Unnamed: 0
int64
3
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
7
112
repo_url
stringlengths
36
141
action
stringclasses
3 values
title
stringlengths
2
742
labels
stringlengths
4
431
body
stringlengths
5
239k
index
stringclasses
10 values
text_combine
stringlengths
96
240k
label
stringclasses
2 values
text
stringlengths
96
200k
binary_label
int64
0
1
317,395
27,235,328,142
IssuesEvent
2023-02-21 15:56:18
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
opened
roachtest: sysbench/oltp_update_index/nodes=3/cpu=32/conc=256 failed
C-test-failure O-robot O-roachtest branch-master release-blocker
roachtest.sysbench/oltp_update_index/nodes=3/cpu=32/conc=256 [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/8772032?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/8772032?buildTab=artifacts#/sysbench/oltp_update_index/nodes=3/cpu=32/conc=256) on master @ [dd2749ae4ab61eed2f99238acb74e8d3c6b4cb1d](https://github.com/cockroachdb/cockroach/commits/dd2749ae4ab61eed2f99238acb74e8d3c6b4cb1d): ``` test artifacts and logs in: /artifacts/sysbench/oltp_update_index/nodes=3/cpu=32/conc=256/run_1 (cluster.go:1956).Run: output in run_155040.686266349_n4_sysbench-dbdriverpgs: sysbench \ --db-driver=pgsql \ --pgsql-host={pghost:1} \ --pgsql-port=26257 \ --pgsql-user=root \ --pgsql-password= \ --pgsql-db=sysbench \ --report-interval=1 \ --time=600 \ --threads=256 \ --tables=10 \ --table_size=10000000 \ --auto_inc=false \ oltp_update_index prepare returned: context canceled (monitor.go:127).Wait: monitor failure: monitor command failure: unexpected node event: 3: dead (exit status 7) ``` <p>Parameters: <code>ROACHTEST_cloud=gce</code> , <code>ROACHTEST_cpu=32</code> , <code>ROACHTEST_encrypted=false</code> , <code>ROACHTEST_ssd=0</code> </p> <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/test-eng <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*sysbench/oltp_update_index/nodes=3/cpu=32/conc=256.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
2.0
roachtest: sysbench/oltp_update_index/nodes=3/cpu=32/conc=256 failed - roachtest.sysbench/oltp_update_index/nodes=3/cpu=32/conc=256 [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/8772032?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/8772032?buildTab=artifacts#/sysbench/oltp_update_index/nodes=3/cpu=32/conc=256) on master @ [dd2749ae4ab61eed2f99238acb74e8d3c6b4cb1d](https://github.com/cockroachdb/cockroach/commits/dd2749ae4ab61eed2f99238acb74e8d3c6b4cb1d): ``` test artifacts and logs in: /artifacts/sysbench/oltp_update_index/nodes=3/cpu=32/conc=256/run_1 (cluster.go:1956).Run: output in run_155040.686266349_n4_sysbench-dbdriverpgs: sysbench \ --db-driver=pgsql \ --pgsql-host={pghost:1} \ --pgsql-port=26257 \ --pgsql-user=root \ --pgsql-password= \ --pgsql-db=sysbench \ --report-interval=1 \ --time=600 \ --threads=256 \ --tables=10 \ --table_size=10000000 \ --auto_inc=false \ oltp_update_index prepare returned: context canceled (monitor.go:127).Wait: monitor failure: monitor command failure: unexpected node event: 3: dead (exit status 7) ``` <p>Parameters: <code>ROACHTEST_cloud=gce</code> , <code>ROACHTEST_cpu=32</code> , <code>ROACHTEST_encrypted=false</code> , <code>ROACHTEST_ssd=0</code> </p> <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/test-eng <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*sysbench/oltp_update_index/nodes=3/cpu=32/conc=256.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
non_usab
roachtest sysbench oltp update index nodes cpu conc failed roachtest sysbench oltp update index nodes cpu conc with on master test artifacts and logs in artifacts sysbench oltp update index nodes cpu conc run cluster go run output in run sysbench dbdriverpgs sysbench db driver pgsql pgsql host pghost pgsql port pgsql user root pgsql password pgsql db sysbench report interval time threads tables table size auto inc false oltp update index prepare returned context canceled monitor go wait monitor failure monitor command failure unexpected node event dead exit status parameters roachtest cloud gce roachtest cpu roachtest encrypted false roachtest ssd help see see cc cockroachdb test eng
0
49,322
12,322,344,638
IssuesEvent
2020-05-13 10:10:49
tensorflow/tensorflow
https://api.github.com/repos/tensorflow/tensorflow
opened
Error after running the program
type:build/install
I ran this program to check if Tensorflow is installed or not in jupyter notebook. And Got the following error. import tensorflow as tf hello = tf.constant('Hello, TensorFlow!') sess = tf.Session() print(sess.run(hello)) ERROR:root:Internal Python error in the inspect module. Below is the traceback from this internal error. Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\interactiveshell.py", line 3325, in run_code exec(code_obj, self.user_global_ns, self.user_ns) File "<ipython-input-8-25b92e4d5dec>", line 2, in <module> hello = tf.constant('Hello, TensorFlow!') AttributeError: module 'tensorflow' has no attribute 'constant' During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\interactiveshell.py", line 2039, in showtraceback stb = value._render_traceback_() AttributeError: 'AttributeError' object has no attribute '_render_traceback_' During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\pywrap_tensorflow.py", line 58, in <module> from tensorflow.python.pywrap_tensorflow_internal import * File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\pywrap_tensorflow_internal.py", line 2453, in <module> from tensorflow.python.util import deprecation File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\util\deprecation.py", line 25, in <module> from tensorflow.python.platform import tf_logging as logging ImportError: cannot import name 'tf_logging' from 'tensorflow.python.platform' (C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\python\platform\__init__.py) During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\ultratb.py", line 1101, in get_records return _fixed_getinnerframes(etb, number_of_lines_of_context, tb_offset) File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\ultratb.py", line 319, in wrapped return f(*args, **kwargs) File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\ultratb.py", line 353, in _fixed_getinnerframes records = fix_frame_records_filenames(inspect.getinnerframes(etb, context)) File "C:\Users\Vishal\Anaconda3\New\lib\inspect.py", line 1502, in getinnerframes frameinfo = (tb.tb_frame,) + getframeinfo(tb, context) File "C:\Users\Vishal\Anaconda3\New\lib\inspect.py", line 1460, in getframeinfo filename = getsourcefile(frame) or getfile(frame) File "C:\Users\Vishal\Anaconda3\New\lib\inspect.py", line 696, in getsourcefile if getattr(getmodule(object, filename), '__loader__', None) is not None: File "C:\Users\Vishal\Anaconda3\New\lib\inspect.py", line 733, in getmodule if ismodule(module) and hasattr(module, '__file__'): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\__init__.py", line 50, in __getattr__ module = self._load() File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\__init__.py", line 44, in _load module = _importlib.import_module(self.__name__) File "C:\Users\Vishal\Anaconda3\New\lib\importlib\__init__.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "<frozen importlib._bootstrap>", line 1006, in _gcd_import File "<frozen importlib._bootstrap>", line 983, in _find_and_load File "<frozen importlib._bootstrap>", line 953, in _find_and_load_unlocked File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed File "<frozen importlib._bootstrap>", line 1006, in _gcd_import File "<frozen importlib._bootstrap>", line 983, in _find_and_load File "<frozen importlib._bootstrap>", line 967, in _find_and_load_unlocked File "<frozen importlib._bootstrap>", line 677, in _load_unlocked File "<frozen importlib._bootstrap_external>", line 728, in exec_module File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\__init__.py", line 42, in <module> from . _api.v2 import audio File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\_api\v2\audio\__init__.py", line 10, in <module> from tensorflow.python.ops.gen_audio_ops import decode_wav File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\ops\gen_audio_ops.py", line 9, in <module> from tensorflow.python import pywrap_tensorflow as _pywrap_tensorflow File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\__init__.py", line 50, in __getattr__ module = self._load() File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\__init__.py", line 44, in _load module = _importlib.import_module(self.__name__) File "C:\Users\Vishal\Anaconda3\New\lib\importlib\__init__.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\__init__.py", line 49, in <module> from tensorflow.python import pywrap_tensorflow File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\pywrap_tensorflow.py", line 74, in <module> raise ImportError(msg) ImportError: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\interactiveshell.py", line 3325, in run_code exec(code_obj, self.user_global_ns, self.user_ns) File "<ipython-input-8-25b92e4d5dec>", line 2, in <module> hello = tf.constant('Hello, TensorFlow!') AttributeError: module 'tensorflow' has no attribute 'constant' During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\interactiveshell.py", line 2039, in showtraceback stb = value._render_traceback_() AttributeError: 'AttributeError' object has no attribute '_render_traceback_' During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\pywrap_tensorflow.py", line 58, in <module> from tensorflow.python.pywrap_tensorflow_internal import * File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\pywrap_tensorflow_internal.py", line 2453, in <module> from tensorflow.python.util import deprecation File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\util\deprecation.py", line 25, in <module> from tensorflow.python.platform import tf_logging as logging ImportError: cannot import name 'tf_logging' from 'tensorflow.python.platform' (C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\python\platform\__init__.py) Failed to load the native TensorFlow runtime.
1.0
Error after running the program - I ran this program to check if Tensorflow is installed or not in jupyter notebook. And Got the following error. import tensorflow as tf hello = tf.constant('Hello, TensorFlow!') sess = tf.Session() print(sess.run(hello)) ERROR:root:Internal Python error in the inspect module. Below is the traceback from this internal error. Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\interactiveshell.py", line 3325, in run_code exec(code_obj, self.user_global_ns, self.user_ns) File "<ipython-input-8-25b92e4d5dec>", line 2, in <module> hello = tf.constant('Hello, TensorFlow!') AttributeError: module 'tensorflow' has no attribute 'constant' During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\interactiveshell.py", line 2039, in showtraceback stb = value._render_traceback_() AttributeError: 'AttributeError' object has no attribute '_render_traceback_' During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\pywrap_tensorflow.py", line 58, in <module> from tensorflow.python.pywrap_tensorflow_internal import * File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\pywrap_tensorflow_internal.py", line 2453, in <module> from tensorflow.python.util import deprecation File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\util\deprecation.py", line 25, in <module> from tensorflow.python.platform import tf_logging as logging ImportError: cannot import name 'tf_logging' from 'tensorflow.python.platform' (C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\python\platform\__init__.py) During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\ultratb.py", line 1101, in get_records return _fixed_getinnerframes(etb, number_of_lines_of_context, tb_offset) File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\ultratb.py", line 319, in wrapped return f(*args, **kwargs) File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\ultratb.py", line 353, in _fixed_getinnerframes records = fix_frame_records_filenames(inspect.getinnerframes(etb, context)) File "C:\Users\Vishal\Anaconda3\New\lib\inspect.py", line 1502, in getinnerframes frameinfo = (tb.tb_frame,) + getframeinfo(tb, context) File "C:\Users\Vishal\Anaconda3\New\lib\inspect.py", line 1460, in getframeinfo filename = getsourcefile(frame) or getfile(frame) File "C:\Users\Vishal\Anaconda3\New\lib\inspect.py", line 696, in getsourcefile if getattr(getmodule(object, filename), '__loader__', None) is not None: File "C:\Users\Vishal\Anaconda3\New\lib\inspect.py", line 733, in getmodule if ismodule(module) and hasattr(module, '__file__'): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\__init__.py", line 50, in __getattr__ module = self._load() File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\__init__.py", line 44, in _load module = _importlib.import_module(self.__name__) File "C:\Users\Vishal\Anaconda3\New\lib\importlib\__init__.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "<frozen importlib._bootstrap>", line 1006, in _gcd_import File "<frozen importlib._bootstrap>", line 983, in _find_and_load File "<frozen importlib._bootstrap>", line 953, in _find_and_load_unlocked File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed File "<frozen importlib._bootstrap>", line 1006, in _gcd_import File "<frozen importlib._bootstrap>", line 983, in _find_and_load File "<frozen importlib._bootstrap>", line 967, in _find_and_load_unlocked File "<frozen importlib._bootstrap>", line 677, in _load_unlocked File "<frozen importlib._bootstrap_external>", line 728, in exec_module File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\__init__.py", line 42, in <module> from . _api.v2 import audio File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\_api\v2\audio\__init__.py", line 10, in <module> from tensorflow.python.ops.gen_audio_ops import decode_wav File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\ops\gen_audio_ops.py", line 9, in <module> from tensorflow.python import pywrap_tensorflow as _pywrap_tensorflow File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\__init__.py", line 50, in __getattr__ module = self._load() File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\__init__.py", line 44, in _load module = _importlib.import_module(self.__name__) File "C:\Users\Vishal\Anaconda3\New\lib\importlib\__init__.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\__init__.py", line 49, in <module> from tensorflow.python import pywrap_tensorflow File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\pywrap_tensorflow.py", line 74, in <module> raise ImportError(msg) ImportError: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\interactiveshell.py", line 3325, in run_code exec(code_obj, self.user_global_ns, self.user_ns) File "<ipython-input-8-25b92e4d5dec>", line 2, in <module> hello = tf.constant('Hello, TensorFlow!') AttributeError: module 'tensorflow' has no attribute 'constant' During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\IPython\core\interactiveshell.py", line 2039, in showtraceback stb = value._render_traceback_() AttributeError: 'AttributeError' object has no attribute '_render_traceback_' During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\pywrap_tensorflow.py", line 58, in <module> from tensorflow.python.pywrap_tensorflow_internal import * File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\pywrap_tensorflow_internal.py", line 2453, in <module> from tensorflow.python.util import deprecation File "C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow_core\python\util\deprecation.py", line 25, in <module> from tensorflow.python.platform import tf_logging as logging ImportError: cannot import name 'tf_logging' from 'tensorflow.python.platform' (C:\Users\Vishal\Anaconda3\New\lib\site-packages\tensorflow\python\platform\__init__.py) Failed to load the native TensorFlow runtime.
non_usab
error after running the program i ran this program to check if tensorflow is installed or not in jupyter notebook and got the following error import tensorflow as tf hello tf constant hello tensorflow sess tf session print sess run hello error root internal python error in the inspect module below is the traceback from this internal error traceback most recent call last file c users vishal new lib site packages ipython core interactiveshell py line in run code exec code obj self user global ns self user ns file line in hello tf constant hello tensorflow attributeerror module tensorflow has no attribute constant during handling of the above exception another exception occurred traceback most recent call last file c users vishal new lib site packages ipython core interactiveshell py line in showtraceback stb value render traceback attributeerror attributeerror object has no attribute render traceback during handling of the above exception another exception occurred traceback most recent call last file c users vishal new lib site packages tensorflow core python pywrap tensorflow py line in from tensorflow python pywrap tensorflow internal import file c users vishal new lib site packages tensorflow core python pywrap tensorflow internal py line in from tensorflow python util import deprecation file c users vishal new lib site packages tensorflow core python util deprecation py line in from tensorflow python platform import tf logging as logging importerror cannot import name tf logging from tensorflow python platform c users vishal new lib site packages tensorflow python platform init py during handling of the above exception another exception occurred traceback most recent call last file c users vishal new lib site packages ipython core ultratb py line in get records return fixed getinnerframes etb number of lines of context tb offset file c users vishal new lib site packages ipython core ultratb py line in wrapped return f args kwargs file c users vishal new lib site packages ipython core ultratb py line in fixed getinnerframes records fix frame records filenames inspect getinnerframes etb context file c users vishal new lib inspect py line in getinnerframes frameinfo tb tb frame getframeinfo tb context file c users vishal new lib inspect py line in getframeinfo filename getsourcefile frame or getfile frame file c users vishal new lib inspect py line in getsourcefile if getattr getmodule object filename loader none is not none file c users vishal new lib inspect py line in getmodule if ismodule module and hasattr module file file c users vishal new lib site packages tensorflow init py line in getattr module self load file c users vishal new lib site packages tensorflow init py line in load module importlib import module self name file c users vishal new lib importlib init py line in import module return bootstrap gcd import name package level file line in gcd import file line in find and load file line in find and load unlocked file line in call with frames removed file line in gcd import file line in find and load file line in find and load unlocked file line in load unlocked file line in exec module file line in call with frames removed file c users vishal new lib site packages tensorflow core init py line in from api import audio file c users vishal new lib site packages tensorflow core api audio init py line in from tensorflow python ops gen audio ops import decode wav file c users vishal new lib site packages tensorflow core python ops gen audio ops py line in from tensorflow python import pywrap tensorflow as pywrap tensorflow file c users vishal new lib site packages tensorflow init py line in getattr module self load file c users vishal new lib site packages tensorflow init py line in load module importlib import module self name file c users vishal new lib importlib init py line in import module return bootstrap gcd import name package level file c users vishal new lib site packages tensorflow core python init py line in from tensorflow python import pywrap tensorflow file c users vishal new lib site packages tensorflow core python pywrap tensorflow py line in raise importerror msg importerror traceback most recent call last file c users vishal new lib site packages ipython core interactiveshell py line in run code exec code obj self user global ns self user ns file line in hello tf constant hello tensorflow attributeerror module tensorflow has no attribute constant during handling of the above exception another exception occurred traceback most recent call last file c users vishal new lib site packages ipython core interactiveshell py line in showtraceback stb value render traceback attributeerror attributeerror object has no attribute render traceback during handling of the above exception another exception occurred traceback most recent call last file c users vishal new lib site packages tensorflow core python pywrap tensorflow py line in from tensorflow python pywrap tensorflow internal import file c users vishal new lib site packages tensorflow core python pywrap tensorflow internal py line in from tensorflow python util import deprecation file c users vishal new lib site packages tensorflow core python util deprecation py line in from tensorflow python platform import tf logging as logging importerror cannot import name tf logging from tensorflow python platform c users vishal new lib site packages tensorflow python platform init py failed to load the native tensorflow runtime
0
362,795
25,390,386,278
IssuesEvent
2022-11-22 03:08:20
dadosfera/Bugsfera
https://api.github.com/repos/dadosfera/Bugsfera
opened
Unable to process data from google sheets when the spreadsheet has been created using MS Excel and other tools
moderate Documentation
## Mandatory information: ##### There are customers are directly impacted by this bug. Which? ------------------------------------------- #### Bug Category - [ ] Connection Manager - [ ] Connection Test - [ ] Creating Pipeline - [x] Executing Pipeline - [ ] Cataloging Data Asset - [ ] Other #### Connector - Singer #### Plugin - Google Sheets ##### Describe the bug While executing a pipeline with plugin `google-sheets`, the following error is raised: ```shell HTTP-error-code: 400 {'code': 400, 'message': 'This operation is not supported for this document', 'status': 'FAILED_PRECONDITION'}: Unknown Error Traceback (most recent call last): File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/client.py", line 111, in raise_for_error response.raise_for_status() File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/requests/models.py", line 940, in raise_for_status raise HTTPError(http_error_msg, response=self) requests.exceptions.HTTPError: 400 Client Error: Bad Request for url: https://sheets.googleapis.com/v4/spreadsheets/191O9Y_SANs1fRpC_QKFCf2I8j-11LR39?includeGridData=false&includeGridData=false During handling of the above exception, another exception occurred: Traceback (most recent call last): File ".meltano/extractors/tap-google-sheets/venv/bin/tap-google-sheets", line 8, in <module> sys.exit(main()) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/singer/utils.py", line 229, in wrapped return fnc(*args, **kwargs) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/__init__.py", line 51, in main do_discover(client, spreadsheet_id) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/__init__.py", line 26, in do_discover catalog = discover(client, spreadsheet_id) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/discover.py", line 6, in discover schemas, field_metadata = get_schemas(client, spreadsheet_id) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/schema.py", line 307, in get_schemas endpoint=stream_name) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/client.py", line 265, in get return self.request(method='GET', path=path, api=api, **kwargs) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/backoff/_sync.py", line 94, in retry ret = target(*args, **kwargs) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/backoff/_sync.py", line 94, in retry ret = target(*args, **kwargs) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/singer/utils.py", line 95, in wrapper return func(*args, **kwargs) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/client.py", line 259, in request raise_for_error(response) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/client.py", line 128, in raise_for_error raise ex(message) tap_google_sheets.client.GoogleBadRequestError: HTTP-error-code: 400 {'code': 400, 'message': 'This operation is not supported for this document', 'status': 'FAILED_PRECONDITION'}: Unknown Error ``` #### To Reproduce Steps to reproduce the behavior: 1. Create a spreadsheet using MS Excel or a similar tool 2. Upload this spreadsheet to Google Sheets 3. Create a pipeline using the spreadsheet that you upload as a source 4. Executes the pipeline This is a limitation of the Google Sheets API. Therefore, we should try to document this issue for the users, so they can convert their spreadsheet into a google spreadsheet before creating a pipeline. #### How to detect if a spreadsheet was created by MS Excel When a spreadsheet is created in MS Excel, it has the extension `xlsx` as you can see in the image below: ![image](https://user-images.githubusercontent.com/40280691/203210948-e776b4df-ace6-416c-aeeb-d1041b6a30ca.png) #### How to convert a MS Excel Spreadsheet into a Google Spreadsheet: 1. Click on the menu `File` 2. Save as Google SpreadSheet #### Dadosfera Customer: ------------------------------------------- - dadosfera What environment of software are you using? - [x] PRD - [ ] Other
1.0
Unable to process data from google sheets when the spreadsheet has been created using MS Excel and other tools - ## Mandatory information: ##### There are customers are directly impacted by this bug. Which? ------------------------------------------- #### Bug Category - [ ] Connection Manager - [ ] Connection Test - [ ] Creating Pipeline - [x] Executing Pipeline - [ ] Cataloging Data Asset - [ ] Other #### Connector - Singer #### Plugin - Google Sheets ##### Describe the bug While executing a pipeline with plugin `google-sheets`, the following error is raised: ```shell HTTP-error-code: 400 {'code': 400, 'message': 'This operation is not supported for this document', 'status': 'FAILED_PRECONDITION'}: Unknown Error Traceback (most recent call last): File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/client.py", line 111, in raise_for_error response.raise_for_status() File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/requests/models.py", line 940, in raise_for_status raise HTTPError(http_error_msg, response=self) requests.exceptions.HTTPError: 400 Client Error: Bad Request for url: https://sheets.googleapis.com/v4/spreadsheets/191O9Y_SANs1fRpC_QKFCf2I8j-11LR39?includeGridData=false&includeGridData=false During handling of the above exception, another exception occurred: Traceback (most recent call last): File ".meltano/extractors/tap-google-sheets/venv/bin/tap-google-sheets", line 8, in <module> sys.exit(main()) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/singer/utils.py", line 229, in wrapped return fnc(*args, **kwargs) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/__init__.py", line 51, in main do_discover(client, spreadsheet_id) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/__init__.py", line 26, in do_discover catalog = discover(client, spreadsheet_id) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/discover.py", line 6, in discover schemas, field_metadata = get_schemas(client, spreadsheet_id) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/schema.py", line 307, in get_schemas endpoint=stream_name) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/client.py", line 265, in get return self.request(method='GET', path=path, api=api, **kwargs) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/backoff/_sync.py", line 94, in retry ret = target(*args, **kwargs) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/backoff/_sync.py", line 94, in retry ret = target(*args, **kwargs) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/singer/utils.py", line 95, in wrapper return func(*args, **kwargs) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/client.py", line 259, in request raise_for_error(response) File "/app/.meltano/extractors/tap-google-sheets/venv/lib/python3.7/site-packages/tap_google_sheets/client.py", line 128, in raise_for_error raise ex(message) tap_google_sheets.client.GoogleBadRequestError: HTTP-error-code: 400 {'code': 400, 'message': 'This operation is not supported for this document', 'status': 'FAILED_PRECONDITION'}: Unknown Error ``` #### To Reproduce Steps to reproduce the behavior: 1. Create a spreadsheet using MS Excel or a similar tool 2. Upload this spreadsheet to Google Sheets 3. Create a pipeline using the spreadsheet that you upload as a source 4. Executes the pipeline This is a limitation of the Google Sheets API. Therefore, we should try to document this issue for the users, so they can convert their spreadsheet into a google spreadsheet before creating a pipeline. #### How to detect if a spreadsheet was created by MS Excel When a spreadsheet is created in MS Excel, it has the extension `xlsx` as you can see in the image below: ![image](https://user-images.githubusercontent.com/40280691/203210948-e776b4df-ace6-416c-aeeb-d1041b6a30ca.png) #### How to convert a MS Excel Spreadsheet into a Google Spreadsheet: 1. Click on the menu `File` 2. Save as Google SpreadSheet #### Dadosfera Customer: ------------------------------------------- - dadosfera What environment of software are you using? - [x] PRD - [ ] Other
non_usab
unable to process data from google sheets when the spreadsheet has been created using ms excel and other tools mandatory information there are customers are directly impacted by this bug which bug category connection manager connection test creating pipeline executing pipeline cataloging data asset other connector singer plugin google sheets describe the bug while executing a pipeline with plugin google sheets the following error is raised shell http error code code message this operation is not supported for this document status failed precondition unknown error traceback most recent call last file app meltano extractors tap google sheets venv lib site packages tap google sheets client py line in raise for error response raise for status file app meltano extractors tap google sheets venv lib site packages requests models py line in raise for status raise httperror http error msg response self requests exceptions httperror client error bad request for url during handling of the above exception another exception occurred traceback most recent call last file meltano extractors tap google sheets venv bin tap google sheets line in sys exit main file app meltano extractors tap google sheets venv lib site packages singer utils py line in wrapped return fnc args kwargs file app meltano extractors tap google sheets venv lib site packages tap google sheets init py line in main do discover client spreadsheet id file app meltano extractors tap google sheets venv lib site packages tap google sheets init py line in do discover catalog discover client spreadsheet id file app meltano extractors tap google sheets venv lib site packages tap google sheets discover py line in discover schemas field metadata get schemas client spreadsheet id file app meltano extractors tap google sheets venv lib site packages tap google sheets schema py line in get schemas endpoint stream name file app meltano extractors tap google sheets venv lib site packages tap google sheets client py line in get return self request method get path path api api kwargs file app meltano extractors tap google sheets venv lib site packages backoff sync py line in retry ret target args kwargs file app meltano extractors tap google sheets venv lib site packages backoff sync py line in retry ret target args kwargs file app meltano extractors tap google sheets venv lib site packages singer utils py line in wrapper return func args kwargs file app meltano extractors tap google sheets venv lib site packages tap google sheets client py line in request raise for error response file app meltano extractors tap google sheets venv lib site packages tap google sheets client py line in raise for error raise ex message tap google sheets client googlebadrequesterror http error code code message this operation is not supported for this document status failed precondition unknown error to reproduce steps to reproduce the behavior create a spreadsheet using ms excel or a similar tool upload this spreadsheet to google sheets create a pipeline using the spreadsheet that you upload as a source executes the pipeline this is a limitation of the google sheets api therefore we should try to document this issue for the users so they can convert their spreadsheet into a google spreadsheet before creating a pipeline how to detect if a spreadsheet was created by ms excel when a spreadsheet is created in ms excel it has the extension xlsx as you can see in the image below how to convert a ms excel spreadsheet into a google spreadsheet click on the menu file save as google spreadsheet dadosfera customer dadosfera what environment of software are you using prd other
0
9,907
6,510,349,898
IssuesEvent
2017-08-25 02:41:32
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Sometimes resource thumbnails are shown in inspector, sometimes not
bug topic:editor usability
Godot 3.0 alpha1 official Windows 10 64 bits I noticed that I have no preview of the resources being in use here, I see there names now: ![image](https://user-images.githubusercontent.com/1311555/28648625-61b0846c-726f-11e7-8c12-329913f40703.png) On the other hand, if I click on another MeshInstance in the same scene, I see thumbnails: ![image](https://user-images.githubusercontent.com/1311555/28648641-87f2cb44-726f-11e7-8a73-b87bdee3735b.png) I used to see thumbnails in the first one a bit earlier in the same session, in which materials where black balls instead of brown. Not sure what caused them to disappear. #9891 did occur earlier in the session, but I realize that now I can click on meshes without it happening, so maybe it's related? Edit: I closed another unsaved scene, and now I can see thumbnails again in the first MeshInstance, and material thumbnails are back to brown color: ![image](https://user-images.githubusercontent.com/1311555/28648765-5effa3c8-7270-11e7-9983-dc810031a017.png)
True
Sometimes resource thumbnails are shown in inspector, sometimes not - Godot 3.0 alpha1 official Windows 10 64 bits I noticed that I have no preview of the resources being in use here, I see there names now: ![image](https://user-images.githubusercontent.com/1311555/28648625-61b0846c-726f-11e7-8c12-329913f40703.png) On the other hand, if I click on another MeshInstance in the same scene, I see thumbnails: ![image](https://user-images.githubusercontent.com/1311555/28648641-87f2cb44-726f-11e7-8a73-b87bdee3735b.png) I used to see thumbnails in the first one a bit earlier in the same session, in which materials where black balls instead of brown. Not sure what caused them to disappear. #9891 did occur earlier in the session, but I realize that now I can click on meshes without it happening, so maybe it's related? Edit: I closed another unsaved scene, and now I can see thumbnails again in the first MeshInstance, and material thumbnails are back to brown color: ![image](https://user-images.githubusercontent.com/1311555/28648765-5effa3c8-7270-11e7-9983-dc810031a017.png)
usab
sometimes resource thumbnails are shown in inspector sometimes not godot official windows bits i noticed that i have no preview of the resources being in use here i see there names now on the other hand if i click on another meshinstance in the same scene i see thumbnails i used to see thumbnails in the first one a bit earlier in the same session in which materials where black balls instead of brown not sure what caused them to disappear did occur earlier in the session but i realize that now i can click on meshes without it happening so maybe it s related edit i closed another unsaved scene and now i can see thumbnails again in the first meshinstance and material thumbnails are back to brown color
1
291,920
21,944,202,288
IssuesEvent
2022-05-23 21:41:39
interactions-py/library
https://api.github.com/repos/interactions-py/library
closed
[REQUEST] Implement clone channel method
documentation enhancement
### Describe the feature. It'd be very neat to have a way to automatically clone channels in a guild. I will create a PR that adds this feature as soon as this issue is public. ### Code of Conduct - [X] I agree to follow the contribution requirements.
