactar a vida das pessoas provendo soluções disruptivas, investindo massivamente em nosso time, sempre perseguindo e incentivando processos criativos.</p>
<p>Sentiu a energia única e se identificou com o nosso propósito?</p>
<p><strong>Responsabilidades:</strong></p>
<ul>
<li>Desenvolvimento e manutenção de aplicações web; </li>
<li>Desenvolvimento de funcionalidades no Front-End;</li>
<li>Desenvolvimento de funcionalidades no Back-End.</li>
</ul>
<p></p>
<p>Contratação: Regime PJ + Auxílios + Gympass + Apoio psicológico (Psicologia Viva) + Day Off Remunerado no Aniversário + Dias de Descanso Remunerado + Bônus para Certificação;</p>
<p>Local de trabalho: 100% Home Office - São Paulo, SP.</p>
<p></p>
<p>Aqui na única você pode ser quem é verdadeiramente, pois temos como premissa respeitar e valorizar as diferenças. Somos diversos e buscamos criar um ambiente cada vez mais inclusivo.</p>
## Tecnologia Única:
<p>Nascemos em 2004 com o propósito de trazer ao mercado soluções analíticas voltadas para o atendimento ao cliente do mercado segurador. Prestamos diversos serviços na área de fidelização. Desde o varejo até o agronegócio, incluindo plataformas de e-commerce cross indústria, bem como serviços de tecnologia como integração, automação de processos, construção de sistemas especializados. Inovação é um de nossos principais pilares e contamos com um ambiente para incubação de startups. Com mais de 150 colaboradores e faturamento de mais de R$20M, a maioria de nossas soluções é comercializada na modalidade SaaS e temos como principais parceiros de tecnologia a Microsoft e a AWS.</p>
</p>
## Habilidades:
- .NET Framework
- Banco de dados relacionais (SQL)
- API
- Javascript
- GIT
- TFS
## Local:
100% Remoto
## Requisitos:
- Ser habituado com Metodologias ágeis;
- Forte base de Javascript/HTML/CSS;
- Experiência em .NET, C#, ASP.NET, APIS REST/JSON;
- Experiência com plataforma Microsoft SQL;
- Formação em Tecnologia (completo ou cursando);
- Conhecimento de JavaScript, CSS, HTML para criação de Front-ends Web;
- Conhecimento em Arquitetura MVC;
- GIT/TFS.
## Diferenciais:
- Conhecimento em React.js;
- Conhecimento em IONIC;
- Experiência em microsserviços.
## Benefícios:
- Vale Alimentação;
- Auxílio Saúde;
- Gympass;
- Apoio psicológico;
- Day off remunerado no aniversário;
- Descanso remunerado após 1 ano de contrato.
## Como se candidatar:
Candidatar-se exclusivamente através da plataforma Coodesh no link a seguir: [Fullstack Developer na Tecnologia Única](https://coodesh.com/vagas/pessoa-desenvolvedora-fullstack-115921468?utm_source=github&utm_medium=devssa-onde-codar-em-salvador&modal=open)
Após candidatar-se via plataforma Coodesh e validar o seu login, você poderá acompanhar e receber todas as interações do processo por lá. Utilize a opção **Pedir Feedback** entre uma etapa e outra na vaga que se candidatou. Isso fará com que a pessoa **Recruiter** responsável pelo processo na empresa receba a notificação.
## Labels
#### Alocação
Remoto
#### Regime
PJ
#### Categoria
Full-Stack
|
process
|
fullstack developer na coodesh descrição da vaga esta é uma vaga de um parceiro da plataforma coodesh ao candidatar se você terá acesso as informações completas sobre a empresa e benefícios fique atento ao redirecionamento que vai te levar para uma url com o pop up personalizado de candidatura 👋 a tecnologia única está em busca de fullstack developer para compor seu time venha fazer parte de uma empresa que acredita e aposta em novas ideias com um time forte e com propósito que já soma mais de pessoas somos uma empresa de desenvolvimento de sistemas fundada em nossas principais soluções são para o mercado segurador e de fidelização para diversos segmentos desde o varejo até o agronegócio também mantemos um ecossistema de startups nosso pilar de inovação parceira de grandes players do mercado de tecnologia entre eles microsoft e aws temos a missão de impactar a vida das pessoas provendo soluções disruptivas investindo massivamente em nosso time sempre perseguindo e incentivando processos criativos sentiu a energia única e se identificou com o nosso propósito responsabilidades desenvolvimento e manutenção de aplicações web nbsp desenvolvimento de funcionalidades no front end desenvolvimento de funcionalidades no back end contratação regime pj auxílios gympass apoio psicológico psicologia viva day off remunerado no aniversário dias de descanso remunerado bônus para certificação local de trabalho home office são paulo sp aqui na única você pode ser quem é verdadeiramente pois temos como premissa respeitar e valorizar as diferenças somos diversos e buscamos criar um ambiente cada vez mais inclusivo tecnologia única nascemos em com o propósito de trazer ao mercado soluções analíticas voltadas para o atendimento ao cliente do mercado segurador prestamos diversos serviços na área de fidelização desde o varejo até o agronegócio incluindo plataformas de e commerce cross indústria bem como serviços de tecnologia como integração automação de processos construção de sistemas especializados inovação é um de nossos principais pilares e contamos com um ambiente para incubação de startups com mais de colaboradores e faturamento de mais de r a maioria de nossas soluções é comercializada na modalidade saas e temos como principais parceiros de tecnologia a microsoft e a aws habilidades net framework banco de dados relacionais sql api javascript git tfs local remoto requisitos ser habituado com metodologias ágeis forte base de javascript html css experiência em net c asp net apis rest json experiência com plataforma microsoft sql formação em tecnologia completo ou cursando conhecimento de javascript css html para criação de front ends web conhecimento em arquitetura mvc git tfs diferenciais conhecimento em react js conhecimento em ionic experiência em microsserviços benefícios vale alimentação auxílio saúde gympass apoio psicológico day off remunerado no aniversário descanso remunerado após ano de contrato como se candidatar candidatar se exclusivamente através da plataforma coodesh no link a seguir após candidatar se via plataforma coodesh e validar o seu login você poderá acompanhar e receber todas as interações do processo por lá utilize a opção pedir feedback entre uma etapa e outra na vaga que se candidatou isso fará com que a pessoa recruiter responsável pelo processo na empresa receba a notificação labels alocação remoto regime pj categoria full stack
| 1
|
118,293
| 4,734,054,789
|
IssuesEvent
|
2016-10-19 13:13:45
|
dmwm/PHEDEX
|
https://api.github.com/repos/dmwm/PHEDEX
|
closed
|
PerfMonitor agent: slow t_status_block_dest query
|
Category: Agents Priority 4: High Status: Fixed
|
The PerfMonitor agent had performance issues recently:
https://ggus.eu/?mode=ticket_info&ticket_id=124312
Tracked down to the following SQL used to update the t_status_block_dest table:
https://github.com/dmwm/PHEDEX/blob/4ffa9024e63948b6c6ac6b49a5bf50cb0f15130d/perl_lib/PHEDEX/Monitoring/PerfMonitor/Agent.pm#L63-L69
The problem is the join to t_dps_file. In this case, the same information is also available in t_dps_block.
Fix committed:
https://github.com/dmwm/PHEDEX/commit/ef7fe6f94e11af6b3ce4f92768f0bee73bbf2cd4
Patch applied manually to Prod agents on 2016-10-07
Adding issue as reminder to include in 4.2.0 release.
|
1.0
|
PerfMonitor agent: slow t_status_block_dest query - The PerfMonitor agent had performance issues recently:
https://ggus.eu/?mode=ticket_info&ticket_id=124312
Tracked down to the following SQL used to update the t_status_block_dest table:
https://github.com/dmwm/PHEDEX/blob/4ffa9024e63948b6c6ac6b49a5bf50cb0f15130d/perl_lib/PHEDEX/Monitoring/PerfMonitor/Agent.pm#L63-L69
The problem is the join to t_dps_file. In this case, the same information is also available in t_dps_block.
Fix committed:
https://github.com/dmwm/PHEDEX/commit/ef7fe6f94e11af6b3ce4f92768f0bee73bbf2cd4
Patch applied manually to Prod agents on 2016-10-07
Adding issue as reminder to include in 4.2.0 release.
|
non_process
|
perfmonitor agent slow t status block dest query the perfmonitor agent had performance issues recently tracked down to the following sql used to update the t status block dest table the problem is the join to t dps file in this case the same information is also available in t dps block fix committed patch applied manually to prod agents on adding issue as reminder to include in release
| 0
|
123,362
| 17,772,214,505
|
IssuesEvent
|
2021-08-30 14:51:43
|
kapseliboi/RDocumentation-app
|
https://api.github.com/repos/kapseliboi/RDocumentation-app
|
opened
|
CVE-2019-14939 (Medium) detected in mysql-2.15.0.tgz
|
security vulnerability
|
## CVE-2019-14939 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-2.15.0.tgz</b></p></summary>
<p>A node.js driver for mysql. It is written in JavaScript, does not require compiling, and is 100% MIT licensed.</p>
<p>Library home page: <a href="https://registry.npmjs.org/mysql/-/mysql-2.15.0.tgz">https://registry.npmjs.org/mysql/-/mysql-2.15.0.tgz</a></p>
<p>Path to dependency file: RDocumentation-app/package.json</p>
<p>Path to vulnerable library: RDocumentation-app/node_modules/mysql/package.json</p>
<p>
Dependency Hierarchy:
- db-migrate-mysql-1.1.10.tgz (Root Library)
- :x: **mysql-2.15.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/kapseliboi/RDocumentation-app/commit/ea1d4334329f74384d2d1b67f98e875da0b95310">ea1d4334329f74384d2d1b67f98e875da0b95310</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the mysql (aka mysqljs) module 2.17.1 for Node.js. The LOAD DATA LOCAL INFILE option is open by default.
<p>Publish Date: 2019-08-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14939>CVE-2019-14939</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2019-14939 (Medium) detected in mysql-2.15.0.tgz - ## CVE-2019-14939 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-2.15.0.tgz</b></p></summary>
<p>A node.js driver for mysql. It is written in JavaScript, does not require compiling, and is 100% MIT licensed.</p>
<p>Library home page: <a href="https://registry.npmjs.org/mysql/-/mysql-2.15.0.tgz">https://registry.npmjs.org/mysql/-/mysql-2.15.0.tgz</a></p>
<p>Path to dependency file: RDocumentation-app/package.json</p>
<p>Path to vulnerable library: RDocumentation-app/node_modules/mysql/package.json</p>
<p>
Dependency Hierarchy:
- db-migrate-mysql-1.1.10.tgz (Root Library)
- :x: **mysql-2.15.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/kapseliboi/RDocumentation-app/commit/ea1d4334329f74384d2d1b67f98e875da0b95310">ea1d4334329f74384d2d1b67f98e875da0b95310</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the mysql (aka mysqljs) module 2.17.1 for Node.js. The LOAD DATA LOCAL INFILE option is open by default.
<p>Publish Date: 2019-08-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14939>CVE-2019-14939</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_process
|
cve medium detected in mysql tgz cve medium severity vulnerability vulnerable library mysql tgz a node js driver for mysql it is written in javascript does not require compiling and is mit licensed library home page a href path to dependency file rdocumentation app package json path to vulnerable library rdocumentation app node modules mysql package json dependency hierarchy db migrate mysql tgz root library x mysql tgz vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in the mysql aka mysqljs module for node js the load data local infile option is open by default publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href step up your open source security game with whitesource
| 0
|
117,513
| 25,135,220,889
|
IssuesEvent
|
2022-11-09 18:02:00
|
trezor/trezor-suite
|
https://api.github.com/repos/trezor/trezor-suite
|
closed
|
Specify the calculation of the service fee
|
account code bitcoin
|
- [x] Count only UTXOs with lower then desired anonymity level
- [x] Remove UTXOs with amount lower than `plebsDontPayThreshold` (1M sats)
- [x] Remove previously coinjoined UTXOs (direct and indirect)
- [x] Direct remix is an UTXO that is an output of a coinjoin transaction.
- [x] ~~Indirect remix is an UTXO that is an output of a transaction such that all inputs of the transaction are direct remixes (this is also known as `Friends don't pay`)~~ Moved to followup: https://github.com/trezor/trezor-suite/issues/6854
|
1.0
|
Specify the calculation of the service fee - - [x] Count only UTXOs with lower then desired anonymity level
- [x] Remove UTXOs with amount lower than `plebsDontPayThreshold` (1M sats)
- [x] Remove previously coinjoined UTXOs (direct and indirect)
- [x] Direct remix is an UTXO that is an output of a coinjoin transaction.
- [x] ~~Indirect remix is an UTXO that is an output of a transaction such that all inputs of the transaction are direct remixes (this is also known as `Friends don't pay`)~~ Moved to followup: https://github.com/trezor/trezor-suite/issues/6854
|
non_process
|
specify the calculation of the service fee count only utxos with lower then desired anonymity level remove utxos with amount lower than plebsdontpaythreshold sats remove previously coinjoined utxos direct and indirect direct remix is an utxo that is an output of a coinjoin transaction indirect remix is an utxo that is an output of a transaction such that all inputs of the transaction are direct remixes this is also known as friends don t pay moved to followup
| 0
|
16,556
| 3,537,973,602
|
IssuesEvent
|
2016-01-18 06:54:21
|
FreeCodeCamp/FreeCodeCamp
|
https://api.github.com/repos/FreeCodeCamp/FreeCodeCamp
|
closed
|
Bonfire Friendly Date Ranges Test Inconsistencies
|
confirmed Discussing tests
|
Challenge http://freecodecamp.com/challenges/bonfire-friendly-date-ranges has an issue. Please describe how to reproduce it, and include links to screenshots if possible.
I know this has been debated before, and I understand that if the dates are within 11 months it can be inferred that it is the following year, but test 4 (below) should require a year given that this is a requirement: "Secondly, if the starting year is the current year, and the ending year can be inferred by the reader, the year should be omitted."
As the 4th test is 2016/2016, it can't be inferred the year is 2016 unless there is assumed all dates are in the future, it could have been in 2015.
Could either the test condition, or the task description be changed to reflect this?
|
1.0
|
Bonfire Friendly Date Ranges Test Inconsistencies - Challenge http://freecodecamp.com/challenges/bonfire-friendly-date-ranges has an issue. Please describe how to reproduce it, and include links to screenshots if possible.
I know this has been debated before, and I understand that if the dates are within 11 months it can be inferred that it is the following year, but test 4 (below) should require a year given that this is a requirement: "Secondly, if the starting year is the current year, and the ending year can be inferred by the reader, the year should be omitted."
As the 4th test is 2016/2016, it can't be inferred the year is 2016 unless there is assumed all dates are in the future, it could have been in 2015.