1.0
[REQUEST] Implement clone channel method - ### Describe the feature. It'd be very neat to have a way to automatically clone channels in a guild. I will create a PR that adds this feature as soon as this issue is public. ### Code of Conduct - [X] I agree to follow the contribution requirements.
non_usab
implement clone channel method describe the feature it d be very neat to have a way to automatically clone channels in a guild i will create a pr that adds this feature as soon as this issue is public code of conduct i agree to follow the contribution requirements
0
78,151
7,622,029,228
IssuesEvent
2018-05-03 10:37:27
tomato42/tlsfuzzer
https://api.github.com/repos/tomato42/tlsfuzzer
opened
TLS 1.3 and OpenPGP
help wanted new test script
- Verify that server will not try to use OpenPGP with TLS 1.3 - Verify that server will reject client Certificate if it includes OpenPGP certificate
1.0
TLS 1.3 and OpenPGP - - Verify that server will not try to use OpenPGP with TLS 1.3 - Verify that server will reject client Certificate if it includes OpenPGP certificate
non_usab
tls and openpgp verify that server will not try to use openpgp with tls verify that server will reject client certificate if it includes openpgp certificate
0
516,426
14,982,008,643
IssuesEvent
2021-01-28 15:29:57
kubernetes/release
https://api.github.com/repos/kubernetes/release
closed
Error importing kube-poroxy.tar for ARM64 with containerd
area/release-eng kind/bug needs-priority sig/release
<!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks! If the matter is security related, please disclose it privately via https://kubernetes.io/security/ --> #### What happened: Since switching the kOps for ARM64 periodic tests to containerd container runtime, they are failing, not being able to create the cluster: https://testgrid.k8s.io/kops-misc#kops-aws-arm64-conformance [kOps logs](https://storage.googleapis.com/kubernetes-jenkins/logs/e2e-kops-aws-misc-arm64-conformance/1349280720744353792/artifacts/ip-172-20-36-171.eu-west-1.compute.internal/kops-configuration.log) from these tests show that there are issues importing the `kube-proxy.image` image: ``` I0113 09:16:05.009436 8756 load_image.go:159] running command ctr --namespace k8s.io images import /var/cache/nodeup/sha256:1c7dc3f79c105657b765092b69b55d14ad530fe3db7d95cd664191f10bd60816_https___storage_googleapis_com_kubernetes-release_release_v1_20_1_bin_linux_arm64_kube-proxy_tar W0113 09:16:06.571666 8756 executor.go:131] error running task "LoadImage.0" (9m58s remaining to succeed): error loading docker image with 'ctr --namespace k8s.io images import /var/cache/nodeup/sha256:1c7dc3f79c105657b765092b69b55d14ad530fe3db7d95cd664191f10bd60816_https___storage_googleapis_com_kubernetes-release_release_v1_20_1_bin_linux_arm64_kube-proxy_tar': exit status 1: unpacking k8s.gcr.io/kube-proxy-arm64:v1.20.1 (sha256:6f6f747fa89f88a076fa6534946e392f0629a4c55f2f7413d855281d3af90e50)... ctr: content digest sha256:e969937ccd0f155a9cc6e79c3d433679fb85853a3adbe6280dbba18a11202a2d: not found ``` containerd logs show similar thing: ``` time="2021-01-13T09:09:14.057352011Z" level=error msg="CreateContainer within sandbox \"e87c5d542ae2bb38266df4c4a65351a7a6b63c08b961fdb828bc979aba3e5ba1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} failed" error="rpc error: code = NotFound desc = failed to create containerd container: error unpacking image: failed to resolve rootfs: content digest sha256:9dee21b6b85b275630ede8fe219f62d68388c32a0fba11c05f2cff4fa38adfb6: not found" ``` Extracting the contents of the [kube-proxy.tar](https://storage.googleapis.com/kubernetes-release/release/v1.20.1/bin/linux/arm64/kube-proxy.tar) file can be noticed that the configuration JSON contains has the architecture set to "amd64": ```bash $ cat 9dee21b6b85b275630ede8fe219f62d68388c32a0fba11c05f2cff4fa38adfb6.json | json_pp { "architecture" : "amd64", ... ``` #### How to reproduce it (as minimally and precisely as possible): 1. Start an instance with Ubuntu 20.04 and ARM64 CPU in AWS 2. Install containerd 1.4.3 from https://download.docker.com/linux/ubuntu/dists/focal/pool/stable/arm64/ 3. Download https://storage.googleapis.com/kubernetes-release/release/v1.20.1/bin/linux/arm64/kube-proxy.tar 4. Try to import the image: `sudo ctr images import kube-proxy.tar` #### Anything else we need to know?: Issue was opened here because the problem seems to come from the `debian-iptables` image used as a base for `kube-proxy`. Changing the architecture to "arm64" inside the config JSON makes the import succeed. #### Environment: - Cloud provider or hardware configuration: AWS with m6g.large instance type - OS (e.g: `cat /etc/os-release`): Ubuntu 20.04 Focal ARM64 - Kernel (e.g. `uname -a`): n/a - Others:
1.0
Error importing kube-poroxy.tar for ARM64 with containerd - <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks! If the matter is security related, please disclose it privately via https://kubernetes.io/security/ --> #### What happened: Since switching the kOps for ARM64 periodic tests to containerd container runtime, they are failing, not being able to create the cluster: https://testgrid.k8s.io/kops-misc#kops-aws-arm64-conformance [kOps logs](https://storage.googleapis.com/kubernetes-jenkins/logs/e2e-kops-aws-misc-arm64-conformance/1349280720744353792/artifacts/ip-172-20-36-171.eu-west-1.compute.internal/kops-configuration.log) from these tests show that there are issues importing the `kube-proxy.image` image: ``` I0113 09:16:05.009436 8756 load_image.go:159] running command ctr --namespace k8s.io images import /var/cache/nodeup/sha256:1c7dc3f79c105657b765092b69b55d14ad530fe3db7d95cd664191f10bd60816_https___storage_googleapis_com_kubernetes-release_release_v1_20_1_bin_linux_arm64_kube-proxy_tar W0113 09:16:06.571666 8756 executor.go:131] error running task "LoadImage.0" (9m58s remaining to succeed): error loading docker image with 'ctr --namespace k8s.io images import /var/cache/nodeup/sha256:1c7dc3f79c105657b765092b69b55d14ad530fe3db7d95cd664191f10bd60816_https___storage_googleapis_com_kubernetes-release_release_v1_20_1_bin_linux_arm64_kube-proxy_tar': exit status 1: unpacking k8s.gcr.io/kube-proxy-arm64:v1.20.1 (sha256:6f6f747fa89f88a076fa6534946e392f0629a4c55f2f7413d855281d3af90e50)... ctr: content digest sha256:e969937ccd0f155a9cc6e79c3d433679fb85853a3adbe6280dbba18a11202a2d: not found ``` containerd logs show similar thing: ``` time="2021-01-13T09:09:14.057352011Z" level=error msg="CreateContainer within sandbox \"e87c5d542ae2bb38266df4c4a65351a7a6b63c08b961fdb828bc979aba3e5ba1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} failed" error="rpc error: code = NotFound desc = failed to create containerd container: error unpacking image: failed to resolve rootfs: content digest sha256:9dee21b6b85b275630ede8fe219f62d68388c32a0fba11c05f2cff4fa38adfb6: not found" ``` Extracting the contents of the [kube-proxy.tar](https://storage.googleapis.com/kubernetes-release/release/v1.20.1/bin/linux/arm64/kube-proxy.tar) file can be noticed that the configuration JSON contains has the architecture set to "amd64": ```bash $ cat 9dee21b6b85b275630ede8fe219f62d68388c32a0fba11c05f2cff4fa38adfb6.json | json_pp { "architecture" : "amd64", ... ``` #### How to reproduce it (as minimally and precisely as possible): 1. Start an instance with Ubuntu 20.04 and ARM64 CPU in AWS 2. Install containerd 1.4.3 from https://download.docker.com/linux/ubuntu/dists/focal/pool/stable/arm64/ 3. Download https://storage.googleapis.com/kubernetes-release/release/v1.20.1/bin/linux/arm64/kube-proxy.tar 4. Try to import the image: `sudo ctr images import kube-proxy.tar` #### Anything else we need to know?: Issue was opened here because the problem seems to come from the `debian-iptables` image used as a base for `kube-proxy`. Changing the architecture to "arm64" inside the config JSON makes the import succeed. #### Environment: - Cloud provider or hardware configuration: AWS with m6g.large instance type - OS (e.g: `cat /etc/os-release`): Ubuntu 20.04 Focal ARM64 - Kernel (e.g. `uname -a`): n/a - Others:
non_usab
error importing kube poroxy tar for with containerd please use this template while reporting a bug and provide as much info as possible not doing so may result in your bug not being addressed in a timely manner thanks if the matter is security related please disclose it privately via what happened since switching the kops for periodic tests to containerd container runtime they are failing not being able to create the cluster from these tests show that there are issues importing the kube proxy image image load image go running command ctr namespace io images import var cache nodeup https storage googleapis com kubernetes release release bin linux kube proxy tar executor go error running task loadimage remaining to succeed error loading docker image with ctr namespace io images import var cache nodeup https storage googleapis com kubernetes release release bin linux kube proxy tar exit status unpacking gcr io kube proxy ctr content digest not found containerd logs show similar thing time level error msg createcontainer within sandbox for containermetadata name kube proxy attempt failed error rpc error code notfound desc failed to create containerd container error unpacking image failed to resolve rootfs content digest not found extracting the contents of the file can be noticed that the configuration json contains has the architecture set to bash cat json json pp architecture how to reproduce it as minimally and precisely as possible start an instance with ubuntu and cpu in aws install containerd from download try to import the image sudo ctr images import kube proxy tar anything else we need to know issue was opened here because the problem seems to come from the debian iptables image used as a base for kube proxy changing the architecture to inside the config json makes the import succeed environment cloud provider or hardware configuration aws with large instance type os e g cat etc os release ubuntu focal kernel e g uname a n a others
0
27,358
28,147,310,890
IssuesEvent
2023-04-02 16:30:17
godotengine/godot-proposals
https://api.github.com/repos/godotengine/godot-proposals
closed
Make node-specific menus/buttons more obvious
topic:editor usability
### Describe the project you are working on Action RPG. ### Describe the problem or limitation you are having in your project Some nodes, when clicked on in the SceneTree, make context-specific menus or buttons appear in the toolbar above the main editor viewport (to the right of the "Transform" and "View" menus in the 3D view). Examples are MeshInstance3D (creates a Mesh menu) and Skeleton3D (creates a Skeleton3D menu and several buttons). These menus/buttons are very unobtrusive, to the point that I generally don't notice they are there unless I'm specifically reminded to look there by a tutorial etc. There are other Nodes that make node-specific controls appear in more obvious ways. Eg when Camera3D is clicked, the "toggle preview" button appears within the editor viewport, where it is much more likely to be noticed. ### Describe the feature / enhancement and how it helps to overcome the problem or limitation Make the node-specific controls appear within the main editor viewport, similar to the Camera "toggle preview" button. ### Describe how your proposal will work, with code, pseudo-code, mock-ups, and/or diagrams ![image](https://user-images.githubusercontent.com/220468/229322997-3b97b4d1-4ec3-4294-9e6a-1539cfd1e9de.png) ### If this enhancement will not be used often, can it be worked around with a few lines of script? No, this is a basic editor UI enhancement. ### Is there a reason why this should be core and not an add-on in the asset library? This is about editor usability.
True
Make node-specific menus/buttons more obvious - ### Describe the project you are working on Action RPG. ### Describe the problem or limitation you are having in your project Some nodes, when clicked on in the SceneTree, make context-specific menus or buttons appear in the toolbar above the main editor viewport (to the right of the "Transform" and "View" menus in the 3D view). Examples are MeshInstance3D (creates a Mesh menu) and Skeleton3D (creates a Skeleton3D menu and several buttons). These menus/buttons are very unobtrusive, to the point that I generally don't notice they are there unless I'm specifically reminded to look there by a tutorial etc. There are other Nodes that make node-specific controls appear in more obvious ways. Eg when Camera3D is clicked, the "toggle preview" button appears within the editor viewport, where it is much more likely to be noticed. ### Describe the feature / enhancement and how it helps to overcome the problem or limitation Make the node-specific controls appear within the main editor viewport, similar to the Camera "toggle preview" button. ### Describe how your proposal will work, with code, pseudo-code, mock-ups, and/or diagrams ![image](https://user-images.githubusercontent.com/220468/229322997-3b97b4d1-4ec3-4294-9e6a-1539cfd1e9de.png) ### If this enhancement will not be used often, can it be worked around with a few lines of script? No, this is a basic editor UI enhancement. ### Is there a reason why this should be core and not an add-on in the asset library? This is about editor usability.
usab
make node specific menus buttons more obvious describe the project you are working on action rpg describe the problem or limitation you are having in your project some nodes when clicked on in the scenetree make context specific menus or buttons appear in the toolbar above the main editor viewport to the right of the transform and view menus in the view examples are creates a mesh menu and creates a menu and several buttons these menus buttons are very unobtrusive to the point that i generally don t notice they are there unless i m specifically reminded to look there by a tutorial etc there are other nodes that make node specific controls appear in more obvious ways eg when is clicked the toggle preview button appears within the editor viewport where it is much more likely to be noticed describe the feature enhancement and how it helps to overcome the problem or limitation make the node specific controls appear within the main editor viewport similar to the camera toggle preview button describe how your proposal will work with code pseudo code mock ups and or diagrams if this enhancement will not be used often can it be worked around with a few lines of script no this is a basic editor ui enhancement is there a reason why this should be core and not an add on in the asset library this is about editor usability
1
257,681
22,201,104,501
IssuesEvent
2022-06-07 11:16:53
mgba-emu/mgba
https://api.github.com/repos/mgba-emu/mgba
closed
mGBA 0.63 Windows 7 [Menu/Tools] inaccessible after ???, close and reopen
blocked:needs retest
Hi! First, love the emulator! It does everything good and works great! I found a little glitch maybe, however... I am unable to reproduce it at will BUT it happened at least twice (0.63), can't remember happening on 0.61 (I updated maybe a weeks ago, start of September...). What happens: The Tools drop down menu (ONLY tools) is inaccessible/unopenable. However, shortcuts are still working (Alt-C for cheats) but the drop down menu is no where to be seen... I can also speculate (haven't tested it but once) but the menu seems to still be there (even though invisible). When I click below the Tools (that doesn't show a drop down) the log screen opens (at it should at that position). Temp fix: Save state/close/reopen mGBA... It's not a HUGE problem but can cause annoyance sometimes... Continue the great work! Vortaka Windows 7, 64bit I7 2600 16gb ram P.S. If need of any more info, please email me!
1.0
mGBA 0.63 Windows 7 [Menu/Tools] inaccessible after ???, close and reopen - Hi! First, love the emulator! It does everything good and works great! I found a little glitch maybe, however... I am unable to reproduce it at will BUT it happened at least twice (0.63), can't remember happening on 0.61 (I updated maybe a weeks ago, start of September...). What happens: The Tools drop down menu (ONLY tools) is inaccessible/unopenable. However, shortcuts are still working (Alt-C for cheats) but the drop down menu is no where to be seen... I can also speculate (haven't tested it but once) but the menu seems to still be there (even though invisible). When I click below the Tools (that doesn't show a drop down) the log screen opens (at it should at that position). Temp fix: Save state/close/reopen mGBA... It's not a HUGE problem but can cause annoyance sometimes... Continue the great work! Vortaka Windows 7, 64bit I7 2600 16gb ram P.S. If need of any more info, please email me!
non_usab
mgba windows inaccessible after close and reopen hi first love the emulator it does everything good and works great i found a little glitch maybe however i am unable to reproduce it at will but it happened at least twice can t remember happening on i updated maybe a weeks ago start of september what happens the tools drop down menu only tools is inaccessible unopenable however shortcuts are still working alt c for cheats but the drop down menu is no where to be seen i can also speculate haven t tested it but once but the menu seems to still be there even though invisible when i click below the tools that doesn t show a drop down the log screen opens at it should at that position temp fix save state close reopen mgba it s not a huge problem but can cause annoyance sometimes continue the great work vortaka windows ram p s if need of any more info please email me
0
12,666
8,032,696,137
IssuesEvent
2018-07-28 18:20:32
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Settings sometimes don't register when clicking enter
bug confirmed topic:editor usability
**Operating system or device, Godot version, GPU Model and driver (if graphics related):** Ubuntu 17.04, [Build](https://bintray.com/calinou/godot/editor) fe08257 **Issue description:** When setting something by clicking enter, it will sometimes go back to the previous value: ![bug](https://user-images.githubusercontent.com/30739239/31778304-0caf3344-b4cf-11e7-97d5-3d519b0424e4.gif)
True
Settings sometimes don't register when clicking enter - **Operating system or device, Godot version, GPU Model and driver (if graphics related):** Ubuntu 17.04, [Build](https://bintray.com/calinou/godot/editor) fe08257 **Issue description:** When setting something by clicking enter, it will sometimes go back to the previous value: ![bug](https://user-images.githubusercontent.com/30739239/31778304-0caf3344-b4cf-11e7-97d5-3d519b0424e4.gif)
usab
settings sometimes don t register when clicking enter operating system or device godot version gpu model and driver if graphics related ubuntu issue description when setting something by clicking enter it will sometimes go back to the previous value
1
27,968
30,799,124,092
IssuesEvent
2023-07-31 22:52:13
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
opened
Make client suggestion connection work with max_sessions_for_user
usability
**Describe the issue** Clickhouse client can't load suggestions using single connection when max_sessions_for_user is set. **How to reproduce** - Create a user with `<max_sessions_for_user>2</max_sessions_for_user>` in profile - Connect to the server with clickhouse-client in interactive mode (starts a session) - Run another instance of interactive clickhouse-client. If will fail to load suggestions (due to the limitation on concurrent sessions) but then will continue working as usual. **Expected behavior** No error happen in this case. **Error message and/or stacktrace** ``` ClickHouse client version 23.7.1.1. Connecting to localhost:9000 as user maxsessions. Connected to ClickHouse server version 23.7.1 revision 54464. Cannot load data for command line suggestions: Code: 700. DB::Exception: Received from localhost:9000. DB::Exception: User 5eb5f051-64a4-19bc-ff75-494154bf67a9 has overflown session count 2. () (version 23.7.1.1) dell9510 :) select 1 ```
True
Make client suggestion connection work with max_sessions_for_user - **Describe the issue** Clickhouse client can't load suggestions using single connection when max_sessions_for_user is set. **How to reproduce** - Create a user with `<max_sessions_for_user>2</max_sessions_for_user>` in profile - Connect to the server with clickhouse-client in interactive mode (starts a session) - Run another instance of interactive clickhouse-client. If will fail to load suggestions (due to the limitation on concurrent sessions) but then will continue working as usual. **Expected behavior** No error happen in this case. **Error message and/or stacktrace** ``` ClickHouse client version 23.7.1.1. Connecting to localhost:9000 as user maxsessions. Connected to ClickHouse server version 23.7.1 revision 54464. Cannot load data for command line suggestions: Code: 700. DB::Exception: Received from localhost:9000. DB::Exception: User 5eb5f051-64a4-19bc-ff75-494154bf67a9 has overflown session count 2. () (version 23.7.1.1) dell9510 :) select 1 ```
usab
make client suggestion connection work with max sessions for user describe the issue clickhouse client can t load suggestions using single connection when max sessions for user is set how to reproduce create a user with in profile connect to the server with clickhouse client in interactive mode starts a session run another instance of interactive clickhouse client if will fail to load suggestions due to the limitation on concurrent sessions but then will continue working as usual expected behavior no error happen in this case error message and or stacktrace clickhouse client version connecting to localhost as user maxsessions connected to clickhouse server version revision cannot load data for command line suggestions code db exception received from localhost db exception user has overflown session count version select
1
539,710
15,793,579,471
IssuesEvent
2021-04-02 09:15:58
yalla-coop/chiltern-music-therapy
https://api.github.com/repos/yalla-coop/chiltern-music-therapy
closed
Create Cards component
backlog client-reviewed components front-end priority-2
__Related issue(s)__ Some of the cards requires components like #37 and #39 but aren't essential as content would just be fed into cards as children most likely __Wireframe link__ https://www.figma.com/file/CcYmhfnXreAPxlfyEmGsAH/Chiltern-Music-Therapy?node-id=469%3A30652 --- ### Acceptance Criteria: _REMEMBER THAT WHOEVER WORKS ON THIS ISSUE MUST TICK OFF ALL THE POINTS IN THIS LIST UNLESS THERE IS CLEAR AGREEMENT IN THE COMMENTS TO SAY OTHERWISE. **DO NOT REVIEW A PR INVOLVING THIS ISSUE UNLESS THIS HAS BEEN DONE**_ **Note: If you see a solid green border around any of the cards ignore this. This is a bug on Figma not part of the design. Always inspect the component and look at the CSS to be sure of styling** - [x] Basic card - Simply includes information and possibly links - [x] Link card - Is basically a link that will take the user to another page - You can see there are a few variations on these - [x] Expandable card - These cards when click should expand and then the content in the card should change - Ensure prop is include to close card again (this would happen if in the parent component there are more than one card and another card gets clicked) - [x] Info card - [x] Make sure to use common margin component in styling #32 - [x] Add to storybook
1.0
Create Cards component - __Related issue(s)__ Some of the cards requires components like #37 and #39 but aren't essential as content would just be fed into cards as children most likely __Wireframe link__ https://www.figma.com/file/CcYmhfnXreAPxlfyEmGsAH/Chiltern-Music-Therapy?node-id=469%3A30652 --- ### Acceptance Criteria: _REMEMBER THAT WHOEVER WORKS ON THIS ISSUE MUST TICK OFF ALL THE POINTS IN THIS LIST UNLESS THERE IS CLEAR AGREEMENT IN THE COMMENTS TO SAY OTHERWISE. **DO NOT REVIEW A PR INVOLVING THIS ISSUE UNLESS THIS HAS BEEN DONE**_ **Note: If you see a solid green border around any of the cards ignore this. This is a bug on Figma not part of the design. Always inspect the component and look at the CSS to be sure of styling** - [x] Basic card - Simply includes information and possibly links - [x] Link card - Is basically a link that will take the user to another page - You can see there are a few variations on these - [x] Expandable card - These cards when click should expand and then the content in the card should change - Ensure prop is include to close card again (this would happen if in the parent component there are more than one card and another card gets clicked) - [x] Info card - [x] Make sure to use common margin component in styling #32 - [x] Add to storybook
non_usab
create cards component related issue s some of the cards requires components like and but aren t essential as content would just be fed into cards as children most likely wireframe link acceptance criteria remember that whoever works on this issue must tick off all the points in this list unless there is clear agreement in the comments to say otherwise do not review a pr involving this issue unless this has been done note if you see a solid green border around any of the cards ignore this this is a bug on figma not part of the design always inspect the component and look at the css to be sure of styling basic card simply includes information and possibly links link card is basically a link that will take the user to another page you can see there are a few variations on these expandable card these cards when click should expand and then the content in the card should change ensure prop is include to close card again this would happen if in the parent component there are more than one card and another card gets clicked info card make sure to use common margin component in styling add to storybook
0
22,064
18,444,486,528
IssuesEvent
2021-10-14 22:52:58
bevyengine/bevy
https://api.github.com/repos/bevyengine/bevy
opened
Non-consuming method to check if events are empty
A-ECS C-Usability
## What problem does this solve or what need does it fill? Game logic commonly branches based on the presence or absence of events. However, the only way to read events is to consume them. You can of course drain and then reconstitute the events, but this is terrible. ## What solution would you like? Add a `peek` method to events. ## What alternative(s) have you considered? Use size hints to provide a dedicated `.is_empty` method on events instead.
True
Non-consuming method to check if events are empty - ## What problem does this solve or what need does it fill? Game logic commonly branches based on the presence or absence of events. However, the only way to read events is to consume them. You can of course drain and then reconstitute the events, but this is terrible. ## What solution would you like? Add a `peek` method to events. ## What alternative(s) have you considered? Use size hints to provide a dedicated `.is_empty` method on events instead.
usab
non consuming method to check if events are empty what problem does this solve or what need does it fill game logic commonly branches based on the presence or absence of events however the only way to read events is to consume them you can of course drain and then reconstitute the events but this is terrible what solution would you like add a peek method to events what alternative s have you considered use size hints to provide a dedicated is empty method on events instead
1
144,516
5,541,926,090
IssuesEvent
2017-03-22 14:01:04
ReadyResponder/ReadyResponder
https://api.github.com/repos/ReadyResponder/ReadyResponder
closed
Timecards managed via text message
Claimed High Priority medium
Currently, timecards can be entered via the web UI. This creates the need for someone to do the clerical data entry. It would be much better if each individual volunteer could enter their own timecard through a text message. People would text `arrive` to the ReadyResponder number when they arrive at the staging area. The capitalization should not matter. Upon receiving this message, the system should look up who sent the message, and see if there are any existing incomplete timecards for that person. These should be set to an `error` status. If no other timecards are found, create a new timecard for that person. The timecard should have the start time based on the time of the text. The status should be set to Incomplete. The system should respond to the user that a timecard has been started. People would text `depart` when they are done and leaving the staging area. The system should look up the person who sent the message. It should then look for an open timecard, one that is `incomplete` and only has a start time. If more or less than one is found, they should all be set to an `error` status. The response should include an error message. Even if there is no correct timecard to complete, a new timecard with only this end_time should still be created, and immediately set to an error status. If only one is found, that timecard should be updated with the end time from the message, and a confirmation message returned. ngrok is helpful in developing these features.
1.0
Timecards managed via text message - Currently, timecards can be entered via the web UI. This creates the need for someone to do the clerical data entry. It would be much better if each individual volunteer could enter their own timecard through a text message. People would text `arrive` to the ReadyResponder number when they arrive at the staging area. The capitalization should not matter. Upon receiving this message, the system should look up who sent the message, and see if there are any existing incomplete timecards for that person. These should be set to an `error` status. If no other timecards are found, create a new timecard for that person. The timecard should have the start time based on the time of the text. The status should be set to Incomplete. The system should respond to the user that a timecard has been started. People would text `depart` when they are done and leaving the staging area. The system should look up the person who sent the message. It should then look for an open timecard, one that is `incomplete` and only has a start time. If more or less than one is found, they should all be set to an `error` status. The response should include an error message. Even if there is no correct timecard to complete, a new timecard with only this end_time should still be created, and immediately set to an error status. If only one is found, that timecard should be updated with the end time from the message, and a confirmation message returned. ngrok is helpful in developing these features.
non_usab
timecards managed via text message currently timecards can be entered via the web ui this creates the need for someone to do the clerical data entry it would be much better if each individual volunteer could enter their own timecard through a text message people would text arrive to the readyresponder number when they arrive at the staging area the capitalization should not matter upon receiving this message the system should look up who sent the message and see if there are any existing incomplete timecards for that person these should be set to an error status if no other timecards are found create a new timecard for that person the timecard should have the start time based on the time of the text the status should be set to incomplete the system should respond to the user that a timecard has been started people would text depart when they are done and leaving the staging area the system should look up the person who sent the message it should then look for an open timecard one that is incomplete and only has a start time if more or less than one is found they should all be set to an error status the response should include an error message even if there is no correct timecard to complete a new timecard with only this end time should still be created and immediately set to an error status if only one is found that timecard should be updated with the end time from the message and a confirmation message returned ngrok is helpful in developing these features
0
13,269
8,407,114,138
IssuesEvent
2018-10-11 19:57:14
LoopPerfect/buckaroo
https://api.github.com/repos/LoopPerfect/buckaroo
closed
Add should_remap_host_platform to .buckconfig when using quickstart
enhancement usability
Many packages assume that [`should_remap_host_platform`](https://buckbuild.com/files-and-dirs/buckconfig.html#cxx.should_remap_host_platform) is enabled. We should add this to the automatically generated `.buckconfig`.
True
Add should_remap_host_platform to .buckconfig when using quickstart - Many packages assume that [`should_remap_host_platform`](https://buckbuild.com/files-and-dirs/buckconfig.html#cxx.should_remap_host_platform) is enabled. We should add this to the automatically generated `.buckconfig`.
usab
add should remap host platform to buckconfig when using quickstart many packages assume that is enabled we should add this to the automatically generated buckconfig
1
20,119
15,035,791,074
IssuesEvent
2021-02-02 14:32:43
git4school/git4school-visu
https://api.github.com/repos/git4school/git4school-visu
closed
Hide "Graphs" menu when on home page
ready usability story
**Description** We want to hide the _Graphs_ menu when the user is on the _home_ page for usability reasons. Indeed, it is currently possible to access the _overview_ graph in 2 different ways from the _home_ page. **Hints** It will therefore be necessary to make sure that the button to select an assignment does not reload it if there is nothing to load
True
Hide "Graphs" menu when on home page - **Description** We want to hide the _Graphs_ menu when the user is on the _home_ page for usability reasons. Indeed, it is currently possible to access the _overview_ graph in 2 different ways from the _home_ page. **Hints** It will therefore be necessary to make sure that the button to select an assignment does not reload it if there is nothing to load
usab
hide graphs menu when on home page description we want to hide the graphs menu when the user is on the home page for usability reasons indeed it is currently possible to access the overview graph in different ways from the home page hints it will therefore be necessary to make sure that the button to select an assignment does not reload it if there is nothing to load
1
34,737
4,952,729,723
IssuesEvent
2016-12-01 13:01:11
astropy/astropy
https://api.github.com/repos/astropy/astropy
closed
Fix unit test fails on Windows / Appveyor
analytic_functions Bug io.ascii io.fits nddata testing Windows
When turning on continuous integration for Windows on AppVeyor in #2755 we told it to skip some unit tests that failed. You can get a full list of these skipped tests in master using this full-text search: https://github.com/astropy/astropy/search?utf8=%E2%9C%93&q=fails+on+AppVeyor Here's a list: - [x] `test_blackbody_scipy` and `test_blackbody_overflow` in `test_blackbody.py` - [x] `test_setitem_invalid_shape` in `test_flag_collection.py` - [ ] one test in `astropy.io.fits` - [x] lots of tests in `astropy.io.ascii` If someone with access to Windows could try to reproduce and fix these issues, that would be great!
1.0
Fix unit test fails on Windows / Appveyor - When turning on continuous integration for Windows on AppVeyor in #2755 we told it to skip some unit tests that failed. You can get a full list of these skipped tests in master using this full-text search: https://github.com/astropy/astropy/search?utf8=%E2%9C%93&q=fails+on+AppVeyor Here's a list: - [x] `test_blackbody_scipy` and `test_blackbody_overflow` in `test_blackbody.py` - [x] `test_setitem_invalid_shape` in `test_flag_collection.py` - [ ] one test in `astropy.io.fits` - [x] lots of tests in `astropy.io.ascii` If someone with access to Windows could try to reproduce and fix these issues, that would be great!
non_usab
fix unit test fails on windows appveyor when turning on continuous integration for windows on appveyor in we told it to skip some unit tests that failed you can get a full list of these skipped tests in master using this full text search here s a list test blackbody scipy and test blackbody overflow in test blackbody py test setitem invalid shape in test flag collection py one test in astropy io fits lots of tests in astropy io ascii if someone with access to windows could try to reproduce and fix these issues that would be great
0
27,161
27,771,618,998
IssuesEvent
2023-03-16 14:47:30
pulumi/pulumi-gcp
https://api.github.com/repos/pulumi/pulumi-gcp
closed
gcp.cloudfunctions.HttpCallbackFunction should support minInstances and maxInstances
impact/usability kind/enhancement help-wanted size/S good-first-issue
Both properties are not available in the `HttpCallbackFunctionArgs` type for the HttpCallbackFunction convenience constructor. Once deployed, I can set the min and max instances through GCP console, so these properties are valid.
True
gcp.cloudfunctions.HttpCallbackFunction should support minInstances and maxInstances - Both properties are not available in the `HttpCallbackFunctionArgs` type for the HttpCallbackFunction convenience constructor. Once deployed, I can set the min and max instances through GCP console, so these properties are valid.
usab
gcp cloudfunctions httpcallbackfunction should support mininstances and maxinstances both properties are not available in the httpcallbackfunctionargs type for the httpcallbackfunction convenience constructor once deployed i can set the min and max instances through gcp console so these properties are valid
1
11,372
2,649,807,053
IssuesEvent
2015-03-15 09:35:16
Grumbel/galapix
https://api.github.com/repos/Grumbel/galapix
closed
Google Code will close
auto-migrated Priority-Medium Type-Defect
``` http://google-opensource.blogspot.com/2015/03/farewell-to-google-code.html The option is migrating to any alternative and put the new url in the main page (project home). the big majority has opted for github, but us have until august to decide. ``` Original issue reported on code.google.com by `prflr88@gmail.com` on 14 Mar 2015 at 4:03
1.0
Google Code will close - ``` http://google-opensource.blogspot.com/2015/03/farewell-to-google-code.html The option is migrating to any alternative and put the new url in the main page (project home). the big majority has opted for github, but us have until august to decide. ``` Original issue reported on code.google.com by `prflr88@gmail.com` on 14 Mar 2015 at 4:03
non_usab
google code will close the option is migrating to any alternative and put the new url in the main page project home the big majority has opted for github but us have until august to decide original issue reported on code google com by gmail com on mar at
0
16,441
10,926,622,634
IssuesEvent
2019-11-22 15:04:56
Zilliqa/scilla
https://api.github.com/repos/Zilliqa/scilla
opened
Mutable fields should be in scope in expressions
backwards-incompatible-change enhancement usability
Similar to how contract parameters are in scope in expression, so should mutable fields. Note that - We need to ensure that shadowing of fields and variables is implemented correctly. Also, we need to ensure that we issue appropriate warnings in case shadowing takes place. - The cashflow analyser needs to implement the same scoping rules. - This change probably isn't backward compatible, since a change to the scoping rules may cause unintended shadowing. - This change eliminates the need for the `<-` syntax, which should be removed. The `:=` syntax should stay, though, since expressions may only read from mutable fields, not write to them.
True
Mutable fields should be in scope in expressions - Similar to how contract parameters are in scope in expression, so should mutable fields. Note that - We need to ensure that shadowing of fields and variables is implemented correctly. Also, we need to ensure that we issue appropriate warnings in case shadowing takes place. - The cashflow analyser needs to implement the same scoping rules. - This change probably isn't backward compatible, since a change to the scoping rules may cause unintended shadowing. - This change eliminates the need for the `<-` syntax, which should be removed. The `:=` syntax should stay, though, since expressions may only read from mutable fields, not write to them.
usab
mutable fields should be in scope in expressions similar to how contract parameters are in scope in expression so should mutable fields note that we need to ensure that shadowing of fields and variables is implemented correctly also we need to ensure that we issue appropriate warnings in case shadowing takes place the cashflow analyser needs to implement the same scoping rules this change probably isn t backward compatible since a change to the scoping rules may cause unintended shadowing this change eliminates the need for the syntax which should be removed the syntax should stay though since expressions may only read from mutable fields not write to them
1
11,252
9,022,916,806
IssuesEvent
2019-02-07 04:20:09
sb/smallbasic-editor
https://api.github.com/repos/sb/smallbasic-editor
opened
Improve development cycle
type/infrastructure
As mentioned in the main `README` file, to have a fast edit/run cycle, you need: * a separate CLI command needs to be run to listen to client editor changes. * rebuild the generators whenever their models change. We should look into how this cycle can be improved, so that Visual Studio can pick up these changes and recompile automatically.
1.0
Improve development cycle - As mentioned in the main `README` file, to have a fast edit/run cycle, you need: * a separate CLI command needs to be run to listen to client editor changes. * rebuild the generators whenever their models change. We should look into how this cycle can be improved, so that Visual Studio can pick up these changes and recompile automatically.
non_usab
improve development cycle as mentioned in the main readme file to have a fast edit run cycle you need a separate cli command needs to be run to listen to client editor changes rebuild the generators whenever their models change we should look into how this cycle can be improved so that visual studio can pick up these changes and recompile automatically
0
26,523
26,909,566,223
IssuesEvent
2023-02-06 22:10:49
Ericsson/codechecker
https://api.github.com/repos/Ericsson/codechecker
closed
CodeChecker to support clang-tools like compilation database lookup (multi-root workspace)
analyzer :chart_with_upwards_trend: usability :+1: new feature :+1:
CodeChecker should support an analysis mode where for each source file, it tries to find the closest compile_commands.json file up in the directory hierarchy starting from the source file. clangd and clang-tidy works this way: https://clangd.llvm.org/installation.html clangd will look in the parent directories of the files you edit looking for it, and also in subdirectories named build/. For example, if editing $SRC/gui/window.cpp, we search in $SRC/gui/, $SRC/gui/build/, $SRC/, $SRC/build/, … This feature would allow the analaysis of multi-root projects also in the vscode plugin https://github.com/Ericsson/CodecheckerVSCodePlugin/issues/113
True
CodeChecker to support clang-tools like compilation database lookup (multi-root workspace) - CodeChecker should support an analysis mode where for each source file, it tries to find the closest compile_commands.json file up in the directory hierarchy starting from the source file. clangd and clang-tidy works this way: https://clangd.llvm.org/installation.html clangd will look in the parent directories of the files you edit looking for it, and also in subdirectories named build/. For example, if editing $SRC/gui/window.cpp, we search in $SRC/gui/, $SRC/gui/build/, $SRC/, $SRC/build/, … This feature would allow the analaysis of multi-root projects also in the vscode plugin https://github.com/Ericsson/CodecheckerVSCodePlugin/issues/113
usab
codechecker to support clang tools like compilation database lookup multi root workspace codechecker should support an analysis mode where for each source file it tries to find the closest compile commands json file up in the directory hierarchy starting from the source file clangd and clang tidy works this way clangd will look in the parent directories of the files you edit looking for it and also in subdirectories named build for example if editing src gui window cpp we search in src gui src gui build src src build … this feature would allow the analaysis of multi root projects also in the vscode plugin
1
8,407
5,661,370,929
IssuesEvent
2017-04-10 17:12:13
umts/probable-engine
https://api.github.com/repos/umts/probable-engine
closed
Inventory check for rentals/rental_schedule
enhancement usability
@owlee suggests adding an inventory check to the form on `rentals/rental_schedule`, specifically run when selecting dates (ajax?). Server side validations still apply.
True
Inventory check for rentals/rental_schedule - @owlee suggests adding an inventory check to the form on `rentals/rental_schedule`, specifically run when selecting dates (ajax?). Server side validations still apply.
usab
inventory check for rentals rental schedule owlee suggests adding an inventory check to the form on rentals rental schedule specifically run when selecting dates ajax server side validations still apply
1
122,434
10,222,887,634
IssuesEvent
2019-08-16 08:08:53
microsoft/AzureStorageExplorer
https://api.github.com/repos/microsoft/AzureStorageExplorer
opened
The Cancle button is empty on upload blob dialog with AzCopy checked
:beetle: regression :gear: azcopy :gear: blobs 🧪 testing
**Storage Explorer Version:** 1.9.0 **Build:** 20190815.2 **Platform/OS:** Linux Ubuntu 19.04/Windows 10/macOS High Sierra **Architecture:** ia32/x64 **Regression From:** Previous release(1.9.0) **Steps to reproduce:** 1. Make sure AzCopy is checked. 2. Expand a storage account -> Blob Containers. 2. Create a new blob container -> Try to upload a blob to it. 3. Check the upload dialog. **Expect Experience:** The Cancel button shows well. ![image](https://user-images.githubusercontent.com/41351993/63152433-66665a80-c03e-11e9-9d4a-59b735d6fdf2.png) **Actual Experience:** The Cancle button is empty for upload blob dialog ![image](https://user-images.githubusercontent.com/41351993/63152298-16879380-c03e-11e9-8bea-8e642f398e0b.png) **More Info:** 1. This issue doesn't reproduce when AzCopy is unchecked. 2. This issue doesn't reproduce for one file share.
1.0
The Cancle button is empty on upload blob dialog with AzCopy checked - **Storage Explorer Version:** 1.9.0 **Build:** 20190815.2 **Platform/OS:** Linux Ubuntu 19.04/Windows 10/macOS High Sierra **Architecture:** ia32/x64 **Regression From:** Previous release(1.9.0) **Steps to reproduce:** 1. Make sure AzCopy is checked. 2. Expand a storage account -> Blob Containers. 2. Create a new blob container -> Try to upload a blob to it. 3. Check the upload dialog. **Expect Experience:** The Cancel button shows well. ![image](https://user-images.githubusercontent.com/41351993/63152433-66665a80-c03e-11e9-9d4a-59b735d6fdf2.png) **Actual Experience:** The Cancle button is empty for upload blob dialog ![image](https://user-images.githubusercontent.com/41351993/63152298-16879380-c03e-11e9-8bea-8e642f398e0b.png) **More Info:** 1. This issue doesn't reproduce when AzCopy is unchecked. 2. This issue doesn't reproduce for one file share.
non_usab
the cancle button is empty on upload blob dialog with azcopy checked storage explorer version build platform os linux ubuntu windows macos high sierra architecture regression from previous release steps to reproduce make sure azcopy is checked expand a storage account blob containers create a new blob container try to upload a blob to it check the upload dialog expect experience the cancel button shows well actual experience the cancle button is empty for upload blob dialog more info this issue doesn t reproduce when azcopy is unchecked this issue doesn t reproduce for one file share
0
334,524
29,871,810,699
IssuesEvent
2023-06-20 08:59:29
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
reopened
com.hazelcast.internal.metrics.impl.MetricsCompressorTest [HZ-2538]
Team: Core Type: Test-Failure Source: Internal to-jira
_master_ (commit 65933d5f0689250b39ad958322ee6fb77baaf936) Failed on ibm-8: https://jenkins.hazelcast.com/view/Official%20Builds/job/Hazelcast-master-IbmJDK8-fips/56/testReport/com.hazelcast.internal.metrics.impl/MetricsCompressorTest/ Almost all tests in `com.hazelcast.internal.metrics.impl.MetricsCompressorTest` failed with the same expcetion. <details><summary>Stacktrace (for testTwoMetrics_secondWithoutTags as example):</summary> ``` Wanted but not invoked: defaultMetricDescriptorSupplier.get(); -> at com.hazelcast.internal.metrics.impl.DefaultMetricDescriptorSupplier.get(DefaultMetricDescriptorSupplier.java:32) Actually, there were zero interactions with this mock. at com.hazelcast.internal.metrics.impl.DefaultMetricDescriptorSupplier.get(DefaultMetricDescriptorSupplier.java:32) at com.hazelcast.internal.metrics.impl.DefaultMetricDescriptorSupplier.get(DefaultMetricDescriptorSupplier.java:27) at com.hazelcast.internal.metrics.impl.MetricsCompressorTest.testTwoMetrics_secondWithoutTags(MetricsCompressorTest.java:221) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:115) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:107) at java.util.concurrent.FutureTask.run(FutureTask.java:277) at java.lang.Thread.run(Thread.java:825) ``` </details> Standard output can be found here - https://s3.console.aws.amazon.com/s3/buckets/j-artifacts/Hazelcast-master-IbmJDK8-fips/56/
1.0
com.hazelcast.internal.metrics.impl.MetricsCompressorTest [HZ-2538] - _master_ (commit 65933d5f0689250b39ad958322ee6fb77baaf936) Failed on ibm-8: https://jenkins.hazelcast.com/view/Official%20Builds/job/Hazelcast-master-IbmJDK8-fips/56/testReport/com.hazelcast.internal.metrics.impl/MetricsCompressorTest/ Almost all tests in `com.hazelcast.internal.metrics.impl.MetricsCompressorTest` failed with the same expcetion. <details><summary>Stacktrace (for testTwoMetrics_secondWithoutTags as example):</summary> ``` Wanted but not invoked: defaultMetricDescriptorSupplier.get(); -> at com.hazelcast.internal.metrics.impl.DefaultMetricDescriptorSupplier.get(DefaultMetricDescriptorSupplier.java:32) Actually, there were zero interactions with this mock. at com.hazelcast.internal.metrics.impl.DefaultMetricDescriptorSupplier.get(DefaultMetricDescriptorSupplier.java:32) at com.hazelcast.internal.metrics.impl.DefaultMetricDescriptorSupplier.get(DefaultMetricDescriptorSupplier.java:27) at com.hazelcast.internal.metrics.impl.MetricsCompressorTest.testTwoMetrics_secondWithoutTags(MetricsCompressorTest.java:221) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:115) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:107) at java.util.concurrent.FutureTask.run(FutureTask.java:277) at java.lang.Thread.run(Thread.java:825) ``` </details> Standard output can be found here - https://s3.console.aws.amazon.com/s3/buckets/j-artifacts/Hazelcast-master-IbmJDK8-fips/56/
non_usab
com hazelcast internal metrics impl metricscompressortest master commit failed on ibm almost all tests in com hazelcast internal metrics impl metricscompressortest failed with the same expcetion stacktrace for testtwometrics secondwithouttags as example wanted but not invoked defaultmetricdescriptorsupplier get at com hazelcast internal metrics impl defaultmetricdescriptorsupplier get defaultmetricdescriptorsupplier java actually there were zero interactions with this mock at com hazelcast internal metrics impl defaultmetricdescriptorsupplier get defaultmetricdescriptorsupplier java at com hazelcast internal metrics impl defaultmetricdescriptorsupplier get defaultmetricdescriptorsupplier java at com hazelcast internal metrics impl metricscompressortest testtwometrics secondwithouttags metricscompressortest java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at java util concurrent futuretask run futuretask java at java lang thread run thread java standard output can be found here
0
22,019
7,110,037,066
IssuesEvent
2018-01-17 09:14:37
opencv/opencv
https://api.github.com/repos/opencv/opencv
closed
building framework fails when older version of opencv is installed on macOS
category: build/install category: ios/osx
- OpenCV => 3.2 - Operating System / Platform => MacOS 10.12 - Compiler => XCode 8 ##### Detailed description The core/private.hpp header is mixed up with the installed version in /usr/local. this has the effect that certain defines like CV_INSTRUMENT_REGION() will crash the compilation throughout the code base. The main reason is that /usr/local/include is added to the import path for the platform/osx build. Not sure why, I worked around it by temporarily removing the opencv headers from my system. ##### Steps to reproduce Install opencv 3.1 into /usr/local checkout 3.2 run `cd platforms/osx;python build_framework.py --contrib=../../../opencv_contrib build`
1.0
building framework fails when older version of opencv is installed on macOS - - OpenCV => 3.2 - Operating System / Platform => MacOS 10.12 - Compiler => XCode 8 ##### Detailed description The core/private.hpp header is mixed up with the installed version in /usr/local. this has the effect that certain defines like CV_INSTRUMENT_REGION() will crash the compilation throughout the code base. The main reason is that /usr/local/include is added to the import path for the platform/osx build. Not sure why, I worked around it by temporarily removing the opencv headers from my system. ##### Steps to reproduce Install opencv 3.1 into /usr/local checkout 3.2 run `cd platforms/osx;python build_framework.py --contrib=../../../opencv_contrib build`
non_usab
building framework fails when older version of opencv is installed on macos opencv operating system platform macos compiler xcode detailed description the core private hpp header is mixed up with the installed version in usr local this has the effect that certain defines like cv instrument region will crash the compilation throughout the code base the main reason is that usr local include is added to the import path for the platform osx build not sure why i worked around it by temporarily removing the opencv headers from my system steps to reproduce install opencv into usr local checkout run cd platforms osx python build framework py contrib opencv contrib build
0
1,991
3,455,448,347
IssuesEvent
2015-12-17 20:10:19
RobDixonIII/Bloom
https://api.github.com/repos/RobDixonIII/Bloom
reopened
Add Buttons to Taxonomies Module
infrastructure
Add simple buttons to the taxonomies module to load the following modules into new tabs: * Album * Artist * Library * Person * Playlist * Song
1.0
Add Buttons to Taxonomies Module - Add simple buttons to the taxonomies module to load the following modules into new tabs: * Album * Artist * Library * Person * Playlist * Song
non_usab
add buttons to taxonomies module add simple buttons to the taxonomies module to load the following modules into new tabs album artist library person playlist song
0
16,570
11,089,765,366
IssuesEvent
2019-12-14 20:54:45
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Tileset Zoom is not enough for pixel art
discussion enhancement topic:editor usability
**Godot version:** 3.2 beta 3 Perhaps its just my very poor eyesight. But the maximum zoom of the tileset editor is not sufficient for detailed pixel art games. I realize its feature freeze but it would certainly help this impaired vision dev to increase the maximum zoom limit.