Could either the test condition, or the task description be changed to reflect this?
|
non_process
|
bonfire friendly date ranges test inconsistencies challenge has an issue please describe how to reproduce it and include links to screenshots if possible i know this has been debated before and i understand that if the dates are within months it can be inferred that it is the following year but test below should require a year given that this is a requirement secondly if the starting year is the current year and the ending year can be inferred by the reader the year should be omitted as the test is it can t be inferred the year is unless there is assumed all dates are in the future it could have been in could either the test condition or the task description be changed to reflect this
| 0
|
588,475
| 17,661,116,846
|
IssuesEvent
|
2021-08-21 14:24:22
|
francheska-vicente/cssweng
|
https://api.github.com/repos/francheska-vicente/cssweng
|
closed
|
Booking button on click visual error
|
bug priority: high issue: front-end severity: medium
|
### Summary:
Booking button turns white after clicking
### Steps to Reproduce:
1. Log in
2. Go to reservation
3. Click booking
### Visual Proof:

### Expected Results:
Booking button remains the same color after clicking
### Actual Results:
Booking button turn white after clicking
| Additional Information | |
| ----------- | ----------- |
| Defect ID | 15-0017 |
| Platform | V8 engine (Google) |
| Operating System | Windows 10 |
|
1.0
|
Booking button on click visual error - ### Summary:
Booking button turns white after clicking
### Steps to Reproduce:
1. Log in
2. Go to reservation
3. Click booking
### Visual Proof:

### Expected Results:
Booking button remains the same color after clicking
### Actual Results:
Booking button turn white after clicking
| Additional Information | |
| ----------- | ----------- |
| Defect ID | 15-0017 |
| Platform | V8 engine (Google) |
| Operating System | Windows 10 |
|
non_process
|
booking button on click visual error summary booking button turns white after clicking steps to reproduce log in go to reservation click booking visual proof expected results booking button remains the same color after clicking actual results booking button turn white after clicking additional information defect id platform engine google operating system windows
| 0
|
6,395
| 9,477,782,621
|
IssuesEvent
|
2019-04-19 19:56:04
|
arxiv-vanity/engrafo
|
https://api.github.com/repos/arxiv-vanity/engrafo
|
closed
|
Match more arXiv ID forms
|
area/postprocessor good first issue help wanted type/enhancement
|
We currently convert URLs that look a bit like `arxiv:1234.5678` into arxiv.org URLs. I expect there are many more things in papers that could be converted to URLs - stuff without `arxiv:` and old style IDs.
We need to find more examples of these and make them linked.
- This has lots of fun stuff (cmd-f "arxiv"): https://www.arxiv-vanity.com/papers/1412.7024/
- abs/... https://www.arxiv-vanity.com/papers/1511.05440/
- abs/... https://www.arxiv-vanity.com/papers/1712.01208/
|
1.0
|
Match more arXiv ID forms - We currently convert URLs that look a bit like `arxiv:1234.5678` into arxiv.org URLs. I expect there are many more things in papers that could be converted to URLs - stuff without `arxiv:` and old style IDs.
We need to find more examples of these and make them linked.
- This has lots of fun stuff (cmd-f "arxiv"): https://www.arxiv-vanity.com/papers/1412.7024/
- abs/... https://www.arxiv-vanity.com/papers/1511.05440/
- abs/... https://www.arxiv-vanity.com/papers/1712.01208/
|
process
|
match more arxiv id forms we currently convert urls that look a bit like arxiv into arxiv org urls i expect there are many more things in papers that could be converted to urls stuff without arxiv and old style ids we need to find more examples of these and make them linked this has lots of fun stuff cmd f arxiv abs abs
| 1
|
4,869
| 7,751,842,611
|
IssuesEvent
|
2018-05-30 18:21:58
|
dotnet/corefx
|
https://api.github.com/repos/dotnet/corefx
|
closed
|
.Net Core Process.Start on Linux
|
area-System.Diagnostics.Process os-linux question
|
I am facing the following issue when running my .Net Core 2.0 application on Linux as a SCD.
I am attempting to start another .Net Core project (Console Application) though the Aspnet Core project.
The exception below is thrown when I call `Start()`.
The permissions on the file and folders have been set to `777` but still no luck.
Exception:
```
System.ComponentModel.Win32Exception (0x80004005): Permission denied
at Interop.Sys.ForkAndExecProcess(String filename, String[] argv, String[] envp, String cwd, Boolean redirectStdin, Boolean redirectStdout, Boolean redirectStderr, Int32& lpChildPid, Int32& stdinFd, Int32& stdoutFd, Int32& stderrFd)
at System.Diagnostics.Process.StartCore(ProcessStartInfo startInfo)
at System.Diagnostics.Process.Start()
at Ombi.Schedule.Jobs.Ombi.OmbiAutomaticUpdater.<Update>d__18.MoveNext() in C:\projects\requestplex\src\Ombi.Schedule\Jobs\Ombi\OmbiAutomaticUpdater.cs:line 218
```
Code to reproduce:
```
var updaterFile = Path.Combine(Path.GetDirectoryName(Assembly.GetEntryAssembly().Location),
"TempUpdate", $"Ombi.Updater");
var start = new ProcessStartInfo
{
UseShellExecute = false,
CreateNoWindow = true,
FileName = updaterFile,
Arguments = GetArgs(settings), // This just gets some command line arguments for the app i am attempting to launch
WorkingDirectory = Path.Combine(Path.GetDirectoryName(Assembly.GetEntryAssembly().Location), "TempUpdate"),
};
using (var proc = new Process { StartInfo = start })
{
proc.Start();
}
```
|
1.0
|
.Net Core Process.Start on Linux - I am facing the following issue when running my .Net Core 2.0 application on Linux as a SCD.
I am attempting to start another .Net Core project (Console Application) though the Aspnet Core project.
The exception below is thrown when I call `Start()`.
The permissions on the file and folders have been set to `777` but still no luck.
Exception:
```
System.ComponentModel.Win32Exception (0x80004005): Permission denied
at Interop.Sys.ForkAndExecProcess(String filename, String[] argv, String[] envp, String cwd, Boolean redirectStdin, Boolean redirectStdout, Boolean redirectStderr, Int32& lpChildPid, Int32& stdinFd, Int32& stdoutFd, Int32& stderrFd)
at System.Diagnostics.Process.StartCore(ProcessStartInfo startInfo)
at System.Diagnostics.Process.Start()
at Ombi.Schedule.Jobs.Ombi.OmbiAutomaticUpdater.<Update>d__18.MoveNext() in C:\projects\requestplex\src\Ombi.Schedule\Jobs\Ombi\OmbiAutomaticUpdater.cs:line 218
```
Code to reproduce:
```
var updaterFile = Path.Combine(Path.GetDirectoryName(Assembly.GetEntryAssembly().Location),
"TempUpdate", $"Ombi.Updater");
var start = new ProcessStartInfo
{
UseShellExecute = false,
CreateNoWindow = true,
FileName = updaterFile,
Arguments = GetArgs(settings), // This just gets some command line arguments for the app i am attempting to launch
WorkingDirectory = Path.Combine(Path.GetDirectoryName(Assembly.GetEntryAssembly().Location), "TempUpdate"),
};
using (var proc = new Process { StartInfo = start })
{
proc.Start();
}
```
|
process
|
net core process start on linux i am facing the following issue when running my net core application on linux as a scd i am attempting to start another net core project console application though the aspnet core project the exception below is thrown when i call start the permissions on the file and folders have been set to but still no luck exception system componentmodel permission denied at interop sys forkandexecprocess string filename string argv string envp string cwd boolean redirectstdin boolean redirectstdout boolean redirectstderr lpchildpid stdinfd stdoutfd stderrfd at system diagnostics process startcore processstartinfo startinfo at system diagnostics process start at ombi schedule jobs ombi ombiautomaticupdater d movenext in c projects requestplex src ombi schedule jobs ombi ombiautomaticupdater cs line code to reproduce var updaterfile path combine path getdirectoryname assembly getentryassembly location tempupdate ombi updater var start new processstartinfo useshellexecute false createnowindow true filename updaterfile arguments getargs settings this just gets some command line arguments for the app i am attempting to launch workingdirectory path combine path getdirectoryname assembly getentryassembly location tempupdate using var proc new process startinfo start proc start
| 1
|
15,725
| 19,898,018,202
|
IssuesEvent
|
2022-01-25 02:50:33
|
djcurill/two-wheels
|
https://api.github.com/repos/djcurill/two-wheels
|
opened
|
Post Scrape Data Processing
|
utility data processing
|
Create functions for cleaning & formatting data after scraping from the internet. We will need the following:
1. Extract price and convert to CAD
2. Extract brand from title and format
3. Extract model from title and format
4. Extract front travel and convert to number
5. Extract rear travel and convert to number
6. Extract the year of bike from title and format
|
1.0
|
Post Scrape Data Processing - Create functions for cleaning & formatting data after scraping from the internet. We will need the following:
1. Extract price and convert to CAD
2. Extract brand from title and format
3. Extract model from title and format
4. Extract front travel and convert to number
5. Extract rear travel and convert to number
6. Extract the year of bike from title and format
|
process
|
post scrape data processing create functions for cleaning formatting data after scraping from the internet we will need the following extract price and convert to cad extract brand from title and format extract model from title and format extract front travel and convert to number extract rear travel and convert to number extract the year of bike from title and format
| 1
|
149,802
| 13,302,709,245
|
IssuesEvent
|
2020-08-25 14:36:07
|
FirebaseExtended/flutterfire
|
https://api.github.com/repos/FirebaseExtended/flutterfire
|
closed
|
[firebase_storage] Add notes on installing firebase to every firebase package
|
blocked: customer-response plugin: auth resolution: needs-repro type: documentation
|
I was trying to install firebase via the firebase_storage package and had difficulties, later i found following the instructions at https://pub.dartlang.org/packages/firebase_auth in order to properly install it.
Apologies if this issue isn't made at the right repo, but I'd like to suggest we add notes to each firebase package that people need to go through this process for installing and setting up firebase for the 1st time.
|
1.0
|
[firebase_storage] Add notes on installing firebase to every firebase package - I was trying to install firebase via the firebase_storage package and had difficulties, later i found following the instructions at https://pub.dartlang.org/packages/firebase_auth in order to properly install it.
Apologies if this issue isn't made at the right repo, but I'd like to suggest we add notes to each firebase package that people need to go through this process for installing and setting up firebase for the 1st time.
|
non_process
|
add notes on installing firebase to every firebase package i was trying to install firebase via the firebase storage package and had difficulties later i found following the instructions at in order to properly install it apologies if this issue isn t made at the right repo but i d like to suggest we add notes to each firebase package that people need to go through this process for installing and setting up firebase for the time
| 0
|
3,483
| 6,554,787,837
|
IssuesEvent
|
2017-09-06 07:45:06
|
threefoldfoundation/app_backend
|
https://api.github.com/repos/threefoldfoundation/app_backend
|
closed
|
Need a final description for the payment wallet
|
process_wontfix state_question
|
The description (markdown) is shown when the user creates the wallet. The full page (mobile) is available.
Right now, we configured this as description
# ThreeFold Token
### Our backed, safe digital currency funds a neutral green Internet
|
1.0
|
Need a final description for the payment wallet - The description (markdown) is shown when the user creates the wallet. The full page (mobile) is available.
Right now, we configured this as description
# ThreeFold Token
### Our backed, safe digital currency funds a neutral green Internet
|
process
|
need a final description for the payment wallet the description markdown is shown when the user creates the wallet the full page mobile is available right now we configured this as description threefold token our backed safe digital currency funds a neutral green internet
| 1
|
11,680
| 14,539,653,884
|
IssuesEvent
|
2020-12-15 12:12:15
|
prisma/e2e-tests
|
https://api.github.com/repos/prisma/e2e-tests
|
closed
|
Test community generators
|
kind/feature process/candidate team/support-engineering
|
- Input on generators to test: https://app.redash.io/prismaio/queries/476639
- Make tests optional or fyi, separate workflow so build status is separate
- (Nexus Plugin Prisma test can also be part of this "fyi" test suite for example)
|
1.0
|
Test community generators - - Input on generators to test: https://app.redash.io/prismaio/queries/476639
- Make tests optional or fyi, separate workflow so build status is separate
- (Nexus Plugin Prisma test can also be part of this "fyi" test suite for example)
|
process
|
test community generators input on generators to test make tests optional or fyi separate workflow so build status is separate nexus plugin prisma test can also be part of this fyi test suite for example
| 1
|
5,954
| 8,780,382,173
|
IssuesEvent
|
2018-12-19 17:09:14
|
GoogleCloudPlatform/google-cloud-cpp
|
https://api.github.com/repos/GoogleCloudPlatform/google-cloud-cpp
|
closed
|
Create a configuration flag to disable tests.
|
good first issue type: process
|
Our users, and package maintainers, may not be interested in compiling and running the tests. Their workflows are faster if they can disable the tests for our code.
|
1.0
|
Create a configuration flag to disable tests. - Our users, and package maintainers, may not be interested in compiling and running the tests. Their workflows are faster if they can disable the tests for our code.
|
process
|
create a configuration flag to disable tests our users and package maintainers may not be interested in compiling and running the tests their workflows are faster if they can disable the tests for our code
| 1
|
7,730
| 10,852,889,318
|
IssuesEvent
|
2019-11-13 13:43:24
|
NationalSecurityAgency/ghidra
|
https://api.github.com/repos/NationalSecurityAgency/ghidra
|
closed
|
MCS-96: Can't read language spec
|
Feature: Processor/Other Type: Bug
|
**Describe the bug**
I cannot load files with the MCS-96 processor.
**To Reproduce**
Steps to reproduce the behavior:
1. Import a new file
2. Choose MCS-96 as the processor
3. Hit Ok
**Expected behavior**
The file should be imported. Instead I get lots of exceptions.
**Screenshots**

**Environment (please complete the following information):**
- OS: Mac OS X (10.15.1)
- OS: Ubuntu 18.04
**Additional context**
Can't read language spec /Users/anthony/Software/ghidra_9.1_PUBLIC/Ghidra/Processors/MCS96/data/languages/MCS96.sla
ghidra.app.plugin.processors.sleigh.SleighException: Invalid processor specification file: /Users/anthony/Software/ghidra_9.1_PUBLIC/Ghidra/Processors/MCS96/data/languages/MCS96.pspec
at ghidra.app.plugin.processors.sleigh.SleighLanguageValidator.validateSleighFile(SleighLanguageValidator.java:108)
at ghidra.app.plugin.processors.sleigh.SleighLanguageValidator.validatePspecFile(SleighLanguageValidator.java:77)
at ghidra.app.plugin.processors.sleigh.SleighLanguage.initialize(SleighLanguage.java:122)
at ghidra.app.plugin.processors.sleigh.SleighLanguage.<init>(SleighLanguage.java:101)
at ghidra.app.plugin.processors.sleigh.SleighLanguageProvider.getNewSleigh(SleighLanguageProvider.java:112)
at ghidra.app.plugin.processors.sleigh.SleighLanguageProvider.getLanguage(SleighLanguageProvider.java:99)
at ghidra.program.util.DefaultLanguageService$LanguageInfo.getLanguage(DefaultLanguageService.java:394)
at ghidra.program.util.DefaultLanguageService.getLanguage(DefaultLanguageService.java:111)
at ghidra.app.util.opinion.BinaryLoader.loadProgram(BinaryLoader.java:274)
at ghidra.app.util.opinion.AbstractProgramLoader.load(AbstractProgramLoader.java:112)
at ghidra.plugin.importer.ImporterUtilities.importSingleFile(ImporterUtilities.java:401)
at ghidra.plugin.importer.ImporterDialog.lambda$okCallback$7(ImporterDialog.java:351)
at ghidra.util.task.TaskLauncher$1.run(TaskLauncher.java:90)
at ghidra.util.task.Task.monitoredRun(Task.java:126)
at ghidra.util.task.TaskRunner.lambda$startTaskThread$1(TaskRunner.java:94)
at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.base/java.lang.Thread.run(Thread.java:834)
Caused by: org.xml.sax.SAXParseException; lineNumber: 4; columnNumber: 33; Element type "programcounter" must be followed by either attribute specifications, ">" or "/>".
at java.xml/com.sun.org.apache.xerces.internal.util.ErrorHandlerWrapper.createSAXParseException(ErrorHandlerWrapper.java:204)
at java.xml/com.sun.org.apache.xerces.internal.util.ErrorHandlerWrapper.fatalError(ErrorHandlerWrapper.java:178)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLErrorReporter.reportError(XMLErrorReporter.java:400)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLErrorReporter.reportError(XMLErrorReporter.java:327)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLScanner.reportFatalError(XMLScanner.java:1471)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl.seekCloseOfStartTag(XMLDocumentFragmentScannerImpl.java:1424)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLNSDocumentScannerImpl.scanStartElement(XMLNSDocumentScannerImpl.java:259)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl$FragmentContentDriver.next(XMLDocumentFragmentScannerImpl.java:2710)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLDocumentScannerImpl.next(XMLDocumentScannerImpl.java:605)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLNSDocumentScannerImpl.next(XMLNSDocumentScannerImpl.java:112)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl.scanDocument(XMLDocumentFragmentScannerImpl.java:534)
at java.xml/com.sun.org.apache.xerces.internal.parsers.XML11Configuration.parse(XML11Configuration.java:888)
at java.xml/com.sun.org.apache.xerces.internal.parsers.XML11Configuration.parse(XML11Configuration.java:824)
at java.xml/com.sun.org.apache.xerces.internal.parsers.XMLParser.parse(XMLParser.java:141)
at java.xml/com.sun.org.apache.xerces.internal.parsers.AbstractSAXParser.parse(AbstractSAXParser.java:1216)
at java.xml/com.sun.org.apache.xerces.internal.jaxp.SAXParserImpl$JAXPSAXParser.parse(SAXParserImpl.java:635)
at org.iso_relax.verifier.impl.VerifierImpl.verify(VerifierImpl.java:121)
at ghidra.app.plugin.processors.sleigh.SleighLanguageValidator.validateSleighFile(SleighLanguageValidator.java:103)
|
1.0
|
MCS-96: Can't read language spec - **Describe the bug**
I cannot load files with the MCS-96 processor.
**To Reproduce**
Steps to reproduce the behavior:
1. Import a new file
2. Choose MCS-96 as the processor
3. Hit Ok
**Expected behavior**
The file should be imported. Instead I get lots of exceptions.
**Screenshots**

**Environment (please complete the following information):**
- OS: Mac OS X (10.15.1)
- OS: Ubuntu 18.04
**Additional context**
Can't read language spec /Users/anthony/Software/ghidra_9.1_PUBLIC/Ghidra/Processors/MCS96/data/languages/MCS96.sla
ghidra.app.plugin.processors.sleigh.SleighException: Invalid processor specification file: /Users/anthony/Software/ghidra_9.1_PUBLIC/Ghidra/Processors/MCS96/data/languages/MCS96.pspec
at ghidra.app.plugin.processors.sleigh.SleighLanguageValidator.validateSleighFile(SleighLanguageValidator.java:108)
at ghidra.app.plugin.processors.sleigh.SleighLanguageValidator.validatePspecFile(SleighLanguageValidator.java:77)
at ghidra.app.plugin.processors.sleigh.SleighLanguage.initialize(SleighLanguage.java:122)
at ghidra.app.plugin.processors.sleigh.SleighLanguage.<init>(SleighLanguage.java:101)
at ghidra.app.plugin.processors.sleigh.SleighLanguageProvider.getNewSleigh(SleighLanguageProvider.java:112)
at ghidra.app.plugin.processors.sleigh.SleighLanguageProvider.getLanguage(SleighLanguageProvider.java:99)
at ghidra.program.util.DefaultLanguageService$LanguageInfo.getLanguage(DefaultLanguageService.java:394)
at ghidra.program.util.DefaultLanguageService.getLanguage(DefaultLanguageService.java:111)
at ghidra.app.util.opinion.BinaryLoader.loadProgram(BinaryLoader.java:274)
at ghidra.app.util.opinion.AbstractProgramLoader.load(AbstractProgramLoader.java:112)
at ghidra.plugin.importer.ImporterUtilities.importSingleFile(ImporterUtilities.java:401)
at ghidra.plugin.importer.ImporterDialog.lambda$okCallback$7(ImporterDialog.java:351)
at ghidra.util.task.TaskLauncher$1.run(TaskLauncher.java:90)
at ghidra.util.task.Task.monitoredRun(Task.java:126)
at ghidra.util.task.TaskRunner.lambda$startTaskThread$1(TaskRunner.java:94)
at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.base/java.lang.Thread.run(Thread.java:834)
Caused by: org.xml.sax.SAXParseException; lineNumber: 4; columnNumber: 33; Element type "programcounter" must be followed by either attribute specifications, ">" or "/>".
at java.xml/com.sun.org.apache.xerces.internal.util.ErrorHandlerWrapper.createSAXParseException(ErrorHandlerWrapper.java:204)
at java.xml/com.sun.org.apache.xerces.internal.util.ErrorHandlerWrapper.fatalError(ErrorHandlerWrapper.java:178)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLErrorReporter.reportError(XMLErrorReporter.java:400)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLErrorReporter.reportError(XMLErrorReporter.java:327)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLScanner.reportFatalError(XMLScanner.java:1471)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl.seekCloseOfStartTag(XMLDocumentFragmentScannerImpl.java:1424)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLNSDocumentScannerImpl.scanStartElement(XMLNSDocumentScannerImpl.java:259)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl$FragmentContentDriver.next(XMLDocumentFragmentScannerImpl.java:2710)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLDocumentScannerImpl.next(XMLDocumentScannerImpl.java:605)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLNSDocumentScannerImpl.next(XMLNSDocumentScannerImpl.java:112)
at java.xml/com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl.scanDocument(XMLDocumentFragmentScannerImpl.java:534)
at java.xml/com.sun.org.apache.xerces.internal.parsers.XML11Configuration.parse(XML11Configuration.java:888)
at java.xml/com.sun.org.apache.xerces.internal.parsers.XML11Configuration.parse(XML11Configuration.java:824)
at java.xml/com.sun.org.apache.xerces.internal.parsers.XMLParser.parse(XMLParser.java:141)
at java.xml/com.sun.org.apache.xerces.internal.parsers.AbstractSAXParser.parse(AbstractSAXParser.java:1216)
at java.xml/com.sun.org.apache.xerces.internal.jaxp.SAXParserImpl$JAXPSAXParser.parse(SAXParserImpl.java:635)
at org.iso_relax.verifier.impl.VerifierImpl.verify(VerifierImpl.java:121)
at ghidra.app.plugin.processors.sleigh.SleighLanguageValidator.validateSleighFile(SleighLanguageValidator.java:103)
|
process
|
mcs can t read language spec describe the bug i cannot load files with the mcs processor to reproduce steps to reproduce the behavior import a new file choose mcs as the processor hit ok expected behavior the file should be imported instead i get lots of exceptions screenshots environment please complete the following information os mac os x os ubuntu additional context can t read language spec users anthony software ghidra public ghidra processors data languages sla ghidra app plugin processors sleigh sleighexception invalid processor specification file users anthony software ghidra public ghidra processors data languages pspec at ghidra app plugin processors sleigh sleighlanguagevalidator validatesleighfile sleighlanguagevalidator java at ghidra app plugin processors sleigh sleighlanguagevalidator validatepspecfile sleighlanguagevalidator java at ghidra app plugin processors sleigh sleighlanguage initialize sleighlanguage java at ghidra app plugin processors sleigh sleighlanguage sleighlanguage java at ghidra app plugin processors sleigh sleighlanguageprovider getnewsleigh sleighlanguageprovider java at ghidra app plugin processors sleigh sleighlanguageprovider getlanguage sleighlanguageprovider java at ghidra program util defaultlanguageservice languageinfo getlanguage defaultlanguageservice java at ghidra program util defaultlanguageservice getlanguage defaultlanguageservice java at ghidra app util opinion binaryloader loadprogram binaryloader java at ghidra app util opinion abstractprogramloader load abstractprogramloader java at ghidra plugin importer importerutilities importsinglefile importerutilities java at ghidra plugin importer importerdialog lambda okcallback importerdialog java at ghidra util task tasklauncher run tasklauncher java at ghidra util task task monitoredrun task java at ghidra util task taskrunner lambda starttaskthread taskrunner java at java base java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java base java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java base java lang thread run thread java caused by org xml sax saxparseexception linenumber columnnumber element type programcounter must be followed by either attribute specifications or at java xml com sun org apache xerces internal util errorhandlerwrapper createsaxparseexception errorhandlerwrapper java at java xml com sun org apache xerces internal util errorhandlerwrapper fatalerror errorhandlerwrapper java at java xml com sun org apache xerces internal impl xmlerrorreporter reporterror xmlerrorreporter java at java xml com sun org apache xerces internal impl xmlerrorreporter reporterror xmlerrorreporter java at java xml com sun org apache xerces internal impl xmlscanner reportfatalerror xmlscanner java at java xml com sun org apache xerces internal impl xmldocumentfragmentscannerimpl seekcloseofstarttag xmldocumentfragmentscannerimpl java at java xml com sun org apache xerces internal impl xmlnsdocumentscannerimpl scanstartelement xmlnsdocumentscannerimpl java at java xml com sun org apache xerces internal impl xmldocumentfragmentscannerimpl fragmentcontentdriver next xmldocumentfragmentscannerimpl java at java xml com sun org apache xerces internal impl xmldocumentscannerimpl next xmldocumentscannerimpl java at java xml com sun org apache xerces internal impl xmlnsdocumentscannerimpl next xmlnsdocumentscannerimpl java at java xml com sun org apache xerces internal impl xmldocumentfragmentscannerimpl scandocument xmldocumentfragmentscannerimpl java at java xml com sun org apache xerces internal parsers parse java at java xml com sun org apache xerces internal parsers parse java at java xml com sun org apache xerces internal parsers xmlparser parse xmlparser java at java xml com sun org apache xerces internal parsers abstractsaxparser parse abstractsaxparser java at java xml com sun org apache xerces internal jaxp saxparserimpl jaxpsaxparser parse saxparserimpl java at org iso relax verifier impl verifierimpl verify verifierimpl java at ghidra app plugin processors sleigh sleighlanguagevalidator validatesleighfile sleighlanguagevalidator java
| 1
|
43,877
| 7,084,082,917
|
IssuesEvent
|
2018-01-11 04:26:33
|
wso2/product-sp
|
https://api.github.com/repos/wso2/product-sp
|
closed
|
Content of "Testing a Siddhi Application" and "Debugging Siddhi Applications" are identical
|
Documentation
|
**Description:**
Content of page [1] and [2] are same and hence redundant.
[1] https://docs.wso2.com/display/SP400/Testing+a+Siddhi+Application
[2] https://docs.wso2.com/display/SP400/Debugging+Siddhi+Applications
|
1.0
|
Content of "Testing a Siddhi Application" and "Debugging Siddhi Applications" are identical - **Description:**
Content of page [1] and [2] are same and hence redundant.
[1] https://docs.wso2.com/display/SP400/Testing+a+Siddhi+Application
[2] https://docs.wso2.com/display/SP400/Debugging+Siddhi+Applications
|
non_process
|
content of testing a siddhi application and debugging siddhi applications are identical description content of page and are same and hence redundant
| 0
|
181,339
| 14,016,342,845
|
IssuesEvent
|
2020-10-29 14:25:01
|
elastic/kibana
|
https://api.github.com/repos/elastic/kibana
|
closed
|
Failing test: redirects from a $ip$ with a null query - ml conditional links redirects from a $ip$ with a null query
|
Team: SecuritySolution Team:SIEM blocker failed-test skipped-test v7.10.0
|
A test failed on a tracked branch
```
AssertionError: Timed out retrying: expected 'http://localhost:6111/app/security/network/flows?timerange=(global:(linkTo:!(timeline),timerange:(from:%272019-08-28T11:00:00.000Z%27,kind:absolute,to:%272019-08-28T13:59:59.999Z%27)),timeline:(linkTo:!(global),timerange:(from:%272019-08-28T11:00:00.000Z%27,kind:absolute,to:%272019-08-28T13:59:59.999Z%27)))&sourcerer=(default:!(%27auditbeat-*%27))' to include '/app/security/network/flows?sourcerer=(default:!(%27auditbeat-*%27))&timerange=(global:(linkTo:!(timeline),timerange:(from:%272019-08-28T11:00:00.000Z%27,kind:absolute,to:%272019-08-28T13:59:59.999Z%27)),timeline:(linkTo:!(global),timerange:(from:%272019-08-28T11:00:00.000Z%27,kind:absolute,to:%272019-08-28T13:59:59.999Z%27)))'
at Context.eval (http://localhost:6111/__cypress/tests?p=cypress/integration/ml_conditional_links.spec.ts:623:18)
```
First failure: [Jenkins Build](https://kibana-ci.elastic.co/job/elastic+kibana+7.x/8325/)
<!-- kibanaCiData = {"failed-test":{"test.class":"redirects from a $ip$ with a null query","test.name":"ml conditional links redirects from a $ip$ with a null query","test.failCount":3}} -->
|
2.0
|
Failing test: redirects from a $ip$ with a null query - ml conditional links redirects from a $ip$ with a null query - A test failed on a tracked branch
```
AssertionError: Timed out retrying: expected 'http://localhost:6111/app/security/network/flows?timerange=(global:(linkTo:!(timeline),timerange:(from:%272019-08-28T11:00:00.000Z%27,kind:absolute,to:%272019-08-28T13:59:59.999Z%27)),timeline:(linkTo:!(global),timerange:(from:%272019-08-28T11:00:00.000Z%27,kind:absolute,to:%272019-08-28T13:59:59.999Z%27)))&sourcerer=(default:!(%27auditbeat-*%27))' to include '/app/security/network/flows?sourcerer=(default:!(%27auditbeat-*%27))&timerange=(global:(linkTo:!(timeline),timerange:(from:%272019-08-28T11:00:00.000Z%27,kind:absolute,to:%272019-08-28T13:59:59.999Z%27)),timeline:(linkTo:!(global),timerange:(from:%272019-08-28T11:00:00.000Z%27,kind:absolute,to:%272019-08-28T13:59:59.999Z%27)))'
at Context.eval (http://localhost:6111/__cypress/tests?p=cypress/integration/ml_conditional_links.spec.ts:623:18)
```
First failure: [Jenkins Build](https://kibana-ci.elastic.co/job/elastic+kibana+7.x/8325/)
<!-- kibanaCiData = {"failed-test":{"test.class":"redirects from a $ip$ with a null query","test.name":"ml conditional links redirects from a $ip$ with a null query","test.failCount":3}} -->
|
non_process
|
failing test redirects from a ip with a null query ml conditional links redirects from a ip with a null query a test failed on a tracked branch assertionerror timed out retrying expected to include app security network flows sourcerer default timerange global linkto timeline timerange from kind absolute to timeline linkto global timerange from kind absolute to at context eval first failure
| 0
|
22,371
| 31,141,282,959
|
IssuesEvent
|
2023-08-16 00:21:17
|
googleapis/python-firestore
|
https://api.github.com/repos/googleapis/python-firestore
|
closed
|
Add autospec or manual spec to async unit testing
|
api: firestore type: process
|
As we create our own `AsyncMock` class, extending `MagicMock`, we cannot use `create_autospec` to create mocks in async unit tests. We should investigate creating a `create_autospec` counterpart for async, or alternatively manually spec classes that are tested.