True
Tileset Zoom is not enough for pixel art - **Godot version:** 3.2 beta 3 Perhaps its just my very poor eyesight. But the maximum zoom of the tileset editor is not sufficient for detailed pixel art games. I realize its feature freeze but it would certainly help this impaired vision dev to increase the maximum zoom limit.
usab
tileset zoom is not enough for pixel art godot version beta perhaps its just my very poor eyesight but the maximum zoom of the tileset editor is not sufficient for detailed pixel art games i realize its feature freeze but it would certainly help this impaired vision dev to increase the maximum zoom limit
1
12,098
9,594,874,665
IssuesEvent
2019-05-09 14:52:20
elastic/beats
https://api.github.com/repos/elastic/beats
closed
[metricbeat] undocumented behavior of system/socket metricset when running in docker
:infrastructure Metricbeat [zube]: In Progress bug docs
For confirmed bugs, please report: - Version: 7.0 - Operating System: linux - Steps to Reproduce: 1. setup docker based on the configuration here: https://www.elastic.co/guide/en/beats/metricbeat/current/running-on-docker.html ``` docker run \ --user=root \ --name=metricbeat-test \ --mount type=bind,source=/proc,target=/hostfs/proc,readonly \ --mount type=bind,source=/sys/fs/cgroup,target=/hostfs/sys/fs/cgroup,readonly \ --mount type=bind,source=/,target=/hostfs,readonly \ --net=host \ --volume="$(pwd)/metricbeat.docker.yml:/usr/share/metricbeat/metricbeat.yml:ro" \ docker.elastic.co/beats/metricbeat:7.0.0 \ -e -system.hostfs=/hostfs ``` 2. enable the system/socket metricset 3. Get some weird errors: ``` "system": { "socket": { "local": { "port": 22, "ip": "::" } } }, "ecs": { "version": "1.0.0" }, "server": { "ip": "::", "port": 22 }, "error": { "code": "process not found. inode=29023, tcp_state=LISTEN" }, ``` What's happening here is that the metricset is using netlink to actually grab socket data, and then using procfs to map the inodes back to processes. Even when running as `root` the container process doesn't have permissions to access the host symlinks in `/proc/$pid/fd`, hence the error. A temporary workaround is to use `--privileged`, which is a tad blunt. You can also omit the `--user=root`, although having metricbeat just monitor its own socket usage isn't that helpful, as an info message will tell you: ``` INFO socket/socket.go:81 socket process info will only be available for metricbeat because the process is running as a non-root user ``` It seems to be we should either alter the behavior of the metricset or document how to work around this. Having metricbeat monitor the host system from inside docker seems to be a supported use case, and I don't see anything on the above-linked page that would allow the socket metricset to just work. We may also want to document that without `--user=root` the metricset will just monitor itself, as `--user=root` is mentioned on the above-linked page, but never really explained. We may also want to do some kind of permissions check at runtime and print another info message similar to the one above.
1.0
[metricbeat] undocumented behavior of system/socket metricset when running in docker - For confirmed bugs, please report: - Version: 7.0 - Operating System: linux - Steps to Reproduce: 1. setup docker based on the configuration here: https://www.elastic.co/guide/en/beats/metricbeat/current/running-on-docker.html ``` docker run \ --user=root \ --name=metricbeat-test \ --mount type=bind,source=/proc,target=/hostfs/proc,readonly \ --mount type=bind,source=/sys/fs/cgroup,target=/hostfs/sys/fs/cgroup,readonly \ --mount type=bind,source=/,target=/hostfs,readonly \ --net=host \ --volume="$(pwd)/metricbeat.docker.yml:/usr/share/metricbeat/metricbeat.yml:ro" \ docker.elastic.co/beats/metricbeat:7.0.0 \ -e -system.hostfs=/hostfs ``` 2. enable the system/socket metricset 3. Get some weird errors: ``` "system": { "socket": { "local": { "port": 22, "ip": "::" } } }, "ecs": { "version": "1.0.0" }, "server": { "ip": "::", "port": 22 }, "error": { "code": "process not found. inode=29023, tcp_state=LISTEN" }, ``` What's happening here is that the metricset is using netlink to actually grab socket data, and then using procfs to map the inodes back to processes. Even when running as `root` the container process doesn't have permissions to access the host symlinks in `/proc/$pid/fd`, hence the error. A temporary workaround is to use `--privileged`, which is a tad blunt. You can also omit the `--user=root`, although having metricbeat just monitor its own socket usage isn't that helpful, as an info message will tell you: ``` INFO socket/socket.go:81 socket process info will only be available for metricbeat because the process is running as a non-root user ``` It seems to be we should either alter the behavior of the metricset or document how to work around this. Having metricbeat monitor the host system from inside docker seems to be a supported use case, and I don't see anything on the above-linked page that would allow the socket metricset to just work. We may also want to document that without `--user=root` the metricset will just monitor itself, as `--user=root` is mentioned on the above-linked page, but never really explained. We may also want to do some kind of permissions check at runtime and print another info message similar to the one above.
non_usab
undocumented behavior of system socket metricset when running in docker for confirmed bugs please report version operating system linux steps to reproduce setup docker based on the configuration here docker run user root name metricbeat test mount type bind source proc target hostfs proc readonly mount type bind source sys fs cgroup target hostfs sys fs cgroup readonly mount type bind source target hostfs readonly net host volume pwd metricbeat docker yml usr share metricbeat metricbeat yml ro docker elastic co beats metricbeat e system hostfs hostfs enable the system socket metricset get some weird errors system socket local port ip ecs version server ip port error code process not found inode tcp state listen what s happening here is that the metricset is using netlink to actually grab socket data and then using procfs to map the inodes back to processes even when running as root the container process doesn t have permissions to access the host symlinks in proc pid fd hence the error a temporary workaround is to use privileged which is a tad blunt you can also omit the user root although having metricbeat just monitor its own socket usage isn t that helpful as an info message will tell you info socket socket go socket process info will only be available for metricbeat because the process is running as a non root user it seems to be we should either alter the behavior of the metricset or document how to work around this having metricbeat monitor the host system from inside docker seems to be a supported use case and i don t see anything on the above linked page that would allow the socket metricset to just work we may also want to document that without user root the metricset will just monitor itself as user root is mentioned on the above linked page but never really explained we may also want to do some kind of permissions check at runtime and print another info message similar to the one above
0
10,222
8,441,563,983
IssuesEvent
2018-10-18 10:36:20
geli-lms/geli
https://api.github.com/repos/geli-lms/geli
closed
Setup a BACKUP
enhancement infrastructure
# User Story ### As a: Hoster ### I want: to have a backup of ALL data ### so that: we can restore the system if anything goes wrong. ## Storypoints: ## Acceptance criteria: - [ ] a total serves crash is no problem - [x] before a new version gets applied, a backup is done - [ ] the backup is stored outside of the live server - [x] an automatic backup is done every 24h - [ ] a wiki/readme article about backuping is written ## Additional info: To be discussed: - what data we need to backup - how do we backup them - where do we store the backups - how long do we store the backups?
1.0
Setup a BACKUP - # User Story ### As a: Hoster ### I want: to have a backup of ALL data ### so that: we can restore the system if anything goes wrong. ## Storypoints: ## Acceptance criteria: - [ ] a total serves crash is no problem - [x] before a new version gets applied, a backup is done - [ ] the backup is stored outside of the live server - [x] an automatic backup is done every 24h - [ ] a wiki/readme article about backuping is written ## Additional info: To be discussed: - what data we need to backup - how do we backup them - where do we store the backups - how long do we store the backups?
non_usab
setup a backup user story as a hoster i want to have a backup of all data so that we can restore the system if anything goes wrong storypoints acceptance criteria a total serves crash is no problem before a new version gets applied a backup is done the backup is stored outside of the live server an automatic backup is done every a wiki readme article about backuping is written additional info to be discussed what data we need to backup how do we backup them where do we store the backups how long do we store the backups
0
276,904
30,567,876,587
IssuesEvent
2023-07-20 19:18:30
samq-democorp/easybuggy-lvp
https://api.github.com/repos/samq-democorp/easybuggy-lvp
opened
nekohtml-1.9.16.jar: 3 vulnerabilities (highest severity is: 7.5)
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>nekohtml-1.9.16.jar</b></p></summary> <p>An HTML parser and tag balancer.</p> <p>Library home page: <a href="http://nekohtml.sourceforge.net/">http://nekohtml.sourceforge.net/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/nekohtml-1.9.16.jar,/home/wss-scanner/.m2/repository/net/sourceforge/nekohtml/nekohtml/1.9.16/nekohtml-1.9.16.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/samq-democorp/easybuggy-lvp/commit/4afba820e35532010e5668591baf0bbbb1da4148">4afba820e35532010e5668591baf0bbbb1da4148</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (nekohtml version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-28366](https://www.mend.io/vulnerability-database/CVE-2022-28366) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | nekohtml-1.9.16.jar | Direct | net.sourceforge.htmlunit:neko-htmlunit:2.27 | &#9989; | | [CVE-2022-29546](https://www.mend.io/vulnerability-database/CVE-2022-29546) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | nekohtml-1.9.16.jar | Direct | net.sourceforge.htmlunit:neko-htmlunit:2.61.0 | &#9989; | | [CVE-2022-24839](https://www.mend.io/vulnerability-database/CVE-2022-24839) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | nekohtml-1.9.16.jar | Direct | net.sourceforge.nekohtml:nekohtml:1.9.22.noko2 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-28366</summary> ### Vulnerable Library - <b>nekohtml-1.9.16.jar</b></p> <p>An HTML parser and tag balancer.</p> <p>Library home page: <a href="http://nekohtml.sourceforge.net/">http://nekohtml.sourceforge.net/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/nekohtml-1.9.16.jar,/home/wss-scanner/.m2/repository/net/sourceforge/nekohtml/nekohtml/1.9.16/nekohtml-1.9.16.jar</p> <p> Dependency Hierarchy: - :x: **nekohtml-1.9.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-democorp/easybuggy-lvp/commit/4afba820e35532010e5668591baf0bbbb1da4148">4afba820e35532010e5668591baf0bbbb1da4148</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839. <p>Publish Date: 2022-04-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-28366>CVE-2022-28366</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-g9hh-vvx3-v37v">https://github.com/advisories/GHSA-g9hh-vvx3-v37v</a></p> <p>Release Date: 2022-04-21</p> <p>Fix Resolution: net.sourceforge.htmlunit:neko-htmlunit:2.27</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-29546</summary> ### Vulnerable Library - <b>nekohtml-1.9.16.jar</b></p> <p>An HTML parser and tag balancer.</p> <p>Library home page: <a href="http://nekohtml.sourceforge.net/">http://nekohtml.sourceforge.net/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/nekohtml-1.9.16.jar,/home/wss-scanner/.m2/repository/net/sourceforge/nekohtml/nekohtml/1.9.16/nekohtml-1.9.16.jar</p> <p> Dependency Hierarchy: - :x: **nekohtml-1.9.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-democorp/easybuggy-lvp/commit/4afba820e35532010e5668591baf0bbbb1da4148">4afba820e35532010e5668591baf0bbbb1da4148</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> HtmlUnit NekoHtml Parser before 2.61.0 suffers from a denial of service vulnerability. Crafted input associated with the parsing of Processing Instruction (PI) data leads to heap memory consumption. This is similar to CVE-2022-28366 but affects a much later version of the product. <p>Publish Date: 2022-04-25 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-29546>CVE-2022-29546</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-04-25</p> <p>Fix Resolution: net.sourceforge.htmlunit:neko-htmlunit:2.61.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-24839</summary> ### Vulnerable Library - <b>nekohtml-1.9.16.jar</b></p> <p>An HTML parser and tag balancer.</p> <p>Library home page: <a href="http://nekohtml.sourceforge.net/">http://nekohtml.sourceforge.net/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/nekohtml-1.9.16.jar,/home/wss-scanner/.m2/repository/net/sourceforge/nekohtml/nekohtml/1.9.16/nekohtml-1.9.16.jar</p> <p> Dependency Hierarchy: - :x: **nekohtml-1.9.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-democorp/easybuggy-lvp/commit/4afba820e35532010e5668591baf0bbbb1da4148">4afba820e35532010e5668591baf0bbbb1da4148</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> org.cyberneko.html is an html parser written in Java. The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. Users are advised to upgrade to `>= 1.9.22.noko2`. Note: The upstream library `org.cyberneko.html` is no longer maintained. Nokogiri uses its own fork of this library located at https://github.com/sparklemotion/nekohtml and this CVE applies only to that fork. Other forks of nekohtml may have a similar vulnerability. <p>Publish Date: 2022-04-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-24839>CVE-2022-24839</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv">https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv</a></p> <p>Release Date: 2022-04-11</p> <p>Fix Resolution: net.sourceforge.nekohtml:nekohtml:1.9.22.noko2</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details> *** <p>In order to enable automatic remediation for this issue, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p>
True
nekohtml-1.9.16.jar: 3 vulnerabilities (highest severity is: 7.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>nekohtml-1.9.16.jar</b></p></summary> <p>An HTML parser and tag balancer.</p> <p>Library home page: <a href="http://nekohtml.sourceforge.net/">http://nekohtml.sourceforge.net/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/nekohtml-1.9.16.jar,/home/wss-scanner/.m2/repository/net/sourceforge/nekohtml/nekohtml/1.9.16/nekohtml-1.9.16.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/samq-democorp/easybuggy-lvp/commit/4afba820e35532010e5668591baf0bbbb1da4148">4afba820e35532010e5668591baf0bbbb1da4148</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (nekohtml version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-28366](https://www.mend.io/vulnerability-database/CVE-2022-28366) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | nekohtml-1.9.16.jar | Direct | net.sourceforge.htmlunit:neko-htmlunit:2.27 | &#9989; | | [CVE-2022-29546](https://www.mend.io/vulnerability-database/CVE-2022-29546) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | nekohtml-1.9.16.jar | Direct | net.sourceforge.htmlunit:neko-htmlunit:2.61.0 | &#9989; | | [CVE-2022-24839](https://www.mend.io/vulnerability-database/CVE-2022-24839) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | nekohtml-1.9.16.jar | Direct | net.sourceforge.nekohtml:nekohtml:1.9.22.noko2 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-28366</summary> ### Vulnerable Library - <b>nekohtml-1.9.16.jar</b></p> <p>An HTML parser and tag balancer.</p> <p>Library home page: <a href="http://nekohtml.sourceforge.net/">http://nekohtml.sourceforge.net/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/nekohtml-1.9.16.jar,/home/wss-scanner/.m2/repository/net/sourceforge/nekohtml/nekohtml/1.9.16/nekohtml-1.9.16.jar</p> <p> Dependency Hierarchy: - :x: **nekohtml-1.9.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-democorp/easybuggy-lvp/commit/4afba820e35532010e5668591baf0bbbb1da4148">4afba820e35532010e5668591baf0bbbb1da4148</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839. <p>Publish Date: 2022-04-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-28366>CVE-2022-28366</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-g9hh-vvx3-v37v">https://github.com/advisories/GHSA-g9hh-vvx3-v37v</a></p> <p>Release Date: 2022-04-21</p> <p>Fix Resolution: net.sourceforge.htmlunit:neko-htmlunit:2.27</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-29546</summary> ### Vulnerable Library - <b>nekohtml-1.9.16.jar</b></p> <p>An HTML parser and tag balancer.</p> <p>Library home page: <a href="http://nekohtml.sourceforge.net/">http://nekohtml.sourceforge.net/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/nekohtml-1.9.16.jar,/home/wss-scanner/.m2/repository/net/sourceforge/nekohtml/nekohtml/1.9.16/nekohtml-1.9.16.jar</p> <p> Dependency Hierarchy: - :x: **nekohtml-1.9.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-democorp/easybuggy-lvp/commit/4afba820e35532010e5668591baf0bbbb1da4148">4afba820e35532010e5668591baf0bbbb1da4148</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> HtmlUnit NekoHtml Parser before 2.61.0 suffers from a denial of service vulnerability. Crafted input associated with the parsing of Processing Instruction (PI) data leads to heap memory consumption. This is similar to CVE-2022-28366 but affects a much later version of the product. <p>Publish Date: 2022-04-25 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-29546>CVE-2022-29546</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-04-25</p> <p>Fix Resolution: net.sourceforge.htmlunit:neko-htmlunit:2.61.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-24839</summary> ### Vulnerable Library - <b>nekohtml-1.9.16.jar</b></p> <p>An HTML parser and tag balancer.</p> <p>Library home page: <a href="http://nekohtml.sourceforge.net/">http://nekohtml.sourceforge.net/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /target/easybuggy-1-SNAPSHOT/WEB-INF/lib/nekohtml-1.9.16.jar,/home/wss-scanner/.m2/repository/net/sourceforge/nekohtml/nekohtml/1.9.16/nekohtml-1.9.16.jar</p> <p> Dependency Hierarchy: - :x: **nekohtml-1.9.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-democorp/easybuggy-lvp/commit/4afba820e35532010e5668591baf0bbbb1da4148">4afba820e35532010e5668591baf0bbbb1da4148</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> org.cyberneko.html is an html parser written in Java. The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. Users are advised to upgrade to `>= 1.9.22.noko2`. Note: The upstream library `org.cyberneko.html` is no longer maintained. Nokogiri uses its own fork of this library located at https://github.com/sparklemotion/nekohtml and this CVE applies only to that fork. Other forks of nekohtml may have a similar vulnerability. <p>Publish Date: 2022-04-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-24839>CVE-2022-24839</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv">https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv</a></p> <p>Release Date: 2022-04-11</p> <p>Fix Resolution: net.sourceforge.nekohtml:nekohtml:1.9.22.noko2</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details> *** <p>In order to enable automatic remediation for this issue, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p>
non_usab
nekohtml jar vulnerabilities highest severity is vulnerable library nekohtml jar an html parser and tag balancer library home page a href path to dependency file pom xml path to vulnerable library target easybuggy snapshot web inf lib nekohtml jar home wss scanner repository net sourceforge nekohtml nekohtml nekohtml jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in nekohtml version remediation available high nekohtml jar direct net sourceforge htmlunit neko htmlunit high nekohtml jar direct net sourceforge htmlunit neko htmlunit high nekohtml jar direct net sourceforge nekohtml nekohtml details cve vulnerable library nekohtml jar an html parser and tag balancer library home page a href path to dependency file pom xml path to vulnerable library target easybuggy snapshot web inf lib nekohtml jar home wss scanner repository net sourceforge nekohtml nekohtml nekohtml jar dependency hierarchy x nekohtml jar vulnerable library found in head commit a href found in base branch master vulnerability details certain neko related html parsers allow a denial of service via crafted processing instruction pi input that causes excessive heap memory consumption in particular this issue exists in htmlunit neko through and is fixed in this issue also exists in cyberneko html through also affecting owasp antisamy before but is the last version of cyberneko html note this may be related to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution net sourceforge htmlunit neko htmlunit in order to enable automatic remediation please create cve vulnerable library nekohtml jar an html parser and tag balancer library home page a href path to dependency file pom xml path to vulnerable library target easybuggy snapshot web inf lib nekohtml jar home wss scanner repository net sourceforge nekohtml nekohtml nekohtml jar dependency hierarchy x nekohtml jar vulnerable library found in head commit a href found in base branch master vulnerability details htmlunit nekohtml parser before suffers from a denial of service vulnerability crafted input associated with the parsing of processing instruction pi data leads to heap memory consumption this is similar to cve but affects a much later version of the product publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution net sourceforge htmlunit neko htmlunit in order to enable automatic remediation please create cve vulnerable library nekohtml jar an html parser and tag balancer library home page a href path to dependency file pom xml path to vulnerable library target easybuggy snapshot web inf lib nekohtml jar home wss scanner repository net sourceforge nekohtml nekohtml nekohtml jar dependency hierarchy x nekohtml jar vulnerable library found in head commit a href found in base branch master vulnerability details org cyberneko html is an html parser written in java the fork of org cyberneko html used by nokogiri rubygem raises a java lang outofmemoryerror exception when parsing ill formed html markup users are advised to upgrade to note the upstream library org cyberneko html is no longer maintained nokogiri uses its own fork of this library located at and this cve applies only to that fork other forks of nekohtml may have a similar vulnerability publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution net sourceforge nekohtml nekohtml in order to enable automatic remediation please create in order to enable automatic remediation for this issue please create
0
22,854
20,368,594,408
IssuesEvent
2022-02-21 09:02:10
prologdb/runtime
https://api.github.com/repos/prologdb/runtime
closed
Detailed Exceptions
usability embed
In every place where currently a `PrologRuntimeException` is being thrown, introduce an exception class (as a subclass of `PrologRuntimeException`) that clearly describes this failure mode, along with important information about the failure.
True
Detailed Exceptions - In every place where currently a `PrologRuntimeException` is being thrown, introduce an exception class (as a subclass of `PrologRuntimeException`) that clearly describes this failure mode, along with important information about the failure.
usab
detailed exceptions in every place where currently a prologruntimeexception is being thrown introduce an exception class as a subclass of prologruntimeexception that clearly describes this failure mode along with important information about the failure
1
171,720
20,987,800,282
IssuesEvent
2022-03-29 06:14:12
Satheesh575555/external_pdfium
https://api.github.com/repos/Satheesh575555/external_pdfium
opened
CVE-2018-6616 (Medium) detected in external_pdfiumtinker_edge_r-android9-1.0.2
security vulnerability
## CVE-2018-6616 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>external_pdfiumtinker_edge_r-android9-1.0.2</b></p></summary> <p> <p>Library home page: <a href=https://github.com/TinkerEdgeR-Android/external_pdfium.git>https://github.com/TinkerEdgeR-Android/external_pdfium.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/external_pdfium/commit/ac9e7ad2804cd2e179b787cb6e286be7591f4014">ac9e7ad2804cd2e179b787cb6e286be7591f4014</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/third_party/libopenjpeg20/t1.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. <p>Publish Date: 2018-02-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-6616>CVE-2018-6616</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-6616">https://nvd.nist.gov/vuln/detail/CVE-2018-6616</a></p> <p>Release Date: 2018-02-04</p> <p>Fix Resolution: openjpeg2-tools - 2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1;openjpeg2-debuginfo - 2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1;openjpeg2-devel-docs - 2.3.1-1,2.3.1-1;openjpeg2 - 2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1;openjpeg2-devel - 2.3.1-1,2.3.1-1,2.3.1-1;openjpeg2-tools-debuginfo - 2.3.1-1,2.3.1-1;openjpeg2-debugsource - 2.3.1-1,2.3.1-1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-6616 (Medium) detected in external_pdfiumtinker_edge_r-android9-1.0.2 - ## CVE-2018-6616 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>external_pdfiumtinker_edge_r-android9-1.0.2</b></p></summary> <p> <p>Library home page: <a href=https://github.com/TinkerEdgeR-Android/external_pdfium.git>https://github.com/TinkerEdgeR-Android/external_pdfium.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/external_pdfium/commit/ac9e7ad2804cd2e179b787cb6e286be7591f4014">ac9e7ad2804cd2e179b787cb6e286be7591f4014</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/third_party/libopenjpeg20/t1.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. <p>Publish Date: 2018-02-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-6616>CVE-2018-6616</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-6616">https://nvd.nist.gov/vuln/detail/CVE-2018-6616</a></p> <p>Release Date: 2018-02-04</p> <p>Fix Resolution: openjpeg2-tools - 2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1;openjpeg2-debuginfo - 2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1;openjpeg2-devel-docs - 2.3.1-1,2.3.1-1;openjpeg2 - 2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1,2.3.1-1;openjpeg2-devel - 2.3.1-1,2.3.1-1,2.3.1-1;openjpeg2-tools-debuginfo - 2.3.1-1,2.3.1-1;openjpeg2-debugsource - 2.3.1-1,2.3.1-1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve medium detected in external pdfiumtinker edge r cve medium severity vulnerability vulnerable library external pdfiumtinker edge r library home page a href found in head commit a href found in base branch master vulnerable source files third party c vulnerability details in openjpeg there is excessive iteration in the opj encode cblks function of c remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tools debuginfo devel docs devel tools debuginfo debugsource step up your open source security game with whitesource
0
62,464
6,797,429,522
IssuesEvent
2017-11-01 22:52:03
dondi/GRNsight
https://api.github.com/repos/dondi/GRNsight
closed
Add "syntactic" tests for graphml format
feature request priority 0 review requested testing
Need to add more tests for graphml format input files. @ebachoura and @eileenchoe can either split SIF and graphml or both work on both. Discuss with @dondi this week.
1.0
Add "syntactic" tests for graphml format - Need to add more tests for graphml format input files. @ebachoura and @eileenchoe can either split SIF and graphml or both work on both. Discuss with @dondi this week.
non_usab
add syntactic tests for graphml format need to add more tests for graphml format input files ebachoura and eileenchoe can either split sif and graphml or both work on both discuss with dondi this week
0
27,315
28,089,806,620
IssuesEvent
2023-03-30 12:21:05
humhub/humhub
https://api.github.com/repos/humhub/humhub
closed
Filtering for 'Country' in the Discovery module shows all countries
Kind:Enhancement Topic:Usability
When enabling `Use as Directory filter` on the Country attribute of user profiles the according dropw-down menu on the `People` pages shows all countries. Enabling the option for `First name` creates a drop-down menu that only contains names People have entered into their profile. As the list of all countries is very long, IMO a more intuitive way to present the `Country` filter would be using the pattern of the `First name` filter: showing only countries that have been entered into user profiles.
True
Filtering for 'Country' in the Discovery module shows all countries - When enabling `Use as Directory filter` on the Country attribute of user profiles the according dropw-down menu on the `People` pages shows all countries. Enabling the option for `First name` creates a drop-down menu that only contains names People have entered into their profile. As the list of all countries is very long, IMO a more intuitive way to present the `Country` filter would be using the pattern of the `First name` filter: showing only countries that have been entered into user profiles.
usab
filtering for country in the discovery module shows all countries when enabling use as directory filter on the country attribute of user profiles the according dropw down menu on the people pages shows all countries enabling the option for first name creates a drop down menu that only contains names people have entered into their profile as the list of all countries is very long imo a more intuitive way to present the country filter would be using the pattern of the first name filter showing only countries that have been entered into user profiles
1
4,751
4,613,967,598
IssuesEvent
2016-09-25 09:39:33
morganey-lang/Morganey
https://api.github.com/repos/morganey-lang/Morganey
opened
Compile Morganey with scala native
performance proposal research
https://github.com/scala-native/scala-native I want to research the possibilities of using that thing to improve the performance of Morganey.
True
Compile Morganey with scala native - https://github.com/scala-native/scala-native I want to research the possibilities of using that thing to improve the performance of Morganey.
non_usab
compile morganey with scala native i want to research the possibilities of using that thing to improve the performance of morganey
0
21,787
17,761,886,462
IssuesEvent
2021-08-29 21:11:46
godotengine/godot
https://api.github.com/repos/godotengine/godot
opened
Find Next shortcut not working when search bar is focused
bug topic:editor usability topic:input regression
### Godot version 3a3c94b ### System information W10 ### Issue description Title. ### Steps to reproduce 1. Open any script in Script Editor 2. Select some word that has multiple occurrences 3. Press Ctrl + F 4. Press F3 5. No effect, editor doesn't go to the next word ### Minimal reproduction project _No response_
True
Find Next shortcut not working when search bar is focused - ### Godot version 3a3c94b ### System information W10 ### Issue description Title. ### Steps to reproduce 1. Open any script in Script Editor 2. Select some word that has multiple occurrences 3. Press Ctrl + F 4. Press F3 5. No effect, editor doesn't go to the next word ### Minimal reproduction project _No response_
usab
find next shortcut not working when search bar is focused godot version system information issue description title steps to reproduce open any script in script editor select some word that has multiple occurrences press ctrl f press no effect editor doesn t go to the next word minimal reproduction project no response
1
778,673
27,324,585,334
IssuesEvent
2023-02-25 00:03:59
Igalia/wolvic
https://api.github.com/repos/Igalia/wolvic
closed
Cant install the PICO XR build on Pico4. Its lloading till 90% than tells that "installation not possible". Did the latest Pico OS update, downloaded Wolvic apk through your website. Weird.
bug priority-high
Cant install the PICO XR build on Pico4. Its lloading till 90% than tells that "installation not possible". Did the latest Pico OS update, downloaded Wolvic apk through your website. Weird.
1.0
Cant install the PICO XR build on Pico4. Its lloading till 90% than tells that "installation not possible". Did the latest Pico OS update, downloaded Wolvic apk through your website. Weird. - Cant install the PICO XR build on Pico4. Its lloading till 90% than tells that "installation not possible". Did the latest Pico OS update, downloaded Wolvic apk through your website. Weird.
non_usab
cant install the pico xr build on its lloading till than tells that installation not possible did the latest pico os update downloaded wolvic apk through your website weird cant install the pico xr build on its lloading till than tells that installation not possible did the latest pico os update downloaded wolvic apk through your website weird
0
24,548
23,898,415,267
IssuesEvent
2022-09-08 16:30:56
tailscale/tailscale
https://api.github.com/repos/tailscale/tailscale
closed
tsconnect: resizing terminal window causes panic
L5 All users T6 Major usability needs-triage bug
### What is the issue? resizing terminal window causes a panic: ``` 5:48:38.949 panic: runtime error: invalid memory address or nil pointer dereference [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.949 [signal 0xb code=0x0 addr=0x0 pc=0x0] [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.950 <empty string> [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.950 goroutine 6 [running]: [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.950 golang.org/x/crypto/ssh.(*Session).WindowChange(0x0, 0x18, 0x49) [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.950 golang.org/x/crypto@v0.0.0-20220427172511-eb4f295cb31f/ssh/session.go:251 +0xa [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 main.(*jsSSHSession).Resize(...) [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 tailscale.com/cmd/tsconnect/wasm/wasm_js.go:441 [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 main.(*jsIPN).ssh.func2({{}, 0x7ff80001000007a9, 0x1401348}, {0xfb0720, 0x2, 0x2}) [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 tailscale.com/cmd/tsconnect/wasm/wasm_js.go:335 +0x16 [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 syscall/js.handleEvent() [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 syscall/js/func.go:94 +0x26 [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) ``` Browser: Firefox (also seen in Chrome)
True
tsconnect: resizing terminal window causes panic - ### What is the issue? resizing terminal window causes a panic: ``` 5:48:38.949 panic: runtime error: invalid memory address or nil pointer dereference [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.949 [signal 0xb code=0x0 addr=0x0 pc=0x0] [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.950 <empty string> [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.950 goroutine 6 [running]: [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.950 golang.org/x/crypto/ssh.(*Session).WindowChange(0x0, 0x18, 0x49) [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.950 golang.org/x/crypto@v0.0.0-20220427172511-eb4f295cb31f/ssh/session.go:251 +0xa [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 main.(*jsSSHSession).Resize(...) [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 tailscale.com/cmd/tsconnect/wasm/wasm_js.go:441 [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 main.(*jsIPN).ssh.func2({{}, 0x7ff80001000007a9, 0x1401348}, {0xfb0720, 0x2, 0x2}) [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 tailscale.com/cmd/tsconnect/wasm/wasm_js.go:335 +0x16 [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 syscall/js.handleEvent() [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) 15:48:38.951 syscall/js/func.go:94 +0x26 [wasm_exec.js:22:13](http://localhost:31544/.cache/tailscale-go/misc/wasm/wasm_exec.js) ``` Browser: Firefox (also seen in Chrome)
usab
tsconnect resizing terminal window causes panic what is the issue resizing terminal window causes a panic panic runtime error invalid memory address or nil pointer dereference goroutine golang org x crypto ssh session windowchange golang org x crypto ssh session go main jssshsession resize tailscale com cmd tsconnect wasm wasm js go main jsipn ssh tailscale com cmd tsconnect wasm wasm js go syscall js handleevent syscall js func go browser firefox also seen in chrome
1
16,330
9,370,019,669
IssuesEvent
2019-04-03 12:35:06
arcus-azure/arcus.security
https://api.github.com/repos/arcus-azure/arcus.security
closed
Provide resiliency for service-side throttling for Azure Key Vault
azure-key-vault enhancement performance resiliency
Provide resiliency for service-side throttling by retrying `HTTP 429 TOO MANY REQUESTS`. **Describe the solution you'd like** These should be handled according by using Polly based on the recommended guidance documented [here](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-ovw-throttling#recommended-client-side-throttling-method).
True
Provide resiliency for service-side throttling for Azure Key Vault - Provide resiliency for service-side throttling by retrying `HTTP 429 TOO MANY REQUESTS`. **Describe the solution you'd like** These should be handled according by using Polly based on the recommended guidance documented [here](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-ovw-throttling#recommended-client-side-throttling-method).
non_usab
provide resiliency for service side throttling for azure key vault provide resiliency for service side throttling by retrying http too many requests describe the solution you d like these should be handled according by using polly based on the recommended guidance documented
0
286,626
21,582,297,251
IssuesEvent
2022-05-02 20:08:13
NOAA-FIMS/FIMS
https://api.github.com/repos/NOAA-FIMS/FIMS
closed
Questions: Do developers need to update documentation locally and check in updates?
kind: documentation kind: question
Hi @k-doering-NOAA , @Andrea-Havron-NOAA brought up a great question regarding call-doc-and-style-r.yml in the pull request #54. When working on a feature branch, do developers need to run devtools::check(), or devtools::document(), or roxygen2::roxygenise() locally and then check in updated documents (e.g., NAMESPACE)? I noticed that FIMS runs [call-doc-and-style-r.yml](https://github.com/NOAA-FIMS/FIMS/blob/main/.github/workflows/call-doc-and-style-r.yml) on main branch. I wonder if we need to run the workflow on feature branches as well and add NAMESPACE to .gitignore, so developers do not need to check in updated documentation to the repo. Thanks!
1.0
Questions: Do developers need to update documentation locally and check in updates? - Hi @k-doering-NOAA , @Andrea-Havron-NOAA brought up a great question regarding call-doc-and-style-r.yml in the pull request #54. When working on a feature branch, do developers need to run devtools::check(), or devtools::document(), or roxygen2::roxygenise() locally and then check in updated documents (e.g., NAMESPACE)? I noticed that FIMS runs [call-doc-and-style-r.yml](https://github.com/NOAA-FIMS/FIMS/blob/main/.github/workflows/call-doc-and-style-r.yml) on main branch. I wonder if we need to run the workflow on feature branches as well and add NAMESPACE to .gitignore, so developers do not need to check in updated documentation to the repo. Thanks!
non_usab
questions do developers need to update documentation locally and check in updates hi k doering noaa andrea havron noaa brought up a great question regarding call doc and style r yml in the pull request when working on a feature branch do developers need to run devtools check or devtools document or roxygenise locally and then check in updated documents e g namespace i noticed that fims runs on main branch i wonder if we need to run the workflow on feature branches as well and add namespace to gitignore so developers do not need to check in updated documentation to the repo thanks
0
26,562
26,974,892,723
IssuesEvent
2023-02-09 08:50:16
redpanda-data/documentation
https://api.github.com/repos/redpanda-data/documentation
opened
Provide more details on how to customize Helm charts
kubernetes usability improvement
### Describe the Issue Some users may not be familiar with Helm or how they can/should configure the charts. We should provide more context in any relevant topics by taking some details from this Helm doc: https://helm.sh/docs/intro/using_helm/#customizing-the-chart-before-installing ### Updates to existing documentation Any guides that deal with deploying Redpanda using Helm. ### New feature or content gap requests <!-- If this is a new feature, provide material that will help the writer draft the new or updated content. If an issue only includes the name of a feature and release, it will be marked “More Info Needed” or “Blocked”. Ideally, the issue will provide: - Links to internal wikis, PRDs, design docs, KIPs, training material, or slide decks. - Links to engineering PRs that implement the update. - Links to blog posts, if applicable. - Identify specific Slack channels that the writer can join to get more details about the feature. - Links to Slack conversations (RP and RP Community) about the issue. - Names of SMEs who can answer questions and act as reviewers (at least one engineer and one PM). - Any additional information that will be of use to the writer. --> ### If new feature, in which release is it included or expected? ### If the requested update is from customer feedback or a Community slack conversation, provide a link: ### Additional notes <!-- Documentation Issues must be distinct and not overlap. If filing an Issue for a feature that spans platform and cloud, you must file two separate Issues. Each Issue will drive the new content in GitHub for the respective platform or cloud doc. Include: - Relevant GitHub issues and pull requests - Dependencies on other features or components - Specific Redpanda contributors to notify -->
True
Provide more details on how to customize Helm charts - ### Describe the Issue Some users may not be familiar with Helm or how they can/should configure the charts. We should provide more context in any relevant topics by taking some details from this Helm doc: https://helm.sh/docs/intro/using_helm/#customizing-the-chart-before-installing ### Updates to existing documentation Any guides that deal with deploying Redpanda using Helm. ### New feature or content gap requests <!-- If this is a new feature, provide material that will help the writer draft the new or updated content. If an issue only includes the name of a feature and release, it will be marked “More Info Needed” or “Blocked”. Ideally, the issue will provide: - Links to internal wikis, PRDs, design docs, KIPs, training material, or slide decks. - Links to engineering PRs that implement the update. - Links to blog posts, if applicable. - Identify specific Slack channels that the writer can join to get more details about the feature. - Links to Slack conversations (RP and RP Community) about the issue. - Names of SMEs who can answer questions and act as reviewers (at least one engineer and one PM). - Any additional information that will be of use to the writer. --> ### If new feature, in which release is it included or expected? ### If the requested update is from customer feedback or a Community slack conversation, provide a link: ### Additional notes <!-- Documentation Issues must be distinct and not overlap. If filing an Issue for a feature that spans platform and cloud, you must file two separate Issues. Each Issue will drive the new content in GitHub for the respective platform or cloud doc. Include: - Relevant GitHub issues and pull requests - Dependencies on other features or components - Specific Redpanda contributors to notify -->
usab
provide more details on how to customize helm charts describe the issue some users may not be familiar with helm or how they can should configure the charts we should provide more context in any relevant topics by taking some details from this helm doc updates to existing documentation any guides that deal with deploying redpanda using helm new feature or content gap requests if this is a new feature provide material that will help the writer draft the new or updated content if an issue only includes the name of a feature and release it will be marked “more info needed” or “blocked” ideally the issue will provide links to internal wikis prds design docs kips training material or slide decks links to engineering prs that implement the update links to blog posts if applicable identify specific slack channels that the writer can join to get more details about the feature links to slack conversations rp and rp community about the issue names of smes who can answer questions and act as reviewers at least one engineer and one pm any additional information that will be of use to the writer if new feature in which release is it included or expected if the requested update is from customer feedback or a community slack conversation provide a link additional notes documentation issues must be distinct and not overlap if filing an issue for a feature that spans platform and cloud you must file two separate issues each issue will drive the new content in github for the respective platform or cloud doc include relevant github issues and pull requests dependencies on other features or components specific redpanda contributors to notify
1
106,802
11,498,642,914
IssuesEvent
2020-02-12 12:25:51
FAIRplus/the-fair-cookbook
https://api.github.com/repos/FAIRplus/the-fair-cookbook
opened
Terminology and Ontology Services:
Findability Initial capability Interoperability documentation
# Recipe1: Anonymizing Patient Data **identifier:** **authors:** Tony Burdett Fuqi Xu **maintainers:** **version:** **license** ## Ingredients: Identifier Schema: 1. Metadata Model: - - - 2. Vocabularies and Terminologies: - - - 3. Data Format: - - - 4. Tools and Software: - OLS - - ## Objectives: Deployment and Maintaining a vocabulary service ## Step by Step Process: ### Step1: ### Step2: ### Step3: ### Step4: ### Step5: ...
1.0
Terminology and Ontology Services: - # Recipe1: Anonymizing Patient Data **identifier:** **authors:** Tony Burdett Fuqi Xu **maintainers:** **version:** **license** ## Ingredients: Identifier Schema: 1. Metadata Model: - - - 2. Vocabularies and Terminologies: - - - 3. Data Format: - - - 4. Tools and Software: - OLS - - ## Objectives: Deployment and Maintaining a vocabulary service ## Step by Step Process: ### Step1: ### Step2: ### Step3: ### Step4: ### Step5: ...
non_usab
terminology and ontology services anonymizing patient data identifier authors tony burdett fuqi xu maintainers version license ingredients identifier schema metadata model vocabularies and terminologies data format tools and software ols objectives deployment and maintaining a vocabulary service step by step process
0
24,738
24,207,036,486
IssuesEvent
2022-09-25 11:33:40
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
reopened
After DB::Exception, clickhouse ask password again.
usability st-fixed comp-cli minor
I had run the query with tailing "FORMAT VERTICAL", But clickhouse server throw DB::Exception. ``` Exception on client: Code: 73. DB::Exception: Unknown format VERTICAL ``` After this error, clickhouse client ask password agiain like this. ``` ch_7 :) select version(); SELECT version() ┌─version()─┐ │ 18.12.17 │ └───────────┘ select * from matt FORMAT VERTICAL; Exception on client: Code: 73. DB::Exception: Unknown format VERTICAL Password for user matt_lee: Connecting to database matt at localhost:9000 as user matt_lee. Connected to ClickHouse server version 18.12.17 revision 54407. ch_7 :) ``` But there's no password asking when syntax error of the other query. Is this really connection is closed ? And one more thing is that why upper-case "VERTICAL" is not allowed ?
True
After DB::Exception, clickhouse ask password again. - I had run the query with tailing "FORMAT VERTICAL", But clickhouse server throw DB::Exception. ``` Exception on client: Code: 73. DB::Exception: Unknown format VERTICAL ``` After this error, clickhouse client ask password agiain like this. ``` ch_7 :) select version(); SELECT version() ┌─version()─┐ │ 18.12.17 │ └───────────┘ select * from matt FORMAT VERTICAL; Exception on client: Code: 73. DB::Exception: Unknown format VERTICAL Password for user matt_lee: Connecting to database matt at localhost:9000 as user matt_lee. Connected to ClickHouse server version 18.12.17 revision 54407. ch_7 :) ``` But there's no password asking when syntax error of the other query. Is this really connection is closed ? And one more thing is that why upper-case "VERTICAL" is not allowed ?
usab
after db exception clickhouse ask password again i had run the query with tailing format vertical but clickhouse server throw db exception exception on client code db exception unknown format vertical after this error clickhouse client ask password agiain like this ch select version select version ┌─version ─┐ │ │ └───────────┘ select from matt format vertical exception on client code db exception unknown format vertical password for user matt lee connecting to database matt at localhost as user matt lee connected to clickhouse server version revision ch but there s no password asking when syntax error of the other query is this really connection is closed and one more thing is that why upper case vertical is not allowed
1
25,823
25,960,001,906
IssuesEvent
2022-12-18 19:28:10
kubernetes/test-infra
https://api.github.com/repos/kubernetes/test-infra
closed
Prow presubmit job not able to create PV using PVC
kind/bug lifecycle/rotten sig/usability
<!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!--> **What happened**: Seems like a presubmit prow job is not able to create a volume by using "volume claim template" described in the presubmit job yaml. I am trying to use the volume claim template to create a PV from volume snapshot "data source" in the yaml. The mount paths come up empty. The setup works fine when tested with a POD but not with prowjob yaml. Eg: volumes: - name: try-vol ephemeral: volumeClaimTemplate: spec: accessModes: - ReadWriteOnce storageClassName: "xxx-xxx-x-x" resources: requests: storage: 60Gi dataSource: name: snapshot kind: VolumeSnapshot apiGroup: snapshot.storage.k8s.io **What you expected to happen**: PV should have been created and the mount paths in the pod should have been populated. **How to reproduce it (as minimally and precisely as possible)**: **Please provide links to example occurrences, if any**: N/A **Anything else we need to know?**:
True
Prow presubmit job not able to create PV using PVC - <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!--> **What happened**: Seems like a presubmit prow job is not able to create a volume by using "volume claim template" described in the presubmit job yaml. I am trying to use the volume claim template to create a PV from volume snapshot "data source" in the yaml. The mount paths come up empty. The setup works fine when tested with a POD but not with prowjob yaml. Eg: volumes: - name: try-vol ephemeral: volumeClaimTemplate: spec: accessModes: - ReadWriteOnce storageClassName: "xxx-xxx-x-x" resources: requests: storage: 60Gi dataSource: name: snapshot kind: VolumeSnapshot apiGroup: snapshot.storage.k8s.io **What you expected to happen**: PV should have been created and the mount paths in the pod should have been populated. **How to reproduce it (as minimally and precisely as possible)**: **Please provide links to example occurrences, if any**: N/A **Anything else we need to know?**:
usab
prow presubmit job not able to create pv using pvc what happened seems like a presubmit prow job is not able to create a volume by using volume claim template described in the presubmit job yaml i am trying to use the volume claim template to create a pv from volume snapshot data source in the yaml the mount paths come up empty the setup works fine when tested with a pod but not with prowjob yaml eg volumes name try vol ephemeral volumeclaimtemplate spec accessmodes readwriteonce storageclassname xxx xxx x x resources requests storage datasource name snapshot kind volumesnapshot apigroup snapshot storage io what you expected to happen pv should have been created and the mount paths in the pod should have been populated how to reproduce it as minimally and precisely as possible please provide links to example occurrences if any n a anything else we need to know
1
345,653
24,868,774,081
IssuesEvent
2022-10-27 13:51:54
astanin/python-tabulate
https://api.github.com/repos/astanin/python-tabulate
closed
Update Mediawiki example in the README file
documentation
After pull request #210 Mediawiki format has changed. The README file still shows the old output.