https://github.com/googleapis/python-firestore/pull/123#discussion_r459224691
|
1.0
|
Add autospec or manual spec to async unit testing - As we create our own `AsyncMock` class, extending `MagicMock`, we cannot use `create_autospec` to create mocks in async unit tests. We should investigate creating a `create_autospec` counterpart for async, or alternatively manually spec classes that are tested.
https://github.com/googleapis/python-firestore/pull/123#discussion_r459224691
|
process
|
add autospec or manual spec to async unit testing as we create our own asyncmock class extending magicmock we cannot use create autospec to create mocks in async unit tests we should investigate creating a create autospec counterpart for async or alternatively manually spec classes that are tested
| 1
|
615,465
| 19,255,649,182
|
IssuesEvent
|
2021-12-09 10:58:41
|
bounswe/2021SpringGroup6
|
https://api.github.com/repos/bounswe/2021SpringGroup6
|
opened
|
Create an Endpoint to give badges to other users.
|
Type: Feature Status: Not Yet Started Platform: Back-end Priority: High
|
| path | type | functionality | parameters | example |
|---------------------------------------------------------------|--------|---------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| users/<user_id>/badges | POST | Give a badge to another participant for a specific event. | event_id: int <br> badge_id: int | {event_id: 1 <br> badge_id: 2} |
The user id in the path represents the user who will receive the badge. This endpoint should be called after authentication so the authenticated user is the one who gives the badge.
|
1.0
|
Create an Endpoint to give badges to other users. - | path | type | functionality | parameters | example |
|---------------------------------------------------------------|--------|---------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| users/<user_id>/badges | POST | Give a badge to another participant for a specific event. | event_id: int <br> badge_id: int | {event_id: 1 <br> badge_id: 2} |
The user id in the path represents the user who will receive the badge. This endpoint should be called after authentication so the authenticated user is the one who gives the badge.
|
non_process
|
create an endpoint to give badges to other users path type functionality parameters example users badges post give a badge to another participant for a specific event event id int badge id int event id badge id the user id in the path represents the user who will receive the badge this endpoint should be called after authentication so the authenticated user is the one who gives the badge
| 0
|
4,185
| 7,123,577,200
|
IssuesEvent
|
2018-01-19 15:51:05
|
facebook/osquery
|
https://api.github.com/repos/facebook/osquery
|
closed
|
linux: Audit redesign merge criteria
|
Linux process auditing
|
From what I can see by running the daemon:
- The ^D event is not handled quickly. The daemon or shell still takes a few moments before stopping. Is there any way to make this respond quicker?
- The implementation is still taking way more resources at idle that master. After a minute the redesign is +20 seconds of system CPU while master is around 4 or 6.
|
1.0
|
linux: Audit redesign merge criteria - From what I can see by running the daemon:
- The ^D event is not handled quickly. The daemon or shell still takes a few moments before stopping. Is there any way to make this respond quicker?
- The implementation is still taking way more resources at idle that master. After a minute the redesign is +20 seconds of system CPU while master is around 4 or 6.
|
process
|
linux audit redesign merge criteria from what i can see by running the daemon the d event is not handled quickly the daemon or shell still takes a few moments before stopping is there any way to make this respond quicker the implementation is still taking way more resources at idle that master after a minute the redesign is seconds of system cpu while master is around or
| 1
|
322,046
| 9,812,021,998
|
IssuesEvent
|
2019-06-13 02:30:55
|
wevote/WebApp
|
https://api.github.com/repos/wevote/WebApp
|
opened
|
Issue popover: X positioning wrong, and popover centering instead of being at bottom
|
Difficulty: Medium Priority: 1
|
When you click an Issue under a candidate:
<img width="303" alt="Screen Shot 2019-06-12 at 7 25 42 PM" src="https://user-images.githubusercontent.com/7756031/59399274-4b2e5480-8d48-11e9-85e9-51432cdec538.png">
The popover opens with two problems:
<img width="309" alt="Screen Shot 2019-06-12 at 7 25 33 PM" src="https://user-images.githubusercontent.com/7756031/59399293-55505300-8d48-11e9-9891-6852cc22b136.png">
- [ ] 1: The x to close the popover should be right aligned
- [ ] 2: The popover should open under the Issue, instead of opening centered over the issue
|
1.0
|
Issue popover: X positioning wrong, and popover centering instead of being at bottom - When you click an Issue under a candidate:
<img width="303" alt="Screen Shot 2019-06-12 at 7 25 42 PM" src="https://user-images.githubusercontent.com/7756031/59399274-4b2e5480-8d48-11e9-85e9-51432cdec538.png">
The popover opens with two problems:
<img width="309" alt="Screen Shot 2019-06-12 at 7 25 33 PM" src="https://user-images.githubusercontent.com/7756031/59399293-55505300-8d48-11e9-9891-6852cc22b136.png">
- [ ] 1: The x to close the popover should be right aligned
- [ ] 2: The popover should open under the Issue, instead of opening centered over the issue
|
non_process
|
issue popover x positioning wrong and popover centering instead of being at bottom when you click an issue under a candidate img width alt screen shot at pm src the popover opens with two problems img width alt screen shot at pm src the x to close the popover should be right aligned the popover should open under the issue instead of opening centered over the issue
| 0
|
2,187
| 5,036,974,488
|
IssuesEvent
|
2016-12-17 11:29:48
|
fujaba/org.fujaba.graphengine
|
https://api.github.com/repos/fujaba/org.fujaba.graphengine
|
opened
|
implement requested changes from meeting 5
|
bug high priority improvement in process
|

- [ ] use "..."-parameter where useful
- [ ] fix null-pointer exception bug in IsomorphismHandlerCSP.java
- [ ] implement BridgeTest/RoadWork/RoadBlocking example
- [ ] possibly improve visualization, maybe with alchemy.js instead of sigma.js
|
1.0
|
implement requested changes from meeting 5 - 
- [ ] use "..."-parameter where useful
- [ ] fix null-pointer exception bug in IsomorphismHandlerCSP.java
- [ ] implement BridgeTest/RoadWork/RoadBlocking example
- [ ] possibly improve visualization, maybe with alchemy.js instead of sigma.js
|
process
|
implement requested changes from meeting use parameter where useful fix null pointer exception bug in isomorphismhandlercsp java implement bridgetest roadwork roadblocking example possibly improve visualization maybe with alchemy js instead of sigma js
| 1
|
150,508
| 13,348,280,265
|
IssuesEvent
|
2020-08-29 17:42:51
|
mand2/mand2_blog
|
https://api.github.com/repos/mand2/mand2_blog
|
closed
|
upload old contents: TIL
|
documentation enhancement
|
replace the blog theme **jekyll** to **hugo** 👉 `day 4`
upload old contents again, the topic is TIL.
|
1.0
|
upload old contents: TIL - replace the blog theme **jekyll** to **hugo** 👉 `day 4`
upload old contents again, the topic is TIL.
|
non_process
|
upload old contents til replace the blog theme jekyll to hugo 👉 day upload old contents again the topic is til
| 0
|
151,382
| 19,648,841,366
|
IssuesEvent
|
2022-01-10 02:40:48
|
jinuem/Shopping-Cart-POC
|
https://api.github.com/repos/jinuem/Shopping-Cart-POC
|
opened
|
CVE-2022-0122 (Medium) detected in node-forge-0.7.5.tgz
|
security vulnerability
|
## CVE-2022-0122 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.7.5.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.7.5.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.7.5.tgz</a></p>
<p>Path to dependency file: /Shopping-Cart-POC/rejsx/package.json</p>
<p>Path to vulnerable library: /rejsx/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-2.1.5.tgz (Root Library)
- webpack-dev-server-3.1.14.tgz
- selfsigned-1.10.4.tgz
- :x: **node-forge-0.7.5.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
forge is vulnerable to URL Redirection to Untrusted Site
<p>Publish Date: 2022-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0122>CVE-2022-0122</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/">https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/</a></p>
<p>Release Date: 2022-01-06</p>
<p>Fix Resolution: forge - v1.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2022-0122 (Medium) detected in node-forge-0.7.5.tgz - ## CVE-2022-0122 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.7.5.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.7.5.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.7.5.tgz</a></p>
<p>Path to dependency file: /Shopping-Cart-POC/rejsx/package.json</p>
<p>Path to vulnerable library: /rejsx/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-2.1.5.tgz (Root Library)
- webpack-dev-server-3.1.14.tgz
- selfsigned-1.10.4.tgz
- :x: **node-forge-0.7.5.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
forge is vulnerable to URL Redirection to Untrusted Site
<p>Publish Date: 2022-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0122>CVE-2022-0122</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/">https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/</a></p>
<p>Release Date: 2022-01-06</p>
<p>Fix Resolution: forge - v1.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_process
|
cve medium detected in node forge tgz cve medium severity vulnerability vulnerable library node forge tgz javascript implementations of network transports cryptography ciphers pki message digests and various utilities library home page a href path to dependency file shopping cart poc rejsx package json path to vulnerable library rejsx node modules node forge package json dependency hierarchy react scripts tgz root library webpack dev server tgz selfsigned tgz x node forge tgz vulnerable library vulnerability details forge is vulnerable to url redirection to untrusted site publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution forge step up your open source security game with whitesource
| 0
|
648,057
| 21,163,992,586
|
IssuesEvent
|
2022-04-07 12:02:28
|
kubernetes/website
|
https://api.github.com/repos/kubernetes/website
|
closed
|
Localize "Runtime Class" page to Italian
|
priority/important-longterm lifecycle/rotten language/it
|
I would like to have the "Runtime Class" page to be translated into Italian
page https://kubernetes.io/docs/concepts/containers/runtime-class/
/language it
/priority important-soon
|
1.0
|
Localize "Runtime Class" page to Italian - I would like to have the "Runtime Class" page to be translated into Italian
page https://kubernetes.io/docs/concepts/containers/runtime-class/
/language it
/priority important-soon
|
non_process
|
localize runtime class page to italian i would like to have the runtime class page to be translated into italian page language it priority important soon
| 0
|
20,516
| 27,174,869,499
|
IssuesEvent
|
2023-02-17 23:46:35
|
0xPolygonMiden/miden-vm
|
https://api.github.com/repos/0xPolygonMiden/miden-vm
|
closed
|
Potential optimization for loading values from memory
|
enhancement assembly processor on hold
|
Currently, at the VM level we have a single [loadw](https://github.com/maticnetwork/miden/blob/next/core/src/operations/mod.rs#L297) operation which is used to load data from memory onto the stack. This operation is used as the basis for `loadw.mem` and `pushw.mem` assembly instructions. Specifically, `loadw.mem` translates directly to `loadw` operation, while `pushw.mem` pads the stack with zeros before executing `loadw`.
Thus, `loadw.mem` requires 1 VM cycle, while `popw.mem` required 6 VM cycles. We can make these a little more balanced by changing the semantics of `loadw` processor operation. Specifically, currently stack transition diagram for `loadw` looks as follows:
```
[addr, 0, 0, 0, 0, .... ] -> [a3, a2, a1, a0, ...]
```
where, *addr* is the memory address from which to load a word, and *a0*, *a1* etc. are elements of the word located at that address. The net result is that the stack is shifted the left by one.
With the new approach we could do the following:
```
[addr, 0, 0, .... ] -> [a3, a2, a1, a0, ...]
```
The net result would be that the stack is shifted to the right by one.
With this approach both `loadw.mem` and `pushw.mem` instruction can be translated to 4 VM operations:
```
loadw.mem: MOVDN2 DROP DROP LOADW
pushw.mem: PAD PAD MOVUP2 LOADW
```
The net effect is that we reduce cycle count of `pushw.mem` by 2 cycles while increasing cycle count for `loadw.mem` by 3 cycles. Thus, whether this optimization is worth it should be dictated by relative prevalence of `pushw.mem` vs. `loadw.mem` in real-world programs.
|
1.0
|
Potential optimization for loading values from memory - Currently, at the VM level we have a single [loadw](https://github.com/maticnetwork/miden/blob/next/core/src/operations/mod.rs#L297) operation which is used to load data from memory onto the stack. This operation is used as the basis for `loadw.mem` and `pushw.mem` assembly instructions. Specifically, `loadw.mem` translates directly to `loadw` operation, while `pushw.mem` pads the stack with zeros before executing `loadw`.
Thus, `loadw.mem` requires 1 VM cycle, while `popw.mem` required 6 VM cycles. We can make these a little more balanced by changing the semantics of `loadw` processor operation. Specifically, currently stack transition diagram for `loadw` looks as follows:
```
[addr, 0, 0, 0, 0, .... ] -> [a3, a2, a1, a0, ...]
```
where, *addr* is the memory address from which to load a word, and *a0*, *a1* etc. are elements of the word located at that address. The net result is that the stack is shifted the left by one.