1.0
Update Mediawiki example in the README file - After pull request #210 Mediawiki format has changed. The README file still shows the old output.
non_usab
update mediawiki example in the readme file after pull request mediawiki format has changed the readme file still shows the old output
0
119,554
25,536,611,720
IssuesEvent
2022-11-29 12:28:47
Regalis11/Barotrauma
https://api.github.com/repos/Regalis11/Barotrauma
closed
Iron helmet can be found in stores
Bug Code Design Unstable
### Disclaimers - [X] I have searched the issue tracker to check if the issue has already been reported. - [ ] My issue happened while using mods. ### What happened? ![image](https://user-images.githubusercontent.com/104232152/200136941-2c6603f8-1239-410a-9c4c-d04336f4386a.png) Simply, the makeshift armor isnt in stores anymore, the iron helmet still is. Happened on a residential Outpost, if that helps. ### Reproduction steps 1.Check stores for iron Helmets ### Bug prevalence Happens every time I play ### Version Faction test branch ### - _No response_ ### Which operating system did you encounter this bug on? Windows ### Relevant error messages and crash reports _No response_
1.0
Iron helmet can be found in stores - ### Disclaimers - [X] I have searched the issue tracker to check if the issue has already been reported. - [ ] My issue happened while using mods. ### What happened? ![image](https://user-images.githubusercontent.com/104232152/200136941-2c6603f8-1239-410a-9c4c-d04336f4386a.png) Simply, the makeshift armor isnt in stores anymore, the iron helmet still is. Happened on a residential Outpost, if that helps. ### Reproduction steps 1.Check stores for iron Helmets ### Bug prevalence Happens every time I play ### Version Faction test branch ### - _No response_ ### Which operating system did you encounter this bug on? Windows ### Relevant error messages and crash reports _No response_
non_usab
iron helmet can be found in stores disclaimers i have searched the issue tracker to check if the issue has already been reported my issue happened while using mods what happened simply the makeshift armor isnt in stores anymore the iron helmet still is happened on a residential outpost if that helps reproduction steps check stores for iron helmets bug prevalence happens every time i play version faction test branch no response which operating system did you encounter this bug on windows relevant error messages and crash reports no response
0
1,840
3,025,022,079
IssuesEvent
2015-08-03 03:55:34
lionheart/openradar-mirror
https://api.github.com/repos/lionheart/openradar-mirror
opened
21782270: Title of the Simulator window is mostly useless
classification:ui/usabiblity reproducible:always status:open
#### Description See some screenshots at http://www.openradar.me/21782228 More than often, we don't know what kind of iPhone or Watch we are currently running. Sure, it's in the Window Title... But this one is mostly too small to read anything else than "Simulator" (which, really, shouldn't be part of the Window Title) - Product Version: Version 7.0 beta 3 (7A152u) Created: 2015-07-11T19:00:33.350770 Originated: 2015-07-11T00:00:00 Open Radar Link: http://www.openradar.me/21782270
True
21782270: Title of the Simulator window is mostly useless - #### Description See some screenshots at http://www.openradar.me/21782228 More than often, we don't know what kind of iPhone or Watch we are currently running. Sure, it's in the Window Title... But this one is mostly too small to read anything else than "Simulator" (which, really, shouldn't be part of the Window Title) - Product Version: Version 7.0 beta 3 (7A152u) Created: 2015-07-11T19:00:33.350770 Originated: 2015-07-11T00:00:00 Open Radar Link: http://www.openradar.me/21782270
usab
title of the simulator window is mostly useless description see some screenshots at more than often we don t know what kind of iphone or watch we are currently running sure it s in the window title but this one is mostly too small to read anything else than simulator which really shouldn t be part of the window title product version version beta created originated open radar link
1
22,424
10,756,804,700
IssuesEvent
2019-10-31 12:01:17
lnuon/EmpirEqual
https://api.github.com/repos/lnuon/EmpirEqual
opened
WS-2019-0103 (Medium) detected in handlebars-4.0.11.tgz, handlebars-4.0.5.tgz
security vulnerability
## WS-2019-0103 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>handlebars-4.0.11.tgz</b>, <b>handlebars-4.0.5.tgz</b></p></summary> <p> <details><summary><b>handlebars-4.0.11.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/EmpirEqual/src/frontend/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/EmpirEqual/src/frontend/node_modules/react-scripts/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.1.4.tgz (Root Library) - jest-20.0.4.tgz - jest-cli-20.0.4.tgz - istanbul-api-1.3.1.tgz - istanbul-reports-1.3.0.tgz - :x: **handlebars-4.0.11.tgz** (Vulnerable Library) </details> <details><summary><b>handlebars-4.0.5.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/EmpirEqual/src/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/EmpirEqual/src/frontend/node_modules/hbs/node_modules/handlebars/package.json,/tmp/ws-scm/EmpirEqual/src/frontend/node_modules/hbs/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - hbs-4.0.1.tgz (Root Library) - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/lnuon/EmpirEqual/commit/95570e41b1fabd86612a9a88d0ca4afa85bd659b">95570e41b1fabd86612a9a88d0ca4afa85bd659b</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Handlebars.js before 4.1.0 has Remote Code Execution (RCE) <p>Publish Date: 2019-05-30 <p>URL: <a href=https://github.com/wycats/handlebars.js/issues/1267#issue-187151586>WS-2019-0103</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/wycats/handlebars.js/commit/edc6220d51139b32c28e51641fadad59a543ae57">https://github.com/wycats/handlebars.js/commit/edc6220d51139b32c28e51641fadad59a543ae57</a></p> <p>Release Date: 2019-05-30</p> <p>Fix Resolution: 4.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2019-0103 (Medium) detected in handlebars-4.0.11.tgz, handlebars-4.0.5.tgz - ## WS-2019-0103 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>handlebars-4.0.11.tgz</b>, <b>handlebars-4.0.5.tgz</b></p></summary> <p> <details><summary><b>handlebars-4.0.11.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.11.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/EmpirEqual/src/frontend/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/EmpirEqual/src/frontend/node_modules/react-scripts/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.1.4.tgz (Root Library) - jest-20.0.4.tgz - jest-cli-20.0.4.tgz - istanbul-api-1.3.1.tgz - istanbul-reports-1.3.0.tgz - :x: **handlebars-4.0.11.tgz** (Vulnerable Library) </details> <details><summary><b>handlebars-4.0.5.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/EmpirEqual/src/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/EmpirEqual/src/frontend/node_modules/hbs/node_modules/handlebars/package.json,/tmp/ws-scm/EmpirEqual/src/frontend/node_modules/hbs/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - hbs-4.0.1.tgz (Root Library) - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/lnuon/EmpirEqual/commit/95570e41b1fabd86612a9a88d0ca4afa85bd659b">95570e41b1fabd86612a9a88d0ca4afa85bd659b</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Handlebars.js before 4.1.0 has Remote Code Execution (RCE) <p>Publish Date: 2019-05-30 <p>URL: <a href=https://github.com/wycats/handlebars.js/issues/1267#issue-187151586>WS-2019-0103</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/wycats/handlebars.js/commit/edc6220d51139b32c28e51641fadad59a543ae57">https://github.com/wycats/handlebars.js/commit/edc6220d51139b32c28e51641fadad59a543ae57</a></p> <p>Release Date: 2019-05-30</p> <p>Fix Resolution: 4.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
ws medium detected in handlebars tgz handlebars tgz ws medium severity vulnerability vulnerable libraries handlebars tgz handlebars tgz handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file tmp ws scm empirequal src frontend package json path to vulnerable library tmp ws scm empirequal src frontend node modules react scripts node modules handlebars package json dependency hierarchy react scripts tgz root library jest tgz jest cli tgz istanbul api tgz istanbul reports tgz x handlebars tgz vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file tmp ws scm empirequal src package json path to vulnerable library tmp ws scm empirequal src frontend node modules hbs node modules handlebars package json tmp ws scm empirequal src frontend node modules hbs node modules handlebars package json dependency hierarchy hbs tgz root library x handlebars tgz vulnerable library found in head commit a href vulnerability details handlebars js before has remote code execution rce publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
35,007
2,789,730,247
IssuesEvent
2015-05-08 21:07:46
google/google-visualization-api-issues
https://api.github.com/repos/google/google-visualization-api-issues
opened
Automatic play option for Motion Chart
Priority-Low Type-Enhancement
Original [issue 42](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=42) created by google-admin on 2009-09-01T19:28:11.000Z: <b>What would you like to see us add to this API?</b> I would like to see the Motion Chart have an option to start playing as soon as it is loaded (without having to press the play button). <b>What component is this issue related to (PieChart, LineChart, DataTable,</b> <b>Query, etc)?</b> Motion Chart <b>*********************************************************</b> <b>For developers viewing this issue: please click the 'star' icon to be</b> <b>notified of future changes, and to let us know how many of you are</b> <b>interested in seeing it resolved.</b> <b>*********************************************************</b>
1.0
Automatic play option for Motion Chart - Original [issue 42](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=42) created by google-admin on 2009-09-01T19:28:11.000Z: <b>What would you like to see us add to this API?</b> I would like to see the Motion Chart have an option to start playing as soon as it is loaded (without having to press the play button). <b>What component is this issue related to (PieChart, LineChart, DataTable,</b> <b>Query, etc)?</b> Motion Chart <b>*********************************************************</b> <b>For developers viewing this issue: please click the 'star' icon to be</b> <b>notified of future changes, and to let us know how many of you are</b> <b>interested in seeing it resolved.</b> <b>*********************************************************</b>
non_usab
automatic play option for motion chart original created by google admin on what would you like to see us add to this api i would like to see the motion chart have an option to start playing as soon as it is loaded without having to press the play button what component is this issue related to piechart linechart datatable query etc motion chart for developers viewing this issue please click the star icon to be notified of future changes and to let us know how many of you are interested in seeing it resolved
0
46,630
19,344,732,657
IssuesEvent
2021-12-15 09:38:09
IBM-Cloud/terraform-provider-ibm
https://api.github.com/repos/IBM-Cloud/terraform-provider-ibm
closed
IBM Cloud Databases CLI Behavior Update
service/Cloud Databases
From James Thorne (IBM): There's a behaviour change in the ibmcloud CLI that I wanted to give your team a heads up on in case it impacts you. The `ibmcloud resource service-key-create` command has been broken for ICD services -- they've been working with the CLI team on a fix but it's coming with a behaviour change -- the [ROLE] parameter must now not be passed when working with ICD and other non-IAM-enabled services. So `ibmcloud resource service-key-create <key> Administrator --instance-name <name>` is now just `ibmcloud resource service-key-create <key> --instance-name <name>` Does Terraform use the CLI and does that cause any issues on your end? The associated Resource Controller API is unchanged, as is the UI; the change just affects the ibmcloud CLI. For more context the ticket is here: https://github.ibm.com/Bluemix/bluemix-cli/issues/3006
1.0
IBM Cloud Databases CLI Behavior Update - From James Thorne (IBM): There's a behaviour change in the ibmcloud CLI that I wanted to give your team a heads up on in case it impacts you. The `ibmcloud resource service-key-create` command has been broken for ICD services -- they've been working with the CLI team on a fix but it's coming with a behaviour change -- the [ROLE] parameter must now not be passed when working with ICD and other non-IAM-enabled services. So `ibmcloud resource service-key-create <key> Administrator --instance-name <name>` is now just `ibmcloud resource service-key-create <key> --instance-name <name>` Does Terraform use the CLI and does that cause any issues on your end? The associated Resource Controller API is unchanged, as is the UI; the change just affects the ibmcloud CLI. For more context the ticket is here: https://github.ibm.com/Bluemix/bluemix-cli/issues/3006
non_usab
ibm cloud databases cli behavior update from james thorne ibm there s a behaviour change in the ibmcloud cli that i wanted to give your team a heads up on in case it impacts you the ibmcloud resource service key create command has been broken for icd services they ve been working with the cli team on a fix but it s coming with a behaviour change the parameter must now not be passed when working with icd and other non iam enabled services so ibmcloud resource service key create administrator instance name is now just ibmcloud resource service key create instance name does terraform use the cli and does that cause any issues on your end the associated resource controller api is unchanged as is the ui the change just affects the ibmcloud cli for more context the ticket is here
0
57,741
14,200,684,744
IssuesEvent
2020-11-16 06:05:41
SCE-Development/Core-v4
https://api.github.com/repos/SCE-Development/Core-v4
closed
Add Authorization to Backend APIs
API Refactoring enhancement help wanted security
Right now we don't check for access level in our protected APIs. This is easy to add, see below 1. We need a new parameter for `checkIfTokenValid`, `accessLevel` [`api/main_endpoints/util/token-functions.js`](https://github.com/SCE-Development/Core-v4/blob/55ad626d991b3048a917b63abb68620a89911dad/api/main_endpoints/util/token-functions.js#L23) The access level should default to `MEMBERSHIP_STATE.MEMBER` so we dont have to send it in all the time ```js function checkIfTokenValid(request, accessLevel=MEMBERSHIP_STATE.MEMBER) { // basically check if the user's access level >= accessLevel parameter } ``` 2. Refactor all the instances of `checkIfTokenValid` to send in the access level **don't use numbers!** use `MEMBERSHIP_STATE.ADMIN` as a parameter instead of something like `2` or `3`. Example decoded response: ![decoded](https://media.discordapp.net/attachments/622584718898102272/738998338162262026/unknown.png)
True
Add Authorization to Backend APIs - Right now we don't check for access level in our protected APIs. This is easy to add, see below 1. We need a new parameter for `checkIfTokenValid`, `accessLevel` [`api/main_endpoints/util/token-functions.js`](https://github.com/SCE-Development/Core-v4/blob/55ad626d991b3048a917b63abb68620a89911dad/api/main_endpoints/util/token-functions.js#L23) The access level should default to `MEMBERSHIP_STATE.MEMBER` so we dont have to send it in all the time ```js function checkIfTokenValid(request, accessLevel=MEMBERSHIP_STATE.MEMBER) { // basically check if the user's access level >= accessLevel parameter } ``` 2. Refactor all the instances of `checkIfTokenValid` to send in the access level **don't use numbers!** use `MEMBERSHIP_STATE.ADMIN` as a parameter instead of something like `2` or `3`. Example decoded response: ![decoded](https://media.discordapp.net/attachments/622584718898102272/738998338162262026/unknown.png)
non_usab
add authorization to backend apis right now we don t check for access level in our protected apis this is easy to add see below we need a new parameter for checkiftokenvalid accesslevel the access level should default to membership state member so we dont have to send it in all the time js function checkiftokenvalid request accesslevel membership state member basically check if the user s access level accesslevel parameter refactor all the instances of checkiftokenvalid to send in the access level don t use numbers use membership state admin as a parameter instead of something like or example decoded response
0
265,657
23,186,936,263
IssuesEvent
2022-08-01 09:12:19
status-im/status-desktop
https://api.github.com/repos/status-im/status-desktop
closed
TestNet banner overlaps left panel
bug tested E:Bugfixes Settings S:2
# Bug Report ## Description <img width="1012" alt="image" src="https://user-images.githubusercontent.com/25482501/180727045-619eca13-9a3d-4b3f-8cef-83df9a184d84.png"> ## Steps to reproduce 1. Start app 2. Enable TestNet in Settings/Wallet
1.0
TestNet banner overlaps left panel - # Bug Report ## Description <img width="1012" alt="image" src="https://user-images.githubusercontent.com/25482501/180727045-619eca13-9a3d-4b3f-8cef-83df9a184d84.png"> ## Steps to reproduce 1. Start app 2. Enable TestNet in Settings/Wallet
non_usab
testnet banner overlaps left panel bug report description img width alt image src steps to reproduce start app enable testnet in settings wallet
0
11,709
7,372,593,308
IssuesEvent
2018-03-13 15:07:05
surveyjs/editor
https://api.github.com/repos/surveyjs/editor
closed
Introduce Newby/Advanced/Expert mode.
usability issue
Collapse property grid by default. Newby - just titles, visible if wizard Advanced - all options, visible if expression, add to toolbox, convert question, ... Expert - ability to accomplish any task (including JS code and CSS styles) in the editor
True
Introduce Newby/Advanced/Expert mode. - Collapse property grid by default. Newby - just titles, visible if wizard Advanced - all options, visible if expression, add to toolbox, convert question, ... Expert - ability to accomplish any task (including JS code and CSS styles) in the editor
usab
introduce newby advanced expert mode collapse property grid by default newby just titles visible if wizard advanced all options visible if expression add to toolbox convert question expert ability to accomplish any task including js code and css styles in the editor
1
121,471
12,126,687,183
IssuesEvent
2020-04-22 17:26:33
Azure/azurehpc
https://api.github.com/repos/Azure/azurehpc
closed
question: deploy cycleserver into defined vnet
documentation
Hello, I'm wondering how to skip the creating of the vnet and subnet while having pre-defined subnets available for the CycleServer deployment. https://github.com/Azure/azurehpc/blob/master/examples/cycleserver/readme.md Thanks for you guidance.
1.0
question: deploy cycleserver into defined vnet - Hello, I'm wondering how to skip the creating of the vnet and subnet while having pre-defined subnets available for the CycleServer deployment. https://github.com/Azure/azurehpc/blob/master/examples/cycleserver/readme.md Thanks for you guidance.
non_usab
question deploy cycleserver into defined vnet hello i m wondering how to skip the creating of the vnet and subnet while having pre defined subnets available for the cycleserver deployment thanks for you guidance
0
25,607
25,487,604,177
IssuesEvent
2022-11-26 16:16:18
kitsudaiki/libKitsunemimiHanamiNetwork
https://api.github.com/repos/kitsudaiki/libKitsunemimiHanamiNetwork
opened
reconnection broken
Bug Usability
## BUG-issue ### Description Since the issue https://github.com/kitsudaiki/libKitsunemimiHanamiNetwork/issues/10, the reconnect doesn't work anymore. Only initial connection works.
True
reconnection broken - ## BUG-issue ### Description Since the issue https://github.com/kitsudaiki/libKitsunemimiHanamiNetwork/issues/10, the reconnect doesn't work anymore. Only initial connection works.
usab
reconnection broken bug issue description since the issue the reconnect doesn t work anymore only initial connection works
1
207,561
23,458,627,591
IssuesEvent
2022-08-16 11:10:41
Gal-Doron/Baragon-test-6
https://api.github.com/repos/Gal-Doron/Baragon-test-6
opened
jackson-databind-2.9.9.jar: 50 vulnerabilities (highest severity is: 9.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2019-14540](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.2 | &#9989; | | [CVE-2019-17531](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.1 | &#9989; | | [CVE-2019-16335](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10 | &#9989; | | [CVE-2019-17267](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10 | &#9989; | | [CVE-2020-8840](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.3 | &#9989; | | [CVE-2019-16942](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.1 | &#9989; | | [CVE-2019-16943](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.1 | &#9989; | | [CVE-2019-14893](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10 | &#9989; | | [CVE-2019-14892](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10 | &#9989; | | [CVE-2020-9546](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-9547](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2019-14379](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.9.2 | &#9989; | | [CVE-2020-9548](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2019-20330](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.2 | &#9989; | | [CVE-2020-10968](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-10969](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-11111](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-11113](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11113) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-11112](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11112) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-10672](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10672) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-10673](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-11619](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11619) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-35728](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36189](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36189) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36188](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36188) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-11620](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-10650](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10650) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-36181](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36180](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36180) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-35490](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-36183](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36183) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36182](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36185](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36185) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36184](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-35491](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35491) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-36187](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36186](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36186) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2021-20190](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20190) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.7 | &#9989; | | [CVE-2020-36179](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36179) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-24616](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-14060](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14060) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-14061](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14061) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-14062](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14062) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-24750](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24750) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-14195](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14195) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-25649](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25649) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.9.jar | Direct | 2.9.10.7 | &#9989; | | [CVE-2019-14439](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14439) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.9.jar | Direct | 2.9.9.2 | &#9989; | | [CVE-2020-36518](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36518) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.9.jar | Direct | 2.12.6.1 | &#9989; | | [CVE-2019-12814](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12814) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.9.jar | Direct | 2.9.9.1 | &#9989; | | [CVE-2019-12384](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12384) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.9.jar | Direct | 2.9.9.1 | &#9989; | ## Details > Partial details (19 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14540</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540>CVE-2019-14540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: 2.9.10.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17531</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-10-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531>CVE-2019-17531</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p> <p>Release Date: 2019-10-12</p> <p>Fix Resolution: 2.9.10.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16335</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335>CVE-2019-16335</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17267</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup. <p>Publish Date: 2019-10-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267>CVE-2019-17267</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-10-07</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-8840</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. <p>Publish Date: 2020-02-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840>CVE-2020-8840</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-02-10</p> <p>Fix Resolution: 2.9.10.3</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16942</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942>CVE-2019-16942</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.9.10.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16943</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943>CVE-2019-16943</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.9.10.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14893</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14892</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892>CVE-2019-14892</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-09-04</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9546</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546>CVE-2020-9546</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9547</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14379</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. <p>Publish Date: 2019-07-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379>CVE-2019-14379</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p> <p>Release Date: 2019-07-29</p> <p>Fix Resolution: 2.9.9.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9548</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548>CVE-2020-9548</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20330</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. <p>Publish Date: 2020-01-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330>CVE-2019-20330</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-01-03</p> <p>Fix Resolution: 2.9.10.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10968</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy). <p>Publish Date: 2020-03-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968>CVE-2020-10968</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10968">https://nvd.nist.gov/vuln/detail/CVE-2020-10968</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10969</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane. <p>Publish Date: 2020-03-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969>CVE-2020-10969</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11111</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111>CVE-2020-11111</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11113</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11113>CVE-2020-11113</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11112</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11112>CVE-2020-11112</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
jackson-databind-2.9.9.jar: 50 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2019-14540](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.2 | &#9989; | | [CVE-2019-17531](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.1 | &#9989; | | [CVE-2019-16335](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10 | &#9989; | | [CVE-2019-17267](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10 | &#9989; | | [CVE-2020-8840](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.3 | &#9989; | | [CVE-2019-16942](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.1 | &#9989; | | [CVE-2019-16943](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.1 | &#9989; | | [CVE-2019-14893](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10 | &#9989; | | [CVE-2019-14892](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10 | &#9989; | | [CVE-2020-9546](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-9547](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2019-14379](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.9.2 | &#9989; | | [CVE-2020-9548](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2019-20330](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.2 | &#9989; | | [CVE-2020-10968](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-10969](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-11111](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-11113](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11113) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-11112](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11112) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-10672](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10672) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-10673](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-11619](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11619) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-35728](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36189](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36189) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36188](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36188) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-11620](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-10650](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10650) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.4 | &#9989; | | [CVE-2020-36181](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36180](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36180) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-35490](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-36183](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36183) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36182](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36185](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36185) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36184](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-35491](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35491) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-36187](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-36186](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36186) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2021-20190](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20190) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.7 | &#9989; | | [CVE-2020-36179](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36179) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.8 | &#9989; | | [CVE-2020-24616](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-14060](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14060) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-14061](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14061) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-14062](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14062) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-24750](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24750) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-14195](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14195) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | jackson-databind-2.9.9.jar | Direct | 2.9.10.5 | &#9989; | | [CVE-2020-25649](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25649) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.9.jar | Direct | 2.9.10.7 | &#9989; | | [CVE-2019-14439](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14439) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.9.jar | Direct | 2.9.9.2 | &#9989; | | [CVE-2020-36518](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36518) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.9.jar | Direct | 2.12.6.1 | &#9989; | | [CVE-2019-12814](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12814) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.9.jar | Direct | 2.9.9.1 | &#9989; | | [CVE-2019-12384](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12384) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jackson-databind-2.9.9.jar | Direct | 2.9.9.1 | &#9989; | ## Details > Partial details (19 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14540</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540>CVE-2019-14540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: 2.9.10.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17531</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-10-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17531>CVE-2019-17531</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p> <p>Release Date: 2019-10-12</p> <p>Fix Resolution: 2.9.10.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16335</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16335>CVE-2019-16335</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17267</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup. <p>Publish Date: 2019-10-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-17267>CVE-2019-17267</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-10-07</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-8840</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. <p>Publish Date: 2020-02-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8840>CVE-2020-8840</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-02-10</p> <p>Fix Resolution: 2.9.10.3</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16942</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16942>CVE-2019-16942</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.9.10.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16943</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16943>CVE-2019-16943</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.9.10.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14893</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14892</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892>CVE-2019-14892</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-09-04</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9546</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546>CVE-2020-9546</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9547</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14379</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. <p>Publish Date: 2019-07-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379>CVE-2019-14379</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p> <p>Release Date: 2019-07-29</p> <p>Fix Resolution: 2.9.9.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9548</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9548>CVE-2020-9548</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20330</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. <p>Publish Date: 2020-01-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20330>CVE-2019-20330</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-01-03</p> <p>Fix Resolution: 2.9.10.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10968</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy). <p>Publish Date: 2020-03-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10968>CVE-2020-10968</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10968">https://nvd.nist.gov/vuln/detail/CVE-2020-10968</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-10969</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane. <p>Publish Date: 2020-03-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10969>CVE-2020-10969</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11111</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111>CVE-2020-11111</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11113</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11113>CVE-2020-11113</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11112</summary> ### Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar,/sitory/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-test-6/commit/10c20000fec2ffa6628601aaf45fbbd85b996de2">10c20000fec2ffa6628601aaf45fbbd85b996de2</a></p> <p>Found in base branch: <b>basepom-upgrade</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11112>CVE-2020-11112</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_usab
jackson databind jar vulnerabilities highest severity is vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct medium jackson databind jar direct medium jackson databind jar direct details partial details vulnerabilities are displayed below due to a content size limitation in github to view information on the remaining vulnerabilities navigate to the mend application cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to com zaxxer hikari hikariconfig publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the apache extra version x jar in the classpath and an attacker can provide a jndi service to access it is possible to make the service execute a malicious payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to com zaxxer hikari hikaridatasource this is a different vulnerability than cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to net sf ehcache hibernate ehcachejtatransactionmanagerlookup publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details fasterxml jackson databind through lacks certain xbean reflect jndi blocking as demonstrated by org apache xbean propertyeditor jndiconverter publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the commons dbcp jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of org apache commons dbcp datasources sharedpooldatasource and org apache commons dbcp datasources peruserpooldatasource mishandling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of com engine spy mishandling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details a flaw was discovered in fasterxml jackson databind in all versions before and where it would permit polymorphic deserialization of malicious objects using the xalan jndi gadget when used in conjunction with polymorphic type handling methods such as enabledefaulttyping or when jsontypeinfo is using id class or id minimal class or in any other way which objectmapper readvalue might instantiate objects from unsafe sources an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details a flaw was discovered in jackson databind in versions before and where it would permit polymorphic deserialization of a malicious object using commons configuration and jndi classes an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache hadoop shaded com zaxxer hikari hikariconfig aka shaded hikari config publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com ibatis sqlmap engine transaction jta jtatransactionconfig aka ibatis sqlmap publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details subtypevalidator java in fasterxml jackson databind before mishandles default typing when ehcache is used because of net sf ehcache transaction manager defaulttransactionmanagerlookup leading to remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to br com anteros dbcp anterosdbcpconfig aka anteros core publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details fasterxml jackson databind x before lacks certain net sf ehcache blocking publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org aoju bus proxy provider remoting rmiprovider aka bus proxy publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to javax swing jeditorpane publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache activemq aka activemq jms activemq core activemq pool and activemq pool jms publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache openjpa ee wasregistrymanagedruntime aka openjpa publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch basepom upgrade vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache commons proxy provider remoting rmiprovider aka apache commons proxy publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
0
12,004
7,612,100,273
IssuesEvent
2018-05-01 16:18:06
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Edit Group for multiple nodes at the same time
feature proposal topic:editor usability
It would be nice if it was possible to select multiple Nodes and set group for all of them togheter Example of what happened: i created bounds for a map and i wanted to put them all in a group. Had to manually set groups for each Node. Bonus: It would be nice if Groups were managed with a separate windows, where you can add groups, and then if you assingn a Node to a Group you'd have a drop down menu, to avoid misspelling related bugs.
True
Edit Group for multiple nodes at the same time - It would be nice if it was possible to select multiple Nodes and set group for all of them togheter Example of what happened: i created bounds for a map and i wanted to put them all in a group. Had to manually set groups for each Node. Bonus: It would be nice if Groups were managed with a separate windows, where you can add groups, and then if you assingn a Node to a Group you'd have a drop down menu, to avoid misspelling related bugs.
usab
edit group for multiple nodes at the same time it would be nice if it was possible to select multiple nodes and set group for all of them togheter example of what happened i created bounds for a map and i wanted to put them all in a group had to manually set groups for each node bonus it would be nice if groups were managed with a separate windows where you can add groups and then if you assingn a node to a group you d have a drop down menu to avoid misspelling related bugs
1
77,241
26,873,738,964
IssuesEvent
2023-02-04 19:46:38
SeleniumHQ/selenium
https://api.github.com/repos/SeleniumHQ/selenium
closed
[🐛 Bug]: ProfilesIni fails on Ubuntu 22 using Firefox and Snap
I-defect needs-triaging
### What happened? org.openqa.selenium.firefox.ProfilesIni expects the Firefox profiles to be in ~/.mozilla/firefox when the platform is not Windows or Mac. However, on Ubuntu 22 using Snap, the Firefox profiles are in ~/snap/firefox/common/.mozilla/firefox. That's the directory where profiles.ini is. One possible solution is to change this: `appData = new File(MessageFormat.format("{0}/.mozilla/firefox", System.getenv("HOME")));` to this: ``` appData = new File(MessageFormat.format("{0}/.mozilla/firefox", System.getenv("HOME"))); if (!appData.exists()) { appData = new File(MessageFormat.format("{0}/snap/firefox/common/.mozilla/firefox", System.getenv("HOME"))); } ``` A more complicated but cleaner solution would be to have a set of plugins that provide likely paths, the first one that has a profiles.ini wins. ### How can we reproduce the issue? ```shell Install Ubuntu 22 and Firefox using Snap, then try to load a FF profile using ProfilesIni. ``` ### Relevant log output ```shell None, it just returns null on this platform. ``` ### Operating System Ubuntu 22 ### Selenium version 4.7.2 (custom build incorporating #11545) ### What are the browser(s) and version(s) where you see this issue? FF 109 ### What are the browser driver(s) and version(s) where you see this issue? n/a ### Are you using Selenium Grid? n/a
1.0
[🐛 Bug]: ProfilesIni fails on Ubuntu 22 using Firefox and Snap - ### What happened? org.openqa.selenium.firefox.ProfilesIni expects the Firefox profiles to be in ~/.mozilla/firefox when the platform is not Windows or Mac. However, on Ubuntu 22 using Snap, the Firefox profiles are in ~/snap/firefox/common/.mozilla/firefox. That's the directory where profiles.ini is. One possible solution is to change this: `appData = new File(MessageFormat.format("{0}/.mozilla/firefox", System.getenv("HOME")));` to this: ``` appData = new File(MessageFormat.format("{0}/.mozilla/firefox", System.getenv("HOME"))); if (!appData.exists()) { appData = new File(MessageFormat.format("{0}/snap/firefox/common/.mozilla/firefox", System.getenv("HOME"))); } ``` A more complicated but cleaner solution would be to have a set of plugins that provide likely paths, the first one that has a profiles.ini wins. ### How can we reproduce the issue? ```shell Install Ubuntu 22 and Firefox using Snap, then try to load a FF profile using ProfilesIni. ``` ### Relevant log output ```shell None, it just returns null on this platform. ``` ### Operating System Ubuntu 22 ### Selenium version 4.7.2 (custom build incorporating #11545) ### What are the browser(s) and version(s) where you see this issue? FF 109 ### What are the browser driver(s) and version(s) where you see this issue? n/a ### Are you using Selenium Grid? n/a
non_usab
profilesini fails on ubuntu using firefox and snap what happened org openqa selenium firefox profilesini expects the firefox profiles to be in mozilla firefox when the platform is not windows or mac however on ubuntu using snap the firefox profiles are in snap firefox common mozilla firefox that s the directory where profiles ini is one possible solution is to change this appdata new file messageformat format mozilla firefox system getenv home to this appdata new file messageformat format mozilla firefox system getenv home if appdata exists appdata new file messageformat format snap firefox common mozilla firefox system getenv home a more complicated but cleaner solution would be to have a set of plugins that provide likely paths the first one that has a profiles ini wins how can we reproduce the issue shell install ubuntu and firefox using snap then try to load a ff profile using profilesini relevant log output shell none it just returns null on this platform operating system ubuntu selenium version custom build incorporating what are the browser s and version s where you see this issue ff what are the browser driver s and version s where you see this issue n a are you using selenium grid n a
0
256,755
22,096,191,573
IssuesEvent
2022-06-01 10:19:43
musescore/MuseScore
https://api.github.com/repos/musescore/MuseScore
closed
[MU4 Issue] Element duration line is not rendered for rasgueado and artificial harmonics
P2 Tested
**To Reproduce** Steps to reproduce the behavior: 1. Open test file [0____________rasg.gp.zip](https://github.com/musescore/MuseScore/files/8770324/0____________rasg.gp.zip) 2. Pay attention to the rasgueado marks **Screenshots** ![Screenshot 2022-05-25 at 12 52 37](https://user-images.githubusercontent.com/101250347/170244182-21939afd-fa83-4c59-8167-320db06ad391.png) **Expected behavior** Element duration line is rendered for rasgueado and artificial harmonics ![Screenshot 2022-05-25 at 12 52 28](https://user-images.githubusercontent.com/101250347/170244196-5da29fd5-e263-467e-a725-1dff5bcde942.png)
1.0
[MU4 Issue] Element duration line is not rendered for rasgueado and artificial harmonics - **To Reproduce** Steps to reproduce the behavior: 1. Open test file [0____________rasg.gp.zip](https://github.com/musescore/MuseScore/files/8770324/0____________rasg.gp.zip) 2. Pay attention to the rasgueado marks **Screenshots** ![Screenshot 2022-05-25 at 12 52 37](https://user-images.githubusercontent.com/101250347/170244182-21939afd-fa83-4c59-8167-320db06ad391.png) **Expected behavior** Element duration line is rendered for rasgueado and artificial harmonics ![Screenshot 2022-05-25 at 12 52 28](https://user-images.githubusercontent.com/101250347/170244196-5da29fd5-e263-467e-a725-1dff5bcde942.png)
non_usab
element duration line is not rendered for rasgueado and artificial harmonics to reproduce steps to reproduce the behavior open test file pay attention to the rasgueado marks screenshots expected behavior element duration line is rendered for rasgueado and artificial harmonics
0
247,410
7,918,423,435
IssuesEvent
2018-07-04 13:16:24
openaq/openaq-fetch
https://api.github.com/repos/openaq/openaq-fetch
closed
China - Sources (not useable yet)
help wanted high priority new data question
There are a ton of China air quality data sources. Here are some: aepb.gov.cn bjmemc.com.cn cdemc.cn cfhb.gov.cn cepb.gov.cn dl.gov.cn dyhb.gov.cn nbemc.gov.cn sdein.gov.cn fjepb.gov.cn gsep.gansu.gov.cn qhepb.gov.cn gdep.gov.cn gxepb.gov.cn ghb.gov.cn dloer.gov.cn hebei.gov.cn hljdep.gov.cn hnep.gov.cn hbepb.gov.cn hbt.hunan.gov.cn nmgepb.gov.cn jshb.gov.cn jxepb.gov.cn shbj.klmy.gov.cn lnemc.cn lzhb.gov.cn nnems.gov.cn nxep.gov.cn ordoshb.gov.cn semc.gov.cn sxhjjcz.com.cn szhec.gov.cn tjemc.org.cn xzep.gov.cn wlmqhb.gov.cn whepb.gov.cn xianemc.gov.cn xnepb.gov.cn xjepb.gov.cn ynepb.gov.cn zjepb.gov.cn Sources from: aqicn.org/sources There is also a site that provides an API to Chinese AQ data: http://pm25.in/ However the issue is that from what I can tell, these data are not shared in their raw format only AQI (I have not clicked on each and everyone however). Anyone know differently or find ones above that are shared our in raw format?
1.0
China - Sources (not useable yet) - There are a ton of China air quality data sources. Here are some: aepb.gov.cn bjmemc.com.cn cdemc.cn cfhb.gov.cn cepb.gov.cn dl.gov.cn dyhb.gov.cn nbemc.gov.cn sdein.gov.cn fjepb.gov.cn gsep.gansu.gov.cn qhepb.gov.cn gdep.gov.cn gxepb.gov.cn ghb.gov.cn dloer.gov.cn hebei.gov.cn hljdep.gov.cn hnep.gov.cn hbepb.gov.cn hbt.hunan.gov.cn nmgepb.gov.cn jshb.gov.cn jxepb.gov.cn shbj.klmy.gov.cn lnemc.cn lzhb.gov.cn nnems.gov.cn nxep.gov.cn ordoshb.gov.cn semc.gov.cn sxhjjcz.com.cn szhec.gov.cn tjemc.org.cn xzep.gov.cn wlmqhb.gov.cn whepb.gov.cn xianemc.gov.cn xnepb.gov.cn xjepb.gov.cn ynepb.gov.cn zjepb.gov.cn Sources from: aqicn.org/sources There is also a site that provides an API to Chinese AQ data: http://pm25.in/ However the issue is that from what I can tell, these data are not shared in their raw format only AQI (I have not clicked on each and everyone however). Anyone know differently or find ones above that are shared our in raw format?
non_usab
china sources not useable yet there are a ton of china air quality data sources here are some aepb gov cn bjmemc com cn cdemc cn cfhb gov cn cepb gov cn dl gov cn dyhb gov cn nbemc gov cn sdein gov cn fjepb gov cn gsep gansu gov cn qhepb gov cn gdep gov cn gxepb gov cn ghb gov cn dloer gov cn hebei gov cn hljdep gov cn hnep gov cn hbepb gov cn hbt hunan gov cn nmgepb gov cn jshb gov cn jxepb gov cn shbj klmy gov cn lnemc cn lzhb gov cn nnems gov cn nxep gov cn ordoshb gov cn semc gov cn sxhjjcz com cn szhec gov cn tjemc org cn xzep gov cn wlmqhb gov cn whepb gov cn xianemc gov cn xnepb gov cn xjepb gov cn ynepb gov cn zjepb gov cn sources from aqicn org sources there is also a site that provides an api to chinese aq data however the issue is that from what i can tell these data are not shared in their raw format only aqi i have not clicked on each and everyone however anyone know differently or find ones above that are shared our in raw format
0
15,932
10,419,648,984
IssuesEvent
2019-09-15 18:06:31
CC3301/csgo-strat-generator
https://api.github.com/repos/CC3301/csgo-strat-generator
closed
Sort buy command
usability
The buy command should represent the order in which the items should be bought. Due to the way that csgo handles these commands, the most important item should be on the first position in the buy command.
True
Sort buy command - The buy command should represent the order in which the items should be bought. Due to the way that csgo handles these commands, the most important item should be on the first position in the buy command.
usab
sort buy command the buy command should represent the order in which the items should be bought due to the way that csgo handles these commands the most important item should be on the first position in the buy command
1
400,425
27,284,304,623
IssuesEvent
2023-02-23 12:24:30
inbo/camtraptor
https://api.github.com/repos/inbo/camtraptor
opened
Search results on pkgdown website link to wrong page
bug documentation
1. Go to https://inbo.github.io/camtraptor/index.html 2. Type "Read" in the search bar at the top 3. Click on the first suggested result in the dropdown: `Reference > Read a Camtrap DP — read_camtrap_dp` 4. Result link to: https://inbo.github.io/reference/read_camtrap_dp.html?q=Read#null Rather than the expected: https://inbo.github.io/camtraptor/reference/read_camtrap_dp.html?q=Read#null This also affects: - [ ] https://trias-project.github.io/trias/ - [ ] https://inbo.github.io/movepub/ - [ ] https://inbo.github.io/etn/ `frictionless`, `bioRad`, `wateRinfo` and `rgbif` are not affected. @PietrH can you debug this one?
1.0
Search results on pkgdown website link to wrong page - 1. Go to https://inbo.github.io/camtraptor/index.html 2. Type "Read" in the search bar at the top 3. Click on the first suggested result in the dropdown: `Reference > Read a Camtrap DP — read_camtrap_dp` 4. Result link to: https://inbo.github.io/reference/read_camtrap_dp.html?q=Read#null Rather than the expected: https://inbo.github.io/camtraptor/reference/read_camtrap_dp.html?q=Read#null This also affects: - [ ] https://trias-project.github.io/trias/ - [ ] https://inbo.github.io/movepub/ - [ ] https://inbo.github.io/etn/ `frictionless`, `bioRad`, `wateRinfo` and `rgbif` are not affected. @PietrH can you debug this one?
non_usab
search results on pkgdown website link to wrong page go to type read in the search bar at the top click on the first suggested result in the dropdown reference read a camtrap dp — read camtrap dp result link to rather than the expected this also affects frictionless biorad waterinfo and rgbif are not affected pietrh can you debug this one
0
20,736
15,977,579,767
IssuesEvent
2021-04-17 05:49:07
HauntedBees/Uprooted
https://api.github.com/repos/HauntedBees/Uprooted
closed
make enemies prioritize throwing ripe crops more
difficulty usability
especially(/exclusively?) mafioso ed. note: can no longer reproduce; checked enemy attack plan and will always throw crops when ready, unless they want to shoot your crop. seems reasonable.
True
make enemies prioritize throwing ripe crops more - especially(/exclusively?) mafioso ed. note: can no longer reproduce; checked enemy attack plan and will always throw crops when ready, unless they want to shoot your crop. seems reasonable.
usab
make enemies prioritize throwing ripe crops more especially exclusively mafioso ed note can no longer reproduce checked enemy attack plan and will always throw crops when ready unless they want to shoot your crop seems reasonable
1
1,070
3,329,861,926
IssuesEvent
2015-11-11 06:07:40
connolly/desc
https://api.github.com/repos/connolly/desc
opened
WL3-DC2-RQ0:T2
DC2 DC2 RQ: Set requirements on DC2 simulated datasets Images to shear catalog I RQ wl
Determine the most useful applied shear and convergence. (Ray-tracing through the DC2 light cone, Gaussian shears from a cosmological power spectrum, or something even simpler?)
1.0
WL3-DC2-RQ0:T2 - Determine the most useful applied shear and convergence. (Ray-tracing through the DC2 light cone, Gaussian shears from a cosmological power spectrum, or something even simpler?)
non_usab
determine the most useful applied shear and convergence ray tracing through the light cone gaussian shears from a cosmological power spectrum or something even simpler
0
24,143
23,391,823,632
IssuesEvent
2022-08-11 18:37:29
linkedin/cruise-control
https://api.github.com/repos/linkedin/cruise-control
opened
NPE exception when calling topic_configuration endpoint
usability
``` 2022/08/10 01:57:51.461 ERROR [KafkaCruiseControlServlet] [qtp1636178473-23] [kafka-cruise-control] [] Error processing POST request '/topic_configuration' due to: 'com.linkedin.kafka.cruisecontrol.exception.KafkaCruiseControlException: java.lang.NullPointerException'. java.util.concurrent.ExecutionException: com.linkedin.kafka.cruisecontrol.exception.KafkaCruiseControlException: java.lang.NullPointerException at java.util.concurrent.CompletableFuture.reportGet(CompletableFuture.java:395) ~[?:?] at java.util.concurrent.CompletableFuture.get(CompletableFuture.java:2022) ~[?:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.AbstractAsyncRequest.getResponse(AbstractAsyncRequest.java:57) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.AbstractRequest.handle(AbstractRequest.java:41) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.KafkaCruiseControlServlet.handlePost(KafkaCruiseControlServlet.java:229) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.KafkaCruiseControlServlet.doGetOrPost(KafkaCruiseControlServlet.java:127) [cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.KafkaCruiseControlServlet.doPost(KafkaCruiseControlServlet.java:106) [cruise-control-2.5.98.jar:?] at javax.servlet.http.HttpServlet.service(HttpServlet.java:707) [javax.servlet-api-3.1.0.jar:3.1.0] at javax.servlet.http.HttpServlet.service(HttpServlet.java:790) [javax.servlet-api-3.1.0.jar:3.1.0] at org.xeril.util.servlet.ProxyServlet.service(ProxyServlet.java:61) [util-servlet-27.2.32.jar:?] at javax.servlet.http.HttpServlet.service(HttpServlet.java:790) [javax.servlet-api-3.1.0.jar:3.1.0] at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.java:857) [jetty-servlet-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:535) [jetty-servlet-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) [jetty-security-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1595) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1340) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:473) [jetty-servlet-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1564) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1242) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at com.linkedin.emweb.ContextBasedHandlerImpl.handle(ContextBasedHandlerImpl.java:73) [emweb-impl-9.2.70.jar:?] at com.linkedin.emweb.MapBasedHandlerImpl.handle(MapBasedHandlerImpl.java:480) [emweb-impl-9.2.70.jar:?] at org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:126) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.Server.handle(Server.java:503) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:364) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:260) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305) [jetty-io-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) [jetty-io-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:118) [jetty-io-9.4.12.v20180830.jar:9.4.12.v20180830] at com.linkedin.emweb.ThreadPoolWithTracking$QueuedRunnable.run(ThreadPoolWithTracking.java:424) [emweb-impl-9.2.70.jar:?] at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:765) [jetty-util-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.util.thread.QueuedThreadPool$2.run(QueuedThreadPool.java:683) [jetty-util-9.4.12.v20180830.jar:9.4.12.v20180830] at java.lang.Thread.run(Thread.java:829) [?:?] Caused by: com.linkedin.kafka.cruisecontrol.exception.KafkaCruiseControlException: java.lang.NullPointerException at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.GoalBasedOperationRunnable.computeResult(GoalBasedOperationRunnable.java:167) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.UpdateTopicConfigurationRunnable.getResult(UpdateTopicConfigurationRunnable.java:149) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.UpdateTopicConfigurationRunnable.getResult(UpdateTopicConfigurationRunnable.java:69) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.OperationRunnable.run(OperationRunnable.java:45) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.GoalBasedOperationRunnable.run(GoalBasedOperationRunnable.java:36) ~[cruise-control-2.5.98.jar:?] at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515) ~[?:?] at java.util.concurrent.FutureTask.run(FutureTask.java:264) ~[?:?] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) ~[?:?] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) ~[?:?] ... 1 more Caused by: java.lang.NullPointerException at com.linkedin.kafka.cruisecontrol.model.Host.removeReplica(Host.java:196) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.model.Rack.removeReplica(Rack.java:167) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.model.ClusterModel.removeReplica(ClusterModel.java:546) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.model.ClusterModel.deleteReplica(ClusterModel.java:905) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.model.ClusterModel.createOrDeleteReplicas(ClusterModel.java:1022) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.licruisecontrol.servlet.handler.async.runnable.LiUpdateTopicConfigurationRunnable.workWithClusterModel(LiUpdateTopicConfigurationRunnable.java:78) ~[likafka-cruise-control-impl_2.12-3.2.17.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.GoalBasedOperationRunnable.computeResult(GoalBasedOperationRunnable.java:161) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.UpdateTopicConfigurationRunnable.getResult(UpdateTopicConfigurationRunnable.java:149) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.UpdateTopicConfigurationRunnable.getResult(UpdateTopicConfigurationRunnable.java:69) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.OperationRunnable.run(OperationRunnable.java:45) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.GoalBasedOperationRunnable.run(GoalBasedOperationRunnable.java:36) ~[cruise-control-2.5.98.jar:?] at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515) ~[?:?] at java.util.concurrent.FutureTask.run(FutureTask.java:264) ~[?:?] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) ~[?:?] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) ~[?:?] ```
True
NPE exception when calling topic_configuration endpoint - ``` 2022/08/10 01:57:51.461 ERROR [KafkaCruiseControlServlet] [qtp1636178473-23] [kafka-cruise-control] [] Error processing POST request '/topic_configuration' due to: 'com.linkedin.kafka.cruisecontrol.exception.KafkaCruiseControlException: java.lang.NullPointerException'. java.util.concurrent.ExecutionException: com.linkedin.kafka.cruisecontrol.exception.KafkaCruiseControlException: java.lang.NullPointerException at java.util.concurrent.CompletableFuture.reportGet(CompletableFuture.java:395) ~[?:?] at java.util.concurrent.CompletableFuture.get(CompletableFuture.java:2022) ~[?:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.AbstractAsyncRequest.getResponse(AbstractAsyncRequest.java:57) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.AbstractRequest.handle(AbstractRequest.java:41) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.KafkaCruiseControlServlet.handlePost(KafkaCruiseControlServlet.java:229) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.KafkaCruiseControlServlet.doGetOrPost(KafkaCruiseControlServlet.java:127) [cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.KafkaCruiseControlServlet.doPost(KafkaCruiseControlServlet.java:106) [cruise-control-2.5.98.jar:?] at javax.servlet.http.HttpServlet.service(HttpServlet.java:707) [javax.servlet-api-3.1.0.jar:3.1.0] at javax.servlet.http.HttpServlet.service(HttpServlet.java:790) [javax.servlet-api-3.1.0.jar:3.1.0] at org.xeril.util.servlet.ProxyServlet.service(ProxyServlet.java:61) [util-servlet-27.2.32.jar:?] at javax.servlet.http.HttpServlet.service(HttpServlet.java:790) [javax.servlet-api-3.1.0.jar:3.1.0] at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.java:857) [jetty-servlet-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:535) [jetty-servlet-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548) [jetty-security-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1595) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1340) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:473) [jetty-servlet-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1564) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1242) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at com.linkedin.emweb.ContextBasedHandlerImpl.handle(ContextBasedHandlerImpl.java:73) [emweb-impl-9.2.70.jar:?] at com.linkedin.emweb.MapBasedHandlerImpl.handle(MapBasedHandlerImpl.java:480) [emweb-impl-9.2.70.jar:?] at org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:126) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.Server.handle(Server.java:503) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:364) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:260) [jetty-server-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305) [jetty-io-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) [jetty-io-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:118) [jetty-io-9.4.12.v20180830.jar:9.4.12.v20180830] at com.linkedin.emweb.ThreadPoolWithTracking$QueuedRunnable.run(ThreadPoolWithTracking.java:424) [emweb-impl-9.2.70.jar:?] at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:765) [jetty-util-9.4.12.v20180830.jar:9.4.12.v20180830] at org.eclipse.jetty.util.thread.QueuedThreadPool$2.run(QueuedThreadPool.java:683) [jetty-util-9.4.12.v20180830.jar:9.4.12.v20180830] at java.lang.Thread.run(Thread.java:829) [?:?] Caused by: com.linkedin.kafka.cruisecontrol.exception.KafkaCruiseControlException: java.lang.NullPointerException at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.GoalBasedOperationRunnable.computeResult(GoalBasedOperationRunnable.java:167) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.UpdateTopicConfigurationRunnable.getResult(UpdateTopicConfigurationRunnable.java:149) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.UpdateTopicConfigurationRunnable.getResult(UpdateTopicConfigurationRunnable.java:69) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.OperationRunnable.run(OperationRunnable.java:45) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.GoalBasedOperationRunnable.run(GoalBasedOperationRunnable.java:36) ~[cruise-control-2.5.98.jar:?] at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515) ~[?:?] at java.util.concurrent.FutureTask.run(FutureTask.java:264) ~[?:?] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) ~[?:?] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) ~[?:?] ... 1 more Caused by: java.lang.NullPointerException at com.linkedin.kafka.cruisecontrol.model.Host.removeReplica(Host.java:196) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.model.Rack.removeReplica(Rack.java:167) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.model.ClusterModel.removeReplica(ClusterModel.java:546) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.model.ClusterModel.deleteReplica(ClusterModel.java:905) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.model.ClusterModel.createOrDeleteReplicas(ClusterModel.java:1022) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.licruisecontrol.servlet.handler.async.runnable.LiUpdateTopicConfigurationRunnable.workWithClusterModel(LiUpdateTopicConfigurationRunnable.java:78) ~[likafka-cruise-control-impl_2.12-3.2.17.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.GoalBasedOperationRunnable.computeResult(GoalBasedOperationRunnable.java:161) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.UpdateTopicConfigurationRunnable.getResult(UpdateTopicConfigurationRunnable.java:149) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.UpdateTopicConfigurationRunnable.getResult(UpdateTopicConfigurationRunnable.java:69) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.OperationRunnable.run(OperationRunnable.java:45) ~[cruise-control-2.5.98.jar:?] at com.linkedin.kafka.cruisecontrol.servlet.handler.async.runnable.GoalBasedOperationRunnable.run(GoalBasedOperationRunnable.java:36) ~[cruise-control-2.5.98.jar:?] at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515) ~[?:?] at java.util.concurrent.FutureTask.run(FutureTask.java:264) ~[?:?] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) ~[?:?] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) ~[?:?] ```