With the new approach we could do the following:
```
[addr, 0, 0, .... ] -> [a3, a2, a1, a0, ...]
```
The net result would be that the stack is shifted to the right by one.
With this approach both `loadw.mem` and `pushw.mem` instruction can be translated to 4 VM operations:
```
loadw.mem: MOVDN2 DROP DROP LOADW
pushw.mem: PAD PAD MOVUP2 LOADW
```
The net effect is that we reduce cycle count of `pushw.mem` by 2 cycles while increasing cycle count for `loadw.mem` by 3 cycles. Thus, whether this optimization is worth it should be dictated by relative prevalence of `pushw.mem` vs. `loadw.mem` in real-world programs.
|
process
|
potential optimization for loading values from memory currently at the vm level we have a single operation which is used to load data from memory onto the stack this operation is used as the basis for loadw mem and pushw mem assembly instructions specifically loadw mem translates directly to loadw operation while pushw mem pads the stack with zeros before executing loadw thus loadw mem requires vm cycle while popw mem required vm cycles we can make these a little more balanced by changing the semantics of loadw processor operation specifically currently stack transition diagram for loadw looks as follows where addr is the memory address from which to load a word and etc are elements of the word located at that address the net result is that the stack is shifted the left by one with the new approach we could do the following the net result would be that the stack is shifted to the right by one with this approach both loadw mem and pushw mem instruction can be translated to vm operations loadw mem drop drop loadw pushw mem pad pad loadw the net effect is that we reduce cycle count of pushw mem by cycles while increasing cycle count for loadw mem by cycles thus whether this optimization is worth it should be dictated by relative prevalence of pushw mem vs loadw mem in real world programs
| 1
|
304,312
| 26,266,646,179
|
IssuesEvent
|
2023-01-06 13:11:40
|
Kuadrant/testsuite
|
https://api.github.com/repos/Kuadrant/testsuite
|
opened
|
improve HF agents configuration from testsuite
|
test-case
|
**Summary**
Currently are HF agents configured automatically from test-specific fixtures. In some cases, it is needed to add extra options for agents. The goal of this issue is to extend current behavior to contain also extra agents options.
**Documentation**
Similar implementation as used in 3scale tests -> https://github.com/3scale-qe/3scale-tests/tree/main/testsuite/tests/performance
|
1.0
|
improve HF agents configuration from testsuite - **Summary**
Currently are HF agents configured automatically from test-specific fixtures. In some cases, it is needed to add extra options for agents. The goal of this issue is to extend current behavior to contain also extra agents options.
**Documentation**
Similar implementation as used in 3scale tests -> https://github.com/3scale-qe/3scale-tests/tree/main/testsuite/tests/performance
|
non_process
|
improve hf agents configuration from testsuite summary currently are hf agents configured automatically from test specific fixtures in some cases it is needed to add extra options for agents the goal of this issue is to extend current behavior to contain also extra agents options documentation similar implementation as used in tests
| 0
|
19,876
| 26,289,810,336
|
IssuesEvent
|
2023-01-08 09:04:18
|
googleapis/google-cloud-python
|
https://api.github.com/repos/googleapis/google-cloud-python
|
opened
|
Your .repo-metadata.json files have a problem 🤒
|
type: process repo-metadata: lint
|
You have a problem with your .repo-metadata.json files:
Result of scan 📈:
* api_shortname 'apiName' invalid in containers/python-bootstrap-container/.repo-metadata.json
* api_shortname 'type' invalid in packages/google-apps-script-type/.repo-metadata.json
* api_shortname 'routing' invalid in packages/google-maps-routing/.repo-metadata.json
☝️ Once you address these problems, you can close this issue.
### Need help?
* [Schema definition](https://github.com/googleapis/repo-automation-bots/blob/main/packages/repo-metadata-lint/src/repo-metadata-schema.json): lists valid options for each field.
* [API index](https://github.com/googleapis/googleapis/blob/master/api-index-v1.json): for gRPC libraries **api_shortname** should match the subdomain of an API's **hostName**.
* Reach out to **go/github-automation** if you have any questions.
|
1.0
|
Your .repo-metadata.json files have a problem 🤒 - You have a problem with your .repo-metadata.json files:
Result of scan 📈:
* api_shortname 'apiName' invalid in containers/python-bootstrap-container/.repo-metadata.json
* api_shortname 'type' invalid in packages/google-apps-script-type/.repo-metadata.json
* api_shortname 'routing' invalid in packages/google-maps-routing/.repo-metadata.json
☝️ Once you address these problems, you can close this issue.
### Need help?
* [Schema definition](https://github.com/googleapis/repo-automation-bots/blob/main/packages/repo-metadata-lint/src/repo-metadata-schema.json): lists valid options for each field.
* [API index](https://github.com/googleapis/googleapis/blob/master/api-index-v1.json): for gRPC libraries **api_shortname** should match the subdomain of an API's **hostName**.
* Reach out to **go/github-automation** if you have any questions.
|
process
|
your repo metadata json files have a problem 🤒 you have a problem with your repo metadata json files result of scan 📈 api shortname apiname invalid in containers python bootstrap container repo metadata json api shortname type invalid in packages google apps script type repo metadata json api shortname routing invalid in packages google maps routing repo metadata json ☝️ once you address these problems you can close this issue need help lists valid options for each field for grpc libraries api shortname should match the subdomain of an api s hostname reach out to go github automation if you have any questions
| 1
|
25,729
| 11,208,797,705
|
IssuesEvent
|
2020-01-06 08:55:01
|
MichaelAharon/Noche
|
https://api.github.com/repos/MichaelAharon/Noche
|
opened
|
CVE-2015-4852 (High) detected in commons-collections-3.2.1.jar
|
security vulnerability
|
## CVE-2015-4852 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-collections-3.2.1.jar</b></p></summary>
<p>Types that extend and augment the Java Collections Framework.</p>
<p>Library home page: <a href="http://commons.apache.org/collections/">http://commons.apache.org/collections/</a></p>
<p>Path to dependency file: /tmp/ws-scm/Noche/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/commons-collections/commons-collections/3.2.1/commons-collections-3.2.1.jar</p>
<p>
Dependency Hierarchy:
- dozer-5.5.1.jar (Root Library)
- commons-beanutils-1.9.1.jar
- :x: **commons-collections-3.2.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MichaelAharon/Noche/commit/c9869ad4c37483c75f47ba04d4f3a26ddffeb8de">c9869ad4c37483c75f47ba04d4f3a26ddffeb8de</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.
<p>Publish Date: 2015-11-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-4852>CVE-2015-4852</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.openwall.com/lists/oss-security/2015/11/17/19">https://www.openwall.com/lists/oss-security/2015/11/17/19</a></p>
<p>Release Date: 2015-11-18</p>
<p>Fix Resolution: commons-collections:commons-collections:3.2.2</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"commons-collections","packageName":"commons-collections","packageVersion":"3.2.1","isTransitiveDependency":true,"dependencyTree":"net.sf.dozer:dozer:5.5.1;commons-beanutils:commons-beanutils:1.9.1;commons-collections:commons-collections:3.2.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"commons-collections:commons-collections:3.2.2"}],"vulnerabilityIdentifier":"CVE-2015-4852","vulnerabilityDetails":"The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-4852","cvss2Severity":"high","cvss2Score":"7.5","extraData":{}}</REMEDIATE> -->
|
True
|
CVE-2015-4852 (High) detected in commons-collections-3.2.1.jar - ## CVE-2015-4852 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-collections-3.2.1.jar</b></p></summary>
<p>Types that extend and augment the Java Collections Framework.</p>
<p>Library home page: <a href="http://commons.apache.org/collections/">http://commons.apache.org/collections/</a></p>
<p>Path to dependency file: /tmp/ws-scm/Noche/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/commons-collections/commons-collections/3.2.1/commons-collections-3.2.1.jar</p>
<p>
Dependency Hierarchy:
- dozer-5.5.1.jar (Root Library)
- commons-beanutils-1.9.1.jar
- :x: **commons-collections-3.2.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MichaelAharon/Noche/commit/c9869ad4c37483c75f47ba04d4f3a26ddffeb8de">c9869ad4c37483c75f47ba04d4f3a26ddffeb8de</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.
<p>Publish Date: 2015-11-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-4852>CVE-2015-4852</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.openwall.com/lists/oss-security/2015/11/17/19">https://www.openwall.com/lists/oss-security/2015/11/17/19</a></p>
<p>Release Date: 2015-11-18</p>
<p>Fix Resolution: commons-collections:commons-collections:3.2.2</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"commons-collections","packageName":"commons-collections","packageVersion":"3.2.1","isTransitiveDependency":true,"dependencyTree":"net.sf.dozer:dozer:5.5.1;commons-beanutils:commons-beanutils:1.9.1;commons-collections:commons-collections:3.2.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"commons-collections:commons-collections:3.2.2"}],"vulnerabilityIdentifier":"CVE-2015-4852","vulnerabilityDetails":"The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-4852","cvss2Severity":"high","cvss2Score":"7.5","extraData":{}}</REMEDIATE> -->
|
non_process
|
cve high detected in commons collections jar cve high severity vulnerability vulnerable library commons collections jar types that extend and augment the java collections framework library home page a href path to dependency file tmp ws scm noche pom xml path to vulnerable library root repository commons collections commons collections commons collections jar dependency hierarchy dozer jar root library commons beanutils jar x commons collections jar vulnerable library found in head commit a href vulnerability details the wls security component in oracle weblogic server and allows remote attackers to execute arbitrary commands via a crafted serialized java object in protocol traffic to tcp port related to oracle common modules com bea core apache commons collections jar note the scope of this cve is limited to the weblogic server product publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution commons collections commons collections isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails the wls security component in oracle weblogic server and allows remote attackers to execute arbitrary commands via a crafted serialized java object in protocol traffic to tcp port related to oracle common modules com bea core apache commons collections jar note the scope of this cve is limited to the weblogic server product vulnerabilityurl
| 0
|
36,174
| 5,038,106,446
|
IssuesEvent
|
2016-12-18 02:28:14
|
d3athrow/vgstation13
|
https://api.github.com/repos/d3athrow/vgstation13
|
closed
|
Weird pressure value
|
Bug / Fix Needs Moar Testing ⚠️ OH GOD IT'S LOOSE ⚠️
|
This happened after I screwed up the TEG, reset it and put CO2 on each loop.

|
1.0
|
Weird pressure value - This happened after I screwed up the TEG, reset it and put CO2 on each loop.

|
non_process
|
weird pressure value this happened after i screwed up the teg reset it and put on each loop
| 0
|
11,990
| 14,737,202,668
|
IssuesEvent
|
2021-01-07 01:09:38
|
kdjstudios/SABillingGitlab
|
https://api.github.com/repos/kdjstudios/SABillingGitlab
|
closed
|
Allentown Getting Something Went Wrong Message While Applying Usage For Billing `
|
anc-ops anc-process anp-important ant-bug ant-support
|
In GitLab by @kdjstudios on Apr 23, 2018, 10:33
**Submitted by:** "Tobey McInally" <tobey.mcinally@answernet.com>
**Helpdesk:** http://www.servicedesk.answernet.com/profiles/ticket/2018-04-23-34624/conversation
**Server:** Internal
**Client/Site:** Allentown
**Account:** NA
**Issue:**
Site: 061
Challenge: something went wrong message while applying usage
Hello,
I have uploaded my usage to SAB for our 4/21 billing cycle.
When I click apply I get a message that something went wrong.
I am not able to move forward with my billing process.
|
1.0
|
Allentown Getting Something Went Wrong Message While Applying Usage For Billing ` - In GitLab by @kdjstudios on Apr 23, 2018, 10:33
**Submitted by:** "Tobey McInally" <tobey.mcinally@answernet.com>
**Helpdesk:** http://www.servicedesk.answernet.com/profiles/ticket/2018-04-23-34624/conversation
**Server:** Internal
**Client/Site:** Allentown
**Account:** NA
**Issue:**
Site: 061
Challenge: something went wrong message while applying usage
Hello,
I have uploaded my usage to SAB for our 4/21 billing cycle.
When I click apply I get a message that something went wrong.
I am not able to move forward with my billing process.
|
process
|
allentown getting something went wrong message while applying usage for billing in gitlab by kdjstudios on apr submitted by tobey mcinally helpdesk server internal client site allentown account na issue site challenge something went wrong message while applying usage hello i have uploaded my usage to sab for our billing cycle when i click apply i get a message that something went wrong i am not able to move forward with my billing process
| 1
|
260,709
| 22,642,165,330
|
IssuesEvent
|
2022-07-01 04:04:15
|
pytorch/pytorch
|
https://api.github.com/repos/pytorch/pytorch
|
opened
|
DISABLED test_chain_iterable_style_dataset (__main__.TestDataLoaderPersistentWorkers)
|
module: flaky-tests skipped module: unknown
|
Platforms: linux
This test was disabled because it is failing in CI. See [recent examples](https://hud.pytorch.org/flakytest?name=test_chain_iterable_style_dataset&suite=TestDataLoaderPersistentWorkers&file=test_dataloader.py) and the most recent trunk [workflow logs](https://github.com/pytorch/pytorch/runs/7141678531).
Over the past 3 hours, it has been determined flaky in 1 workflow(s) with 1 red and 1 green.
|
1.0
|
DISABLED test_chain_iterable_style_dataset (__main__.TestDataLoaderPersistentWorkers) - Platforms: linux
This test was disabled because it is failing in CI. See [recent examples](https://hud.pytorch.org/flakytest?name=test_chain_iterable_style_dataset&suite=TestDataLoaderPersistentWorkers&file=test_dataloader.py) and the most recent trunk [workflow logs](https://github.com/pytorch/pytorch/runs/7141678531).
Over the past 3 hours, it has been determined flaky in 1 workflow(s) with 1 red and 1 green.
|
non_process
|
disabled test chain iterable style dataset main testdataloaderpersistentworkers platforms linux this test was disabled because it is failing in ci see and the most recent trunk over the past hours it has been determined flaky in workflow s with red and green
| 0
|
12,093
| 14,740,081,591
|
IssuesEvent
|
2021-01-07 08:29:04
|
kdjstudios/SABillingGitlab
|
https://api.github.com/repos/kdjstudios/SABillingGitlab
|
closed
|
Atlanta - SA Billing - Late Fee Account List
|
anc-process anp-important ant-bug has attachment
|
In GitLab by @kdjstudios on Oct 3, 2018, 11:09
[Atlanta.xlsx](/uploads/efbbfb141893f5b2abbb8b52ea0c24e0/Atlanta.xlsx)
HD: http://www.servicedesk.answernet.com/profiles/ticket/2018-10-03-52748
|
1.0
|
Atlanta - SA Billing - Late Fee Account List - In GitLab by @kdjstudios on Oct 3, 2018, 11:09
[Atlanta.xlsx](/uploads/efbbfb141893f5b2abbb8b52ea0c24e0/Atlanta.xlsx)
HD: http://www.servicedesk.answernet.com/profiles/ticket/2018-10-03-52748
|
process
|
atlanta sa billing late fee account list in gitlab by kdjstudios on oct uploads atlanta xlsx hd
| 1
|
4,662
| 7,496,846,628
|
IssuesEvent
|
2018-04-08 13:54:01
|
allinurl/goaccess
|
https://api.github.com/repos/allinurl/goaccess
|
closed
|
Unknown 4xx client error codes
|
log-processing question
|
Hi! I installed the latest goaccess code from the master branch but my stats have a lot of "Unknown" "4xx Client Error". I know for sure that most of them are 429 error codes, why are they not listed? I attached a sceenshot in case it helps.
Thanks!
<img width="567" alt="screen shot 2018-04-05 at 13 52 10" src="https://user-images.githubusercontent.com/1357968/38362187-93a2a948-38d8-11e8-84c8-2ef64a24736e.png">
|
1.0
|
Unknown 4xx client error codes - Hi! I installed the latest goaccess code from the master branch but my stats have a lot of "Unknown" "4xx Client Error". I know for sure that most of them are 429 error codes, why are they not listed? I attached a sceenshot in case it helps.
Thanks!
<img width="567" alt="screen shot 2018-04-05 at 13 52 10" src="https://user-images.githubusercontent.com/1357968/38362187-93a2a948-38d8-11e8-84c8-2ef64a24736e.png">
|
process
|
unknown client error codes hi i installed the latest goaccess code from the master branch but my stats have a lot of unknown client error i know for sure that most of them are error codes why are they not listed i attached a sceenshot in case it helps thanks img width alt screen shot at src
| 1
|
12,902
| 2,725,858,921
|
IssuesEvent
|
2015-04-15 05:25:34
|
jmcgeheeiv/pyfakefs
|
https://api.github.com/repos/jmcgeheeiv/pyfakefs
|
closed
|
Please host the documentation for pyfakefs
|
auto-migrated Priority-Medium Type-Defect
|
```
It is very difficult to browse through the documentation in source. Kindly
upload it to pythonhosted or readthedocs.
```
Original issue reported on code.google.com by `pratika...@gmail.com` on 21 Jan 2014 at 4:08
|
1.0
|
Please host the documentation for pyfakefs - ```
It is very difficult to browse through the documentation in source. Kindly
upload it to pythonhosted or readthedocs.
```
Original issue reported on code.google.com by `pratika...@gmail.com` on 21 Jan 2014 at 4:08
|
non_process
|
please host the documentation for pyfakefs it is very difficult to browse through the documentation in source kindly upload it to pythonhosted or readthedocs original issue reported on code google com by pratika gmail com on jan at
| 0
|
5,076
| 7,870,366,447
|
IssuesEvent
|
2018-06-25 00:56:26
|
nodejs/node
|
https://api.github.com/repos/nodejs/node
|
closed
|
IPC can freeze the process
|
child_process libuv windows
|
Since we upgraded our app from 0.10.38 to v6, we experienced a lot of problem with IPC messaging.
Essentially, we have a web application with a few workers to handle all the requests. The workers contains caches to speed up the request and theses caches are synchronized between process with IPC messaging. We were also using log4js as a logging library with the [clustered](https://github.com/nomiddlename/log4js-node/wiki/Clustered) appender that uses IPC to send all child logs back to the master to have a single process handling the logs.
All was working fine under 0.10.38, but when we upgraded to 6.0.0 (and then 6.2.0) our app kept crashing under various circumstances
We soon realized that if we send too much data (or too fast) through IPC, that it was freezing our application.
We began refactoring our entire app to use IPC to the strict minimum.
- We created a custom logging process that receive logs by TCP instead of IPC
- We refactored our entire master/worker process so the workers could load all the information on their own and restrict IPC messages to only "trigger" messages instead of sending all the data.
All thoses changes are good for our application, since it reduced dependencies from master/worker and did a better separation of responsibilities, but I still see it as a flaw in Node.JS since the IPC is a fairly simple communication mechanism to exchange information between workers, but it seems so fragile now that we are afraid of using it.
I attached a simple script that reproduce the problem. It is not a real scenario, just a test case I created to reproduce the problem of the application that stop responding.
[ipc_test_scripts.zip](https://github.com/nodejs/node/files/357247/ipc_test_scripts.zip)
On my laptop, the app crash at startup (or before the first log) with 5 forks (maybe because I have 4 physical core)
At first I tested with 3 workers and It froze after 5-10 minutes (all process CPU go down to 0 and there's no more log output)
If I remove the "bacon ipsum" from the worker message, it works (might freeze after a while)
If I increase the message interval from 1ms to 10ms, it works (might freeze after a while)
If I spawn only 4 workers it works (will probably freeze after 5-10 minutes)
If I execute it with 0.10.38 it works (as long as I ran it)
So if you play with the timings, size of messages and/or number of forks, you should be able to reproduce the problem.
One thing I observed is that the IPC messaging seem to have improve in performance big time from 0.10 to 6. If i run the test with 3 workers for 10 seconds with 0.10.38 the master only handle 1902 messages and in comparison with 6.3.0, in the same 10 seconds, the master handles 25514 messages.
I also tested it with 4.4.7 and it freeze at startup with 5 forks and after 4 minutes with 4 forks
My specs :
NodeJS Windows 6.3.0 64 bits (bug)
NodeJS Windows 6.2.0 64 bits (bug)
NodeJS Windows 4.4.7 64 bits (bug)
NodeJS Windows 0.10.38 64 bits (OK)
|
1.0
|
IPC can freeze the process - Since we upgraded our app from 0.10.38 to v6, we experienced a lot of problem with IPC messaging.
Essentially, we have a web application with a few workers to handle all the requests. The workers contains caches to speed up the request and theses caches are synchronized between process with IPC messaging. We were also using log4js as a logging library with the [clustered](https://github.com/nomiddlename/log4js-node/wiki/Clustered) appender that uses IPC to send all child logs back to the master to have a single process handling the logs.
All was working fine under 0.10.38, but when we upgraded to 6.0.0 (and then 6.2.0) our app kept crashing under various circumstances
We soon realized that if we send too much data (or too fast) through IPC, that it was freezing our application.
We began refactoring our entire app to use IPC to the strict minimum.
- We created a custom logging process that receive logs by TCP instead of IPC
- We refactored our entire master/worker process so the workers could load all the information on their own and restrict IPC messages to only "trigger" messages instead of sending all the data.
All thoses changes are good for our application, since it reduced dependencies from master/worker and did a better separation of responsibilities, but I still see it as a flaw in Node.JS since the IPC is a fairly simple communication mechanism to exchange information between workers, but it seems so fragile now that we are afraid of using it.
I attached a simple script that reproduce the problem. It is not a real scenario, just a test case I created to reproduce the problem of the application that stop responding.
[ipc_test_scripts.zip](https://github.com/nodejs/node/files/357247/ipc_test_scripts.zip)
On my laptop, the app crash at startup (or before the first log) with 5 forks (maybe because I have 4 physical core)
At first I tested with 3 workers and It froze after 5-10 minutes (all process CPU go down to 0 and there's no more log output)
If I remove the "bacon ipsum" from the worker message, it works (might freeze after a while)
If I increase the message interval from 1ms to 10ms, it works (might freeze after a while)
If I spawn only 4 workers it works (will probably freeze after 5-10 minutes)
If I execute it with 0.10.38 it works (as long as I ran it)
So if you play with the timings, size of messages and/or number of forks, you should be able to reproduce the problem.
One thing I observed is that the IPC messaging seem to have improve in performance big time from 0.10 to 6. If i run the test with 3 workers for 10 seconds with 0.10.38 the master only handle 1902 messages and in comparison with 6.3.0, in the same 10 seconds, the master handles 25514 messages.
I also tested it with 4.4.7 and it freeze at startup with 5 forks and after 4 minutes with 4 forks
My specs :
NodeJS Windows 6.3.0 64 bits (bug)
NodeJS Windows 6.2.0 64 bits (bug)
NodeJS Windows 4.4.7 64 bits (bug)
NodeJS Windows 0.10.38 64 bits (OK)
|
process
|
ipc can freeze the process since we upgraded our app from to we experienced a lot of problem with ipc messaging essentially we have a web application with a few workers to handle all the requests the workers contains caches to speed up the request and theses caches are synchronized between process with ipc messaging we were also using as a logging library with the appender that uses ipc to send all child logs back to the master to have a single process handling the logs all was working fine under but when we upgraded to and then our app kept crashing under various circumstances we soon realized that if we send too much data or too fast through ipc that it was freezing our application we began refactoring our entire app to use ipc to the strict minimum we created a custom logging process that receive logs by tcp instead of ipc we refactored our entire master worker process so the workers could load all the information on their own and restrict ipc messages to only trigger messages instead of sending all the data all thoses changes are good for our application since it reduced dependencies from master worker and did a better separation of responsibilities but i still see it as a flaw in node js since the ipc is a fairly simple communication mechanism to exchange information between workers but it seems so fragile now that we are afraid of using it i attached a simple script that reproduce the problem it is not a real scenario just a test case i created to reproduce the problem of the application that stop responding on my laptop the app crash at startup or before the first log with forks maybe because i have physical core at first i tested with workers and it froze after minutes all process cpu go down to and there s no more log output if i remove the bacon ipsum from the worker message it works might freeze after a while if i increase the message interval from to it works might freeze after a while if i spawn only workers it works will probably freeze after minutes if i execute it with it works as long as i ran it so if you play with the timings size of messages and or number of forks you should be able to reproduce the problem one thing i observed is that the ipc messaging seem to have improve in performance big time from to if i run the test with workers for seconds with the master only handle messages and in comparison with in the same seconds the master handles messages i also tested it with and it freeze at startup with forks and after minutes with forks my specs nodejs windows bits bug nodejs windows bits bug nodejs windows bits bug nodejs windows bits ok
| 1
|
6,369
| 9,419,112,386
|
IssuesEvent
|
2019-04-10 21:00:13
|
googlegenomics/gcp-variant-transforms
|
https://api.github.com/repos/googlegenomics/gcp-variant-transforms
|
closed
|
Find a solution for multiple BigQuery versions
|
P2 process
|
In our integration tests, we rely on `google-cloud-bigquery>0.25`, however, Beam needs BigQuery [`google-cloud-bigquery==0.25`](https://github.com/apache/beam/blob/8d854d4ce0365a8e201b388618d7732f000c65b9/sdks/python/setup.py#L130). Even though the two code paths don't currently connect, we should find some way to handle both versions. We currently have an `[int_test]` target in our setup.py to handle this case.
We can also ask the Beam team whether actually installing bigquery>0.25 is ok (there is a comment that it's only used for tests?).
|
1.0
|
Find a solution for multiple BigQuery versions - In our integration tests, we rely on `google-cloud-bigquery>0.25`, however, Beam needs BigQuery [`google-cloud-bigquery==0.25`](https://github.com/apache/beam/blob/8d854d4ce0365a8e201b388618d7732f000c65b9/sdks/python/setup.py#L130). Even though the two code paths don't currently connect, we should find some way to handle both versions. We currently have an `[int_test]` target in our setup.py to handle this case.
We can also ask the Beam team whether actually installing bigquery>0.25 is ok (there is a comment that it's only used for tests?).
|
process
|
find a solution for multiple bigquery versions in our integration tests we rely on google cloud bigquery however beam needs bigquery even though the two code paths don t currently connect we should find some way to handle both versions we currently have an target in our setup py to handle this case we can also ask the beam team whether actually installing bigquery is ok there is a comment that it s only used for tests
| 1
|
132,829
| 18,272,146,115
|
IssuesEvent
|
2021-10-04 14:48:42
|
cockroachdb/cockroach
|
https://api.github.com/repos/cockroachdb/cockroach
|
closed
|
log: include crdb version into metadata envelope for logging events
|
C-enhancement A-logging T-server-and-security
|
**Is your feature request related to a problem? Please describe.**
This was raised by @knz from a conversation around handling/consuming different versions of logs on different versions of crdb
**Describe the solution you'd like**
We'd like to add the crdb version into the envelope for log events so that that metadata is available for all events
cc @piyush-singh for awareness
|
True
|
log: include crdb version into metadata envelope for logging events - **Is your feature request related to a problem? Please describe.**
This was raised by @knz from a conversation around handling/consuming different versions of logs on different versions of crdb
**Describe the solution you'd like**
We'd like to add the crdb version into the envelope for log events so that that metadata is available for all events
cc @piyush-singh for awareness
|
non_process
|
log include crdb version into metadata envelope for logging events is your feature request related to a problem please describe this was raised by knz from a conversation around handling consuming different versions of logs on different versions of crdb describe the solution you d like we d like to add the crdb version into the envelope for log events so that that metadata is available for all events cc piyush singh for awareness
| 0
|
40,965
| 5,328,410,737
|
IssuesEvent
|
2017-02-15 11:59:51
|
owncloud/QA
|
https://api.github.com/repos/owncloud/QA
|
closed
|
Use separate skeleton dir for integration tests
|
enhancement Integration tests
|
The current integration tests will directly write files into the source code folder "core/skeleton". This requires appropriate permissions and isn't good practice.
We should rather use "occ config:set" to set the "skeletondirectory" config.php value to a folder inside "build/integration/skeleton" that already contains the necessary files.
Also, no need to dynamically create those in BasicStructure, just have them already exist in that folder. This then removes the need for proper permissions.
@owncloud/qa
|
1.0
|
Use separate skeleton dir for integration tests - The current integration tests will directly write files into the source code folder "core/skeleton". This requires appropriate permissions and isn't good practice.
We should rather use "occ config:set" to set the "skeletondirectory" config.php value to a folder inside "build/integration/skeleton" that already contains the necessary files.
Also, no need to dynamically create those in BasicStructure, just have them already exist in that folder. This then removes the need for proper permissions.
@owncloud/qa
|
non_process
|
use separate skeleton dir for integration tests the current integration tests will directly write files into the source code folder core skeleton this requires appropriate permissions and isn t good practice we should rather use occ config set to set the skeletondirectory config php value to a folder inside build integration skeleton that already contains the necessary files also no need to dynamically create those in basicstructure just have them already exist in that folder this then removes the need for proper permissions owncloud qa
| 0
|
6,920
| 10,077,806,964
|
IssuesEvent
|
2019-07-24 19:39:41
|
tc39/proposal-promise-any
|
https://api.github.com/repos/tc39/proposal-promise-any
|
closed
|
Advance to stage 2
|
process
|
Criteria taken from [the TC39 process document](https://tc39.github.io/process-document/) minus those from previous stages:
> - [x] Initial spec text
https://github.com/tc39/proposal-promise-any#specification
|
1.0
|
Advance to stage 2 - Criteria taken from [the TC39 process document](https://tc39.github.io/process-document/) minus those from previous stages:
> - [x] Initial spec text
https://github.com/tc39/proposal-promise-any#specification
|
process
|
advance to stage criteria taken from minus those from previous stages initial spec text
| 1
|
236,551
| 19,559,111,429
|
IssuesEvent
|
2022-01-03 13:56:28
|
wazuh/wazuh-qa
|
https://api.github.com/repos/wazuh/wazuh-qa
|
opened
|
Fix `check_files` script
|
type/bug subteam/qa-thunder test/check-files
|
Something is not working as expected due to this script. This behavior has been detected in this issue: https://github.com/wazuh/wazuh-qa/issues/2312.