usab
npe exception when calling topic configuration endpoint error error processing post request topic configuration due to com linkedin kafka cruisecontrol exception kafkacruisecontrolexception java lang nullpointerexception java util concurrent executionexception com linkedin kafka cruisecontrol exception kafkacruisecontrolexception java lang nullpointerexception at java util concurrent completablefuture reportget completablefuture java at java util concurrent completablefuture get completablefuture java at com linkedin kafka cruisecontrol servlet handler async abstractasyncrequest getresponse abstractasyncrequest java at com linkedin kafka cruisecontrol servlet handler abstractrequest handle abstractrequest java at com linkedin kafka cruisecontrol servlet kafkacruisecontrolservlet handlepost kafkacruisecontrolservlet java at com linkedin kafka cruisecontrol servlet kafkacruisecontrolservlet dogetorpost kafkacruisecontrolservlet java at com linkedin kafka cruisecontrol servlet kafkacruisecontrolservlet dopost kafkacruisecontrolservlet java at javax servlet http httpservlet service httpservlet java at javax servlet http httpservlet service httpservlet java at org xeril util servlet proxyservlet service proxyservlet java at javax servlet http httpservlet service httpservlet java at org eclipse jetty servlet servletholder handle servletholder java at org eclipse jetty servlet servlethandler dohandle servlethandler java at org eclipse jetty server handler scopedhandler handle scopedhandler java at org eclipse jetty security securityhandler handle securityhandler java at org eclipse jetty server handler handlerwrapper handle handlerwrapper java at org eclipse jetty server handler scopedhandler nexthandle scopedhandler java at org eclipse jetty server session sessionhandler dohandle sessionhandler java at org eclipse jetty server handler scopedhandler nexthandle scopedhandler java at org eclipse jetty server handler contexthandler dohandle contexthandler java at org eclipse jetty server handler scopedhandler nextscope scopedhandler java at org eclipse jetty servlet servlethandler doscope servlethandler java at org eclipse jetty server session sessionhandler doscope sessionhandler java at org eclipse jetty server handler scopedhandler nextscope scopedhandler java at org eclipse jetty server handler contexthandler doscope contexthandler java at org eclipse jetty server handler scopedhandler handle scopedhandler java at com linkedin emweb contextbasedhandlerimpl handle contextbasedhandlerimpl java at com linkedin emweb mapbasedhandlerimpl handle mapbasedhandlerimpl java at org eclipse jetty server handler handlercollection handle handlercollection java at org eclipse jetty server handler handlerwrapper handle handlerwrapper java at org eclipse jetty server server handle server java at org eclipse jetty server httpchannel handle httpchannel java at org eclipse jetty server httpconnection onfillable httpconnection java at org eclipse jetty io abstractconnection readcallback succeeded abstractconnection java at org eclipse jetty io fillinterest fillable fillinterest java at org eclipse jetty io channelendpoint run channelendpoint java at com linkedin emweb threadpoolwithtracking queuedrunnable run threadpoolwithtracking java at org eclipse jetty util thread queuedthreadpool runjob queuedthreadpool java at org eclipse jetty util thread queuedthreadpool run queuedthreadpool java at java lang thread run thread java caused by com linkedin kafka cruisecontrol exception kafkacruisecontrolexception java lang nullpointerexception at com linkedin kafka cruisecontrol servlet handler async runnable goalbasedoperationrunnable computeresult goalbasedoperationrunnable java at com linkedin kafka cruisecontrol servlet handler async runnable updatetopicconfigurationrunnable getresult updatetopicconfigurationrunnable java at com linkedin kafka cruisecontrol servlet handler async runnable updatetopicconfigurationrunnable getresult updatetopicconfigurationrunnable java at com linkedin kafka cruisecontrol servlet handler async runnable operationrunnable run operationrunnable java at com linkedin kafka cruisecontrol servlet handler async runnable goalbasedoperationrunnable run goalbasedoperationrunnable java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java more caused by java lang nullpointerexception at com linkedin kafka cruisecontrol model host removereplica host java at com linkedin kafka cruisecontrol model rack removereplica rack java at com linkedin kafka cruisecontrol model clustermodel removereplica clustermodel java at com linkedin kafka cruisecontrol model clustermodel deletereplica clustermodel java at com linkedin kafka cruisecontrol model clustermodel createordeletereplicas clustermodel java at com linkedin kafka licruisecontrol servlet handler async runnable liupdatetopicconfigurationrunnable workwithclustermodel liupdatetopicconfigurationrunnable java at com linkedin kafka cruisecontrol servlet handler async runnable goalbasedoperationrunnable computeresult goalbasedoperationrunnable java at com linkedin kafka cruisecontrol servlet handler async runnable updatetopicconfigurationrunnable getresult updatetopicconfigurationrunnable java at com linkedin kafka cruisecontrol servlet handler async runnable updatetopicconfigurationrunnable getresult updatetopicconfigurationrunnable java at com linkedin kafka cruisecontrol servlet handler async runnable operationrunnable run operationrunnable java at com linkedin kafka cruisecontrol servlet handler async runnable goalbasedoperationrunnable run goalbasedoperationrunnable java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java
1
374,772
11,095,253,595
IssuesEvent
2019-12-16 08:41:24
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.pornhub.com - design is broken
browser-focus-geckoview engine-gecko ml-needsdiagnosis-false priority-critical
<!-- @browser: Firefox Mobile 71.0 --> <!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:71.0) Gecko/71.0 Firefox/71.0 --> <!-- @reported_with: --> <!-- @extra_labels: browser-focus-geckoview --> **URL**: https://www.pornhub.com/login?redirect=cTF12HAk8tJ2J22KE07_tGGQiqto0YEF9lJYAaDSjLMlAGijr-EbAOvmJcTgLA9A **Browser / Version**: Firefox Mobile 71.0 **Operating System**: Android **Tested Another Browser**: Unknown **Problem type**: Design is broken **Description**: redirect **Steps to Reproduce**: <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
www.pornhub.com - design is broken - <!-- @browser: Firefox Mobile 71.0 --> <!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:71.0) Gecko/71.0 Firefox/71.0 --> <!-- @reported_with: --> <!-- @extra_labels: browser-focus-geckoview --> **URL**: https://www.pornhub.com/login?redirect=cTF12HAk8tJ2J22KE07_tGGQiqto0YEF9lJYAaDSjLMlAGijr-EbAOvmJcTgLA9A **Browser / Version**: Firefox Mobile 71.0 **Operating System**: Android **Tested Another Browser**: Unknown **Problem type**: Design is broken **Description**: redirect **Steps to Reproduce**: <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
non_usab
design is broken url browser version firefox mobile operating system android tested another browser unknown problem type design is broken description redirect steps to reproduce browser configuration none from with ❤️
0
28,736
11,685,286,307
IssuesEvent
2020-03-05 08:48:13
mozilla-mobile/fenix
https://api.github.com/repos/mozilla-mobile/fenix
closed
Custom ETP: Choose which trackers and scripts to block
E8 Feature:FennecTransition Feature:Privacy&Security Feature:TrackingProtection eng:ready should
## User Story - As a user, I want to choose which type of trackers and scripts to block in my browser, so I can have full control over my privacy settings. Note: currently users do not have the option of blocking all cookies if they choose to. ### Acceptance Criteria - [x] I can go in my ETP settings and choose "custom" and decide on which trackers and scripts are blocked. - [x] I can choose to block all cookies if I want. - [ ] Telemetry Ticket to track how often users choose custom Design Work - [ ] Request for Comments from UX team - [ ] N/A Usability testing if a new pattern or potentially confusing UI - [x] Request for Comments from Fenix team and/or A/C, GV, Sync, etc as needed - [x] Interaction details included - [ ] N/A Accessibility - is this a review by someone, just keeping it in mind? - [x] For existing UI changes, details are highlighted - [x] Strings/content reviewed and approved - [ ] Are they too long for the component in other locales Deliverable - [x] Assets uploaded to Google Drive - [x] Links to deliverables (spec, assets) posted in comment 0 Deliverable Links [UX Spec](https://share.goabstract.com/e02ea1ca-172f-4be9-abd5-03621246e434?mode=design&sha=7d9abedbe503d2fc1a494b4cf3b59e607c7b7a19)
True
Custom ETP: Choose which trackers and scripts to block - ## User Story - As a user, I want to choose which type of trackers and scripts to block in my browser, so I can have full control over my privacy settings. Note: currently users do not have the option of blocking all cookies if they choose to. ### Acceptance Criteria - [x] I can go in my ETP settings and choose "custom" and decide on which trackers and scripts are blocked. - [x] I can choose to block all cookies if I want. - [ ] Telemetry Ticket to track how often users choose custom Design Work - [ ] Request for Comments from UX team - [ ] N/A Usability testing if a new pattern or potentially confusing UI - [x] Request for Comments from Fenix team and/or A/C, GV, Sync, etc as needed - [x] Interaction details included - [ ] N/A Accessibility - is this a review by someone, just keeping it in mind? - [x] For existing UI changes, details are highlighted - [x] Strings/content reviewed and approved - [ ] Are they too long for the component in other locales Deliverable - [x] Assets uploaded to Google Drive - [x] Links to deliverables (spec, assets) posted in comment 0 Deliverable Links [UX Spec](https://share.goabstract.com/e02ea1ca-172f-4be9-abd5-03621246e434?mode=design&sha=7d9abedbe503d2fc1a494b4cf3b59e607c7b7a19)
non_usab
custom etp choose which trackers and scripts to block user story as a user i want to choose which type of trackers and scripts to block in my browser so i can have full control over my privacy settings note currently users do not have the option of blocking all cookies if they choose to acceptance criteria i can go in my etp settings and choose custom and decide on which trackers and scripts are blocked i can choose to block all cookies if i want telemetry ticket to track how often users choose custom design work request for comments from ux team n a usability testing if a new pattern or potentially confusing ui request for comments from fenix team and or a c gv sync etc as needed interaction details included n a accessibility is this a review by someone just keeping it in mind for existing ui changes details are highlighted strings content reviewed and approved are they too long for the component in other locales deliverable assets uploaded to google drive links to deliverables spec assets posted in comment deliverable links
0
22,494
6,254,574,519
IssuesEvent
2017-07-14 02:49:12
PowerPointLabs/PowerPointLabs
https://api.github.com/repos/PowerPointLabs/PowerPointLabs
opened
TextCollection should be organized into their respective labs
a-CodeQuality c.Task
Also needs to consider whether the text classes should be put into their respective labs folder, or a textcollection folder. e.g. CropLab/CropLabText.cs or TextCollection/CropLabText.cs A few options: - Use a namespace ``` namespace PowerPointLabs.TextCollection { internal static class CropLabText { ... } } using PowerPointLabs.TextCollection; string str = CropLabText.CropToShapeTooltip; ``` Pros: Separate TextCollection class for each lab, more readable when using the strings Cons: - Use partial class ``` internal static partial class TextCollection { public static string CropLabCropToShapeTooltip = ""; } string str = TextCollection.CropLabCropToShapeTooltip; ``` Pros: A single class for all text Cons: Needs to prefix the lab into the variable names, little difference from now other than file organization
1.0
TextCollection should be organized into their respective labs - Also needs to consider whether the text classes should be put into their respective labs folder, or a textcollection folder. e.g. CropLab/CropLabText.cs or TextCollection/CropLabText.cs A few options: - Use a namespace ``` namespace PowerPointLabs.TextCollection { internal static class CropLabText { ... } } using PowerPointLabs.TextCollection; string str = CropLabText.CropToShapeTooltip; ``` Pros: Separate TextCollection class for each lab, more readable when using the strings Cons: - Use partial class ``` internal static partial class TextCollection { public static string CropLabCropToShapeTooltip = ""; } string str = TextCollection.CropLabCropToShapeTooltip; ``` Pros: A single class for all text Cons: Needs to prefix the lab into the variable names, little difference from now other than file organization
non_usab
textcollection should be organized into their respective labs also needs to consider whether the text classes should be put into their respective labs folder or a textcollection folder e g croplab croplabtext cs or textcollection croplabtext cs a few options use a namespace namespace powerpointlabs textcollection internal static class croplabtext using powerpointlabs textcollection string str croplabtext croptoshapetooltip pros separate textcollection class for each lab more readable when using the strings cons use partial class internal static partial class textcollection public static string croplabcroptoshapetooltip string str textcollection croplabcroptoshapetooltip pros a single class for all text cons needs to prefix the lab into the variable names little difference from now other than file organization
0
252,267
19,010,038,052
IssuesEvent
2021-11-23 08:11:45
fremtind/jokul
https://api.github.com/repos/fremtind/jokul
closed
Komponentdok for Message box
📚 documentation
**Må ha** - [x] Eksempler på riktig og feil bruk - [x] Live kodeeksempel - [x] React-props oppsummert i bunnen **Vil ha** - [ ] Eksempler på bruk i teamene - [x] Kontrollspørsmål for bruk - [x] Lenker til relevante komponenter
1.0
Komponentdok for Message box - **Må ha** - [x] Eksempler på riktig og feil bruk - [x] Live kodeeksempel - [x] React-props oppsummert i bunnen **Vil ha** - [ ] Eksempler på bruk i teamene - [x] Kontrollspørsmål for bruk - [x] Lenker til relevante komponenter
non_usab
komponentdok for message box må ha eksempler på riktig og feil bruk live kodeeksempel react props oppsummert i bunnen vil ha eksempler på bruk i teamene kontrollspørsmål for bruk lenker til relevante komponenter
0
15,951
10,440,651,453
IssuesEvent
2019-09-18 09:09:12
niftools/blender_nif_plugin
https://api.github.com/repos/niftools/blender_nif_plugin
closed
Export fails : No object selected
Improvement Usability
Traceback (most recent call last): File "\io_scene_nif\operators\nif_export_op.py", line 164, in execute return nif_export.NifExport(self, context).execute() File "\io_scene_nif\nif_export.py", line 200, in execute "Please select the object(s) to export," io_scene_nif.utility.nif_utils.NifError: Please select the object(s) to export, and run this script again. location: <unknown location>:-1
True
Export fails : No object selected - Traceback (most recent call last): File "\io_scene_nif\operators\nif_export_op.py", line 164, in execute return nif_export.NifExport(self, context).execute() File "\io_scene_nif\nif_export.py", line 200, in execute "Please select the object(s) to export," io_scene_nif.utility.nif_utils.NifError: Please select the object(s) to export, and run this script again. location: <unknown location>:-1
usab
export fails no object selected traceback most recent call last file io scene nif operators nif export op py line in execute return nif export nifexport self context execute file io scene nif nif export py line in execute please select the object s to export io scene nif utility nif utils niferror please select the object s to export and run this script again location
1
193,384
22,216,144,508
IssuesEvent
2022-06-08 02:00:28
maddyCode23/linux-4.1.15
https://api.github.com/repos/maddyCode23/linux-4.1.15
reopened
CVE-2017-7273 (Medium) detected in linux-stable-rtv4.1.33
security vulnerability
## CVE-2017-7273 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-cypress.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report. <p>Publish Date: 2017-03-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-7273>CVE-2017-7273</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Physical - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7273">https://nvd.nist.gov/vuln/detail/CVE-2017-7273</a></p> <p>Release Date: 2017-03-27</p> <p>Fix Resolution: 4.9.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-7273 (Medium) detected in linux-stable-rtv4.1.33 - ## CVE-2017-7273 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-cypress.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report. <p>Publish Date: 2017-03-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-7273>CVE-2017-7273</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Physical - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7273">https://nvd.nist.gov/vuln/detail/CVE-2017-7273</a></p> <p>Release Date: 2017-03-27</p> <p>Fix Resolution: 4.9.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve medium detected in linux stable cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files drivers hid hid cypress c vulnerability details the cp report fixup function in drivers hid hid cypress c in the linux kernel and x before allows physically proximate attackers to cause a denial of service integer underflow or possibly have unspecified other impact via a crafted hid report publish date url a href cvss score details base score metrics exploitability metrics attack vector physical attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
10,882
6,970,715,208
IssuesEvent
2017-12-11 11:18:49
theodi/csvlint
https://api.github.com/repos/theodi/csvlint
opened
Allow additional columns
f:enhancement-suggestion fn:Development fn:Usability
Allow for the extension of datasets with local information - additional columns outside of the provided schema - extendable. - Validator should ignore any columns included in addition to those in the schema
True
Allow additional columns - Allow for the extension of datasets with local information - additional columns outside of the provided schema - extendable. - Validator should ignore any columns included in addition to those in the schema
usab
allow additional columns allow for the extension of datasets with local information additional columns outside of the provided schema extendable validator should ignore any columns included in addition to those in the schema
1
7,377
4,958,430,729
IssuesEvent
2016-12-02 09:45:27
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
How to disable the internal text editor?
bug topic:editor usability
Godot version:2.1.1 I set the external editor to sublime3,but when I edit a script,both the sublime3 and internal editor pop up. How can I disable the internal editor?
True
How to disable the internal text editor? - Godot version:2.1.1 I set the external editor to sublime3,but when I edit a script,both the sublime3 and internal editor pop up. How can I disable the internal editor?
usab
how to disable the internal text editor godot version i set the external editor to but when i edit a script both the and internal editor pop up how can i disable the internal editor
1
67,825
21,180,716,152
IssuesEvent
2022-04-08 07:39:30
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
closed
Hazelcast hangs in REPLICA_NOT_SYNC state [HZ-1013]
Type: Defect Team: Core Source: Community Module: Partitioning to-jira
<!-- Thanks for reporting your issue. Please share with us the following information, to help us resolve your issue quickly and efficiently. --> **Describe the bug** Unfortunately, I don't have too much information I can share and also no reproduction case. We're experiencing problems with our Hazelcast nodes that seem to hang in `REPLICA_NOT_SYNC` state and even get unresponsive as it seems. Especially when starting the cluster we notice this. We're doing health checks each second that try to call `IPartitionService.isMemberStateSafe`. When we remove that from that from the health check our cluster seems to be fine after startup. **Expected behavior** Member state recovers to SAFE eventually and application does not hang. **To Reproduce** Unfortunately, no reproduction available. Calling `IPartitionService.isMemberStateSafe` concurrently might be a way. **Additional context** Hazelcast 4.1.5 JDK 11.0.12 Linux Cluster size: 2 Application is not under load when this happens. Might be related to https://github.com/hazelcast/hazelcast/issues/18778#issuecomment-86761475 **Excerpt of thread dump** ``` "ForkJoinPool.commonPool-worker-5" #114 daemon prio=5 os_prio=0 cpu=924.45ms elapsed=4695.40s tid=0x00007f3cb8203800 nid=0x1d0b waiting on condition [0x00007f3c9a0d7000] java.lang.Thread.State: TIMED_WAITING (parking) at jdk.internal.misc.Unsafe.park(java.base@11.0.12/Native Method) - parking to wait for <0x00000007f170f5c8> (a java.util.concurrent.Semaphore$NonfairSync) at java.util.concurrent.locks.LockSupport.parkNanos(java.base@11.0.12/LockSupport.java:234) at java.util.concurrent.locks.AbstractQueuedSynchronizer.doAcquireSharedNanos(java.base@11.0.12/AbstractQueuedSynchronizer.java:1079) at java.util.concurrent.locks.AbstractQueuedSynchronizer.tryAcquireSharedNanos(java.base@11.0.12/AbstractQueuedSynchronizer.java:1369) at java.util.concurrent.Semaphore.tryAcquire(java.base@11.0.12/Semaphore.java:592) at com.hazelcast.internal.partition.impl.PartitionReplicaStateChecker.checkAndTriggerReplicaSync(PartitionReplicaStateChecker.java:238) at com.hazelcast.internal.partition.impl.PartitionReplicaStateChecker.getPartitionServiceState(PartitionReplicaStateChecker.java:107) at com.hazelcast.internal.partition.impl.InternalPartitionServiceImpl.isMemberStateSafe(InternalPartitionServiceImpl.java:1107) "ForkJoinPool.commonPool-worker-7" #120 daemon prio=5 os_prio=0 cpu=940.15ms elapsed=4695.04s tid=0x00007f3cf800b000 nid=0x1d11 waiting on condition [0x00007f3c9a5dc000] java.lang.Thread.State: TIMED_WAITING (parking) at jdk.internal.misc.Unsafe.park(java.base@11.0.12/Native Method) - parking to wait for <0x00000007f21c61c0> (a java.util.concurrent.Semaphore$NonfairSync) at java.util.concurrent.locks.LockSupport.parkNanos(java.base@11.0.12/LockSupport.java:234) at java.util.concurrent.locks.AbstractQueuedSynchronizer.doAcquireSharedNanos(java.base@11.0.12/AbstractQueuedSynchronizer.java:1079) at java.util.concurrent.locks.AbstractQueuedSynchronizer.tryAcquireSharedNanos(java.base@11.0.12/AbstractQueuedSynchronizer.java:1369) at java.util.concurrent.Semaphore.tryAcquire(java.base@11.0.12/Semaphore.java:592) at com.hazelcast.internal.partition.impl.PartitionReplicaStateChecker.checkAndTriggerReplicaSync(PartitionReplicaStateChecker.java:238) at com.hazelcast.internal.partition.impl.PartitionReplicaStateChecker.getPartitionServiceState(PartitionReplicaStateChecker.java:107) at com.hazelcast.internal.partition.impl.InternalPartitionServiceImpl.isMemberStateSafe(InternalPartitionServiceImpl.java:1107) ```
1.0
Hazelcast hangs in REPLICA_NOT_SYNC state [HZ-1013] - <!-- Thanks for reporting your issue. Please share with us the following information, to help us resolve your issue quickly and efficiently. --> **Describe the bug** Unfortunately, I don't have too much information I can share and also no reproduction case. We're experiencing problems with our Hazelcast nodes that seem to hang in `REPLICA_NOT_SYNC` state and even get unresponsive as it seems. Especially when starting the cluster we notice this. We're doing health checks each second that try to call `IPartitionService.isMemberStateSafe`. When we remove that from that from the health check our cluster seems to be fine after startup. **Expected behavior** Member state recovers to SAFE eventually and application does not hang. **To Reproduce** Unfortunately, no reproduction available. Calling `IPartitionService.isMemberStateSafe` concurrently might be a way. **Additional context** Hazelcast 4.1.5 JDK 11.0.12 Linux Cluster size: 2 Application is not under load when this happens. Might be related to https://github.com/hazelcast/hazelcast/issues/18778#issuecomment-86761475 **Excerpt of thread dump** ``` "ForkJoinPool.commonPool-worker-5" #114 daemon prio=5 os_prio=0 cpu=924.45ms elapsed=4695.40s tid=0x00007f3cb8203800 nid=0x1d0b waiting on condition [0x00007f3c9a0d7000] java.lang.Thread.State: TIMED_WAITING (parking) at jdk.internal.misc.Unsafe.park(java.base@11.0.12/Native Method) - parking to wait for <0x00000007f170f5c8> (a java.util.concurrent.Semaphore$NonfairSync) at java.util.concurrent.locks.LockSupport.parkNanos(java.base@11.0.12/LockSupport.java:234) at java.util.concurrent.locks.AbstractQueuedSynchronizer.doAcquireSharedNanos(java.base@11.0.12/AbstractQueuedSynchronizer.java:1079) at java.util.concurrent.locks.AbstractQueuedSynchronizer.tryAcquireSharedNanos(java.base@11.0.12/AbstractQueuedSynchronizer.java:1369) at