In some cases, it is logging a directory's content but not that directory. For example, `/` and `/tmp` are not being logged sometimes.
|
1.0
|
Fix `check_files` script - Something is not working as expected due to this script. This behavior has been detected in this issue: https://github.com/wazuh/wazuh-qa/issues/2312.
In some cases, it is logging a directory's content but not that directory. For example, `/` and `/tmp` are not being logged sometimes.
|
non_process
|
fix check files script something is not working as expected due to this script this behavior has been detected in this issue in some cases it is logging a directory s content but not that directory for example and tmp are not being logged sometimes
| 0
|
16,887
| 22,173,382,893
|
IssuesEvent
|
2022-06-06 05:09:43
|
amor71/LiuAlgoTrader
|
https://api.github.com/repos/amor71/LiuAlgoTrader
|
closed
|
ModuleNotFoundError: No module named 'liualgotrader.trading.tradier' when running backtester
|
in-process
|
Hi! I think I might have found a bug (probably fell between versions)
`liualgotrader.backtester ` tries to `liualgotrader.trading.tradier import TradierTrader` but that is currently missing from the package.
**To Reproduce**
Steps to reproduce the behavior:
1. install liualgotrader
2. download sample data
**Expected behavior**
A clear and concise description of what you expected to happen.
**Screenshots**

|
1.0
|
ModuleNotFoundError: No module named 'liualgotrader.trading.tradier' when running backtester - Hi! I think I might have found a bug (probably fell between versions)
`liualgotrader.backtester ` tries to `liualgotrader.trading.tradier import TradierTrader` but that is currently missing from the package.
**To Reproduce**
Steps to reproduce the behavior:
1. install liualgotrader
2. download sample data
**Expected behavior**
A clear and concise description of what you expected to happen.
**Screenshots**

|
process
|
modulenotfounderror no module named liualgotrader trading tradier when running backtester hi i think i might have found a bug probably fell between versions liualgotrader backtester tries to liualgotrader trading tradier import tradiertrader but that is currently missing from the package to reproduce steps to reproduce the behavior install liualgotrader download sample data expected behavior a clear and concise description of what you expected to happen screenshots
| 1
|
432,176
| 12,490,183,136
|
IssuesEvent
|
2020-05-31 22:37:50
|
Tschipp/BuildersBag
|
https://api.github.com/repos/Tschipp/BuildersBag
|
closed
|
[Feature] Bag Cache
|
added in next release feature - base mod priority: high
|
**Description of the Feature in as much detail as possible**
Bag Caching System for the Client Side
|
1.0
|
[Feature] Bag Cache - **Description of the Feature in as much detail as possible**
Bag Caching System for the Client Side
|
non_process
|
bag cache description of the feature in as much detail as possible bag caching system for the client side
| 0
|
6,292
| 9,301,198,843
|
IssuesEvent
|
2019-03-23 19:52:11
|
juanmait/seedjs
|
https://api.github.com/repos/juanmait/seedjs
|
opened
|
seed-process: add and configure nodemon
|
seed-process
|
- would be nice to have [nodemon] running with [babel-node] for development
[nodemon]: https://github.com/remy/nodemon/
[babel-node]: https://babeljs.io/docs/en/babel-node
|
1.0
|
seed-process: add and configure nodemon - - would be nice to have [nodemon] running with [babel-node] for development
[nodemon]: https://github.com/remy/nodemon/
[babel-node]: https://babeljs.io/docs/en/babel-node
|
process
|
seed process add and configure nodemon would be nice to have running with for development
| 1
|
5,142
| 7,923,554,888
|
IssuesEvent
|
2018-07-05 14:23:27
|
Open-EO/openeo-api
|
https://api.github.com/repos/Open-EO/openeo-api
|
closed
|
Type definitions for process arguments
|
process discovery work in progress
|
At the moment the process definition is typeless, arguments only have a human-readable description and no type definition. This is a problem for usability, since in different languages there are native equivalents for spatial types; users are very likely to already have their data in the native type and would want the client to handle the native type, rather than having to decompose the native type into what the backend expects manually. As an example, in R, this is what users need to do to pass an extent to the `bbox_filter` process at the moment:
```R
MyExtent = extent(MyAOI) # MyAOI is a raster or polygon that covers the area of interest
CropS2 = collection("Sentinel-2") %>% process("bbox_filter", left=MyExtent@xmin, right=MyExtent@xmax, top=MyExtent@ymax, bottom=MyExtent@ymin, srs=MyExtent@crs)
CropL8 = collection("Landsat8") %>% process("bbox_filter", left=MyExtent@xmin, right=MyExtent@xmax, top=MyExtent@ymax, bottom=MyExtent@ymin, srs=MyExtent@crs)
```
Whereas ideally this would just be:
```R
CropS2 = collection("Sentinel-2") %>% process("bbox_filter", extent=MyAOI)
CropL8 = collection("Landsat8") %>% process("bbox_filter", extent=MyAOI)
```
But there is no way for the client to know how to map the Extent to the arguments, because they're loosely defined. We cannot just make an assumption that every process with an argument `left` expects the ymin coordinate of the object extent.
This is not just a problem with extents; same goes for other spatial types, such as defining points. The users have points in a `SpatialPoints` object and would expect to be able to pass it, rather than having to manually extract information about every single point in that object. The problem gets even bigger with polygons, that don't even have a set number of vertices.
|
1.0
|
Type definitions for process arguments - At the moment the process definition is typeless, arguments only have a human-readable description and no type definition. This is a problem for usability, since in different languages there are native equivalents for spatial types; users are very likely to already have their data in the native type and would want the client to handle the native type, rather than having to decompose the native type into what the backend expects manually. As an example, in R, this is what users need to do to pass an extent to the `bbox_filter` process at the moment:
```R
MyExtent = extent(MyAOI) # MyAOI is a raster or polygon that covers the area of interest
CropS2 = collection("Sentinel-2") %>% process("bbox_filter", left=MyExtent@xmin, right=MyExtent@xmax, top=MyExtent@ymax, bottom=MyExtent@ymin, srs=MyExtent@crs)
CropL8 = collection("Landsat8") %>% process("bbox_filter", left=MyExtent@xmin, right=MyExtent@xmax, top=MyExtent@ymax, bottom=MyExtent@ymin, srs=MyExtent@crs)
```
Whereas ideally this would just be:
```R
CropS2 = collection("Sentinel-2") %>% process("bbox_filter", extent=MyAOI)
CropL8 = collection("Landsat8") %>% process("bbox_filter", extent=MyAOI)
```
But there is no way for the client to know how to map the Extent to the arguments, because they're loosely defined. We cannot just make an assumption that every process with an argument `left` expects the ymin coordinate of the object extent.
This is not just a problem with extents; same goes for other spatial types, such as defining points. The users have points in a `SpatialPoints` object and would expect to be able to pass it, rather than having to manually extract information about every single point in that object. The problem gets even bigger with polygons, that don't even have a set number of vertices.
|
process
|
type definitions for process arguments at the moment the process definition is typeless arguments only have a human readable description and no type definition this is a problem for usability since in different languages there are native equivalents for spatial types users are very likely to already have their data in the native type and would want the client to handle the native type rather than having to decompose the native type into what the backend expects manually as an example in r this is what users need to do to pass an extent to the bbox filter process at the moment r myextent extent myaoi myaoi is a raster or polygon that covers the area of interest collection sentinel process bbox filter left myextent xmin right myextent xmax top myextent ymax bottom myextent ymin srs myextent crs collection process bbox filter left myextent xmin right myextent xmax top myextent ymax bottom myextent ymin srs myextent crs whereas ideally this would just be r collection sentinel process bbox filter extent myaoi collection process bbox filter extent myaoi but there is no way for the client to know how to map the extent to the arguments because they re loosely defined we cannot just make an assumption that every process with an argument left expects the ymin coordinate of the object extent this is not just a problem with extents same goes for other spatial types such as defining points the users have points in a spatialpoints object and would expect to be able to pass it rather than having to manually extract information about every single point in that object the problem gets even bigger with polygons that don t even have a set number of vertices
| 1
|
36,903
| 12,428,257,231
|
IssuesEvent
|
2020-05-25 05:38:42
|
varora1406/is-number
|
https://api.github.com/repos/varora1406/is-number
|
opened
|
WS-2020-0070 (High) detected in lodash-1.3.1.tgz, lodash-4.17.15.tgz
|
security vulnerability
|
## WS-2020-0070 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-1.3.1.tgz</b>, <b>lodash-4.17.15.tgz</b></p></summary>
<p>
<details><summary><b>lodash-1.3.1.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, and extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz">https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/is-number/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/is-number/node_modules/travis-ci/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- semantic-release-cli-5.3.1.tgz (Root Library)
- travis-ci-2.2.0.tgz
- :x: **lodash-1.3.1.tgz** (Vulnerable Library)
</details>
<details><summary><b>lodash-4.17.15.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/is-number/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/is-number/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- cli-7.8.4.tgz (Root Library)
- :x: **lodash-4.17.15.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/varora1406/is-number/commit/2f110e3124900ec34cbf268ff3d435b7fce42dfa">2f110e3124900ec34cbf268ff3d435b7fce42dfa</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
a prototype pollution vulnerability in lodash. It allows an attacker to inject properties on Object.prototype
<p>Publish Date: 2020-04-28
<p>URL: <a href=https://hackerone.com/reports/712065>WS-2020-0070</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
WS-2020-0070 (High) detected in lodash-1.3.1.tgz, lodash-4.17.15.tgz - ## WS-2020-0070 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-1.3.1.tgz</b>, <b>lodash-4.17.15.tgz</b></p></summary>
<p>
<details><summary><b>lodash-1.3.1.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, and extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz">https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/is-number/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/is-number/node_modules/travis-ci/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- semantic-release-cli-5.3.1.tgz (Root Library)
- travis-ci-2.2.0.tgz
- :x: **lodash-1.3.1.tgz** (Vulnerable Library)
</details>
<details><summary><b>lodash-4.17.15.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/is-number/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/is-number/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- cli-7.8.4.tgz (Root Library)
- :x: **lodash-4.17.15.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/varora1406/is-number/commit/2f110e3124900ec34cbf268ff3d435b7fce42dfa">2f110e3124900ec34cbf268ff3d435b7fce42dfa</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
a prototype pollution vulnerability in lodash. It allows an attacker to inject properties on Object.prototype
<p>Publish Date: 2020-04-28
<p>URL: <a href=https://hackerone.com/reports/712065>WS-2020-0070</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_process
|
ws high detected in lodash tgz lodash tgz ws high severity vulnerability vulnerable libraries lodash tgz lodash tgz lodash tgz a utility library delivering consistency customization performance and extras library home page a href path to dependency file tmp ws scm is number package json path to vulnerable library tmp ws scm is number node modules travis ci node modules lodash package json dependency hierarchy semantic release cli tgz root library travis ci tgz x lodash tgz vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file tmp ws scm is number package json path to vulnerable library tmp ws scm is number node modules lodash package json dependency hierarchy cli tgz root library x lodash tgz vulnerable library found in head commit a href vulnerability details a prototype pollution vulnerability in lodash it allows an attacker to inject properties on object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource
| 0
|
13,186
| 15,612,959,534
|
IssuesEvent
|
2021-03-19 15:53:42
|
googleapis/google-cloud-cpp
|
https://api.github.com/repos/googleapis/google-cloud-cpp
|
closed
|
ABI/API checker doesn't match overloads properly
|
external type: process
|
This build failed the ABI/API check, but it shouldn't have - the actual changes were adding `const` to a non-const method, which is always safe. It does this correctly in some cases, but the 3 at the top match one overload against another and claims the parameters change (which is a breaking change).
[log](https://source.cloud.google.com/results/invocations/87f5aa4a-1b34-4df5-9ad1-168d99ce08a1/targets/cloud-cpp%2Fgithub%2Fdocker%2Fcheck-abi-presubmit/log)
```
Problems with Symbols, Medium Severity 3
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
idempotent_mutation_policy.h
namespace google::cloud::bigtable::v1
[+] AlwaysRetryMutationPolicy::is_idempotent ( google::bigtable::v2::Mutation
const& p1 ) 1
⇣
AlwaysRetryMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v125AlwaysRetryMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Parameters list has been Recompilation of a client program may be
changed. broken.
[+] IdempotentMutationPolicy::is_idempotent ( google::bigtable::v2::Mutation
const& p1 ) 1
⇣
IdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v124IdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Parameters list has been Recompilation of a client program may be
changed. broken.
[+] SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::Mutation const& m ) 1
⇣
SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v128SafeIdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Parameters list has been Recompilation of a client program may be
changed. broken.
to the top
Other Changes in Symbols 8
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
idempotent_mutation_policy.h
namespace google::cloud::bigtable::v1
[+] AlwaysRetryMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) 1
⇣
AlwaysRetryMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v125AlwaysRetryMutationPolicy13is_idempotentERKNS_8bigtable2v224CheckAndMutateRowRequestE
Change Effect
1 Method became const. No effect.
[+] AlwaysRetryMutationPolicy::is_idempotent ( google::bigtable::v2::Mutation
const& p1 ) 1
⇣
AlwaysRetryMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v125AlwaysRetryMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Method became const. No effect.
[+] IdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) 1
⇣
IdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v124IdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v224CheckAndMutateRowRequestE
Change Effect
1 Method became const. No effect.
[+] IdempotentMutationPolicy::is_idempotent ( google::bigtable::v2::Mutation
const& p1 ) 1
⇣
IdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v124IdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Method became const. No effect.
[+] SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) 1
⇣
SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v128SafeIdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v224CheckAndMutateRowRequestE
Change Effect
1 Method became const. No effect.
[+] SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::Mutation const& m ) 1
⇣
SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v128SafeIdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Method became const. No effect.
polling_policy.h
namespace google::cloud::bigtable::v1
[+] GenericPollingPolicy<LimitedTimeRetryPolicy,
ExponentialBackoffPolicy>::clone ( ) 1
⇣
GenericPollingPolicy<LimitedTimeRetryPolicy, ExponentialBackoffPolicy>::clone
( ) const
_ZN6google5cloud8bigtable2v120GenericPollingPolicyINS2_22LimitedTimeRetryPolicyENS2_24ExponentialBackoffPolicyEE5cloneEv
Change Effect
1 Method became const. No effect.
[+] PollingPolicy::clone ( ) 1
⇣
PollingPolicy::clone ( ) const
_ZN6google5cloud8bigtable2v113PollingPolicy5cloneEv
Change Effect
1 Method became const. No effect.
```
|
1.0
|
ABI/API checker doesn't match overloads properly - This build failed the ABI/API check, but it shouldn't have - the actual changes were adding `const` to a non-const method, which is always safe. It does this correctly in some cases, but the 3 at the top match one overload against another and claims the parameters change (which is a breaking change).
[log](https://source.cloud.google.com/results/invocations/87f5aa4a-1b34-4df5-9ad1-168d99ce08a1/targets/cloud-cpp%2Fgithub%2Fdocker%2Fcheck-abi-presubmit/log)
```
Problems with Symbols, Medium Severity 3
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
idempotent_mutation_policy.h
namespace google::cloud::bigtable::v1
[+] AlwaysRetryMutationPolicy::is_idempotent ( google::bigtable::v2::Mutation
const& p1 ) 1
⇣
AlwaysRetryMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v125AlwaysRetryMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Parameters list has been Recompilation of a client program may be
changed. broken.
[+] IdempotentMutationPolicy::is_idempotent ( google::bigtable::v2::Mutation
const& p1 ) 1
⇣
IdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v124IdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Parameters list has been Recompilation of a client program may be
changed. broken.
[+] SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::Mutation const& m ) 1
⇣
SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v128SafeIdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Parameters list has been Recompilation of a client program may be
changed. broken.
to the top
Other Changes in Symbols 8
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
idempotent_mutation_policy.h
namespace google::cloud::bigtable::v1
[+] AlwaysRetryMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) 1
⇣
AlwaysRetryMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v125AlwaysRetryMutationPolicy13is_idempotentERKNS_8bigtable2v224CheckAndMutateRowRequestE
Change Effect
1 Method became const. No effect.
[+] AlwaysRetryMutationPolicy::is_idempotent ( google::bigtable::v2::Mutation
const& p1 ) 1
⇣
AlwaysRetryMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v125AlwaysRetryMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Method became const. No effect.
[+] IdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) 1
⇣
IdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v124IdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v224CheckAndMutateRowRequestE
Change Effect
1 Method became const. No effect.
[+] IdempotentMutationPolicy::is_idempotent ( google::bigtable::v2::Mutation
const& p1 ) 1
⇣
IdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v124IdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Method became const. No effect.
[+] SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) 1
⇣
SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v128SafeIdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v224CheckAndMutateRowRequestE
Change Effect
1 Method became const. No effect.
[+] SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::Mutation const& m ) 1
⇣
SafeIdempotentMutationPolicy::is_idempotent
( google::bigtable::v2::CheckAndMutateRowRequest const& p1 ) const
_ZN6google5cloud8bigtable2v128SafeIdempotentMutationPolicy13is_idempotentERKNS_8bigtable2v28MutationE
Change Effect
1 Method became const. No effect.
polling_policy.h
namespace google::cloud::bigtable::v1
[+] GenericPollingPolicy<LimitedTimeRetryPolicy,
ExponentialBackoffPolicy>::clone ( ) 1
⇣
GenericPollingPolicy<LimitedTimeRetryPolicy, ExponentialBackoffPolicy>::clone
( ) const
_ZN6google5cloud8bigtable2v120GenericPollingPolicyINS2_22LimitedTimeRetryPolicyENS2_24ExponentialBackoffPolicyEE5cloneEv
Change Effect
1 Method became const. No effect.
[+] PollingPolicy::clone ( ) 1
⇣
PollingPolicy::clone ( ) const
_ZN6google5cloud8bigtable2v113PollingPolicy5cloneEv
Change Effect
1 Method became const. No effect.
```
|
process
|
abi api checker doesn t match overloads properly this build failed the abi api check but it shouldn t have the actual changes were adding const to a non const method which is always safe it does this correctly in some cases but the at the top match one overload against another and claims the parameters change which is a breaking change problems with symbols medium severity ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ idempotent mutation policy h namespace google cloud bigtable alwaysretrymutationpolicy is idempotent google bigtable mutation const ⇣ alwaysretrymutationpolicy is idempotent google bigtable checkandmutaterowrequest const const idempotenterkns change effect parameters list has been recompilation of a client program may be changed broken idempotentmutationpolicy is idempotent google bigtable mutation const ⇣ idempotentmutationpolicy is idempotent google bigtable checkandmutaterowrequest const const idempotenterkns change effect parameters list has been recompilation of a client program may be changed broken safeidempotentmutationpolicy is idempotent google bigtable mutation const m ⇣ safeidempotentmutationpolicy is idempotent google bigtable checkandmutaterowrequest const const idempotenterkns change effect parameters list has been recompilation of a client program may be changed broken to the top other changes in symbols ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ idempotent mutation policy h namespace google cloud bigtable alwaysretrymutationpolicy is idempotent google bigtable checkandmutaterowrequest const ⇣ alwaysretrymutationpolicy is idempotent google bigtable checkandmutaterowrequest const const idempotenterkns change effect method became const no effect alwaysretrymutationpolicy is idempotent google bigtable mutation const ⇣ alwaysretrymutationpolicy is idempotent google bigtable checkandmutaterowrequest const const idempotenterkns change effect method became const no effect idempotentmutationpolicy is idempotent google bigtable checkandmutaterowrequest const ⇣ idempotentmutationpolicy is idempotent google bigtable checkandmutaterowrequest const const idempotenterkns change effect method became const no effect idempotentmutationpolicy is idempotent google bigtable mutation const ⇣ idempotentmutationpolicy is idempotent google bigtable checkandmutaterowrequest const const idempotenterkns change effect method became const no effect safeidempotentmutationpolicy is idempotent google bigtable checkandmutaterowrequest const ⇣ safeidempotentmutationpolicy is idempotent google bigtable checkandmutaterowrequest const const idempotenterkns change effect method became const no effect safeidempotentmutationpolicy is idempotent google bigtable mutation const m ⇣ safeidempotentmutationpolicy is idempotent google bigtable checkandmutaterowrequest const const idempotenterkns change effect method became const no effect polling policy h namespace google cloud bigtable genericpollingpolicy limitedtimeretrypolicy exponentialbackoffpolicy clone ⇣ genericpollingpolicy clone const change effect method became const no effect pollingpolicy clone ⇣ pollingpolicy clone const change effect method became const no effect
| 1
|
11,585
| 14,445,283,453
|
IssuesEvent
|
2020-12-07 22:40:53
|
bisq-network/bisq
|
https://api.github.com/repos/bisq-network/bisq
|
closed
|
BHHZ34I - Cannot Accept Proposed Resolution due to Deposit TX ID = N/A
|
a:bug in:trade-process
|
<!--
SUPPORT REQUESTS: This is for reporting bugs in the Bisq app.
If you have a support request, please join #support on Bisq's
Keybase team at https://keybase.io/team/Bisq
-->
BHHZ34I - Cannot Accept Proposed Resolution due to Deposit TX ID = N/A
Leo816 is the mediator, and suggested a resolution due to both sides having issues with the trade. If I click on "View Proposed Resolution" button, I get a pop-up error that says "The deposit transaction is null. You can move the trade to failed trades." However, I have no option to move to failed trades because there is no red box with an arrow to the side of the trade (as i've seen before).
Attempted SPV reboot about 3 times now, and same result.
<!-- brief description of the bug -->
1.4.2
<!-- commit id or version number -->
### Steps to reproduce
<!--if you can reliably reproduce the bug, list the steps here -->
### Expected behaviour
<!--description of the expected behavior -->
### Actual behaviour
<!-- explain what happened instead of the expected behaviour -->
### Screenshots
<!--Screenshots if gui related, drag and drop to add to the issue -->
#### Device or machine
<!-- device/machine used, operating system -->
#### Additional info
<!-- Additional information useful for debugging (e.g. logs) -->
|
1.0
|
BHHZ34I - Cannot Accept Proposed Resolution due to Deposit TX ID = N/A - <!--
SUPPORT REQUESTS: This is for reporting bugs in the Bisq app.
If you have a support request, please join #support on Bisq's
Keybase team at https://keybase.io/team/Bisq
-->
BHHZ34I - Cannot Accept Proposed Resolution due to Deposit TX ID = N/A
Leo816 is the mediator, and suggested a resolution due to both sides having issues with the trade. If I click on "View Proposed Resolution" button, I get a pop-up error that says "The deposit transaction is null. You can move the trade to failed trades." However, I have no option to move to failed trades because there is no red box with an arrow to the side of the trade (as i've seen before).
Attempted SPV reboot about 3 times now, and same result.
<!-- brief description of the bug -->
1.4.2
<!-- commit id or version number -->
### Steps to reproduce
<!--if you can reliably reproduce the bug, list the steps here -->
### Expected behaviour
<!--description of the expected behavior -->
### Actual behaviour
<!-- explain what happened instead of the expected behaviour -->
### Screenshots
<!--Screenshots if gui related, drag and drop to add to the issue -->
#### Device or machine
<!-- device/machine used, operating system -->
#### Additional info
<!-- Additional information useful for debugging (e.g. logs) -->
|
process
|
cannot accept proposed resolution due to deposit tx id n a support requests this is for reporting bugs in the bisq app if you have a support request please join support on bisq s keybase team at cannot accept proposed resolution due to deposit tx id n a is the mediator and suggested a resolution due to both sides having issues with the trade if i click on view proposed resolution button i get a pop up error that says the deposit transaction is null you can move the trade to failed trades however i have no option to move to failed trades because there is no red box with an arrow to the side of the trade as i ve seen before attempted spv reboot about times now and same result steps to reproduce expected behaviour actual behaviour screenshots device or machine additional info
| 1
|
5,401
| 2,773,440,946
|
IssuesEvent
|
2015-05-03 16:50:00
|
medic/medic-webapp
|
https://api.github.com/repos/medic/medic-webapp
|
closed
|
Concierge: Force regeneration of couchdb-lucene indexes at startup, in addition to ordinary views
|
3 - Acceptance testing Feature Request Performance
|
The first load of the `Reports` view takes a long time if there's substantial data preloaded, as there is with the demo dataset. If there's an easy way to prime `/_fti` like we do the map/reduce views, we should take advantage of it.
|
1.0
|
Concierge: Force regeneration of couchdb-lucene indexes at startup, in addition to ordinary views - The first load of the `Reports` view takes a long time if there's substantial data preloaded, as there is with the demo dataset. If there's an easy way to prime `/_fti` like we do the map/reduce views, we should take advantage of it.
|
non_process
|
concierge force regeneration of couchdb lucene indexes at startup in addition to ordinary views the first load of the reports view takes a long time if there s substantial data preloaded as there is with the demo dataset if there s an easy way to prime fti like we do the map reduce views we should take advantage of it
| 0
|
22,191
| 30,746,170,326
|
IssuesEvent
|
2023-07-28 15:13:17
|
Kumar-laxmi/Algorithms
|
https://api.github.com/repos/Kumar-laxmi/Algorithms
|
closed
|
Implement Canny Edge Detection Algorithm for Image Processing
|
C C++ Python Java SSOC23 SSOC-INTERMEDIATE Image Processing
|
**Is your feature request related to a problem? Please describe.**
The Canny edge detection algorithm is a widely used technique for detecting edges in digital images, known for its effectiveness in accurately detecting edges while suppressing noise.
**Describe the solution you'd like**
I would like to implement the Canny edge detection algorithm in Python, following the standard steps involved:
1. **Noise Reduction:** Apply a Gaussian blur to reduce noise in the image.
2. **Gradient Calculation:** Compute the gradients using Sobel operators to determine the magnitude and direction of edges.
3. **Non-maximum Suppression:** Suppress non-maximum gradient values to thin out the edges.
4. **Double Thresholding:** Apply double thresholds to classify edges as strong, weak, or non-edges.
5. **Hysteresis:** Connect weak edges to strong edges using hysteresis to form continuous edge contours.
I would like to work on this issue and contribute to the project under SSOC'23. Please assign it to me @Kumar-laxmi
|
1.0
|
Implement Canny Edge Detection Algorithm for Image Processing - **Is your feature request related to a problem? Please describe.**
The Canny edge detection algorithm is a widely used technique for detecting edges in digital images, known for its effectiveness in accurately detecting edges while suppressing noise.
**Describe the solution you'd like**
I would like to implement the Canny edge detection algorithm in Python, following the standard steps involved:
1. **Noise Reduction:** Apply a Gaussian blur to reduce noise in the image.
2. **Gradient Calculation:** Compute the gradients using Sobel operators to determine the magnitude and direction of edges.
3. **Non-maximum Suppression:** Suppress non-maximum gradient values to thin out the edges.
4. **Double Thresholding:** Apply double thresholds to classify edges as strong, weak, or non-edges.
5. **Hysteresis:** Connect weak edges to strong edges using hysteresis to form continuous edge contours.
I would like to work on this issue and contribute to the project under SSOC'23. Please assign it to me @Kumar-laxmi
|
process
|
implement canny edge detection algorithm for image processing is your feature request related to a problem please describe the canny edge detection algorithm is a widely used technique for detecting edges in digital images known for its effectiveness in accurately detecting edges while suppressing noise describe the solution you d like i would like to implement the canny edge detection algorithm in python following the standard steps involved noise reduction apply a gaussian blur to reduce noise in the image gradient calculation compute the gradients using sobel operators to determine the magnitude and direction of edges non maximum suppression suppress non maximum gradient values to thin out the edges double thresholding apply double thresholds to classify edges as strong weak or non edges hysteresis connect weak edges to strong edges using hysteresis to form continuous edge contours i would like to work on this issue and contribute to the project under ssoc please assign it to me kumar laxmi
| 1
|
12,739
| 15,105,640,054
|
IssuesEvent
|
2021-02-08 13:19:23
|
pystatgen/sgkit
|
https://api.github.com/repos/pystatgen/sgkit
|
closed
|
Disable scheduled build/windows and validation CI on forks
|
process + tools
|
Right now some of our CI workflows are unnecessarily being run on the forks, this include:
* validation workflow
* scheduled build and windows
This is unnecessary (consumes resources etc), and can be confusing.
|
1.0
|
Disable scheduled build/windows and validation CI on forks - Right now some of our CI workflows are unnecessarily being run on the forks, this include:
* validation workflow
* scheduled build and windows
This is unnecessary (consumes resources etc), and can be confusing.
|
process
|
disable scheduled build windows and validation ci on forks right now some of our ci workflows are unnecessarily being run on the forks this include validation workflow scheduled build and windows this is unnecessary consumes resources etc and can be confusing
| 1
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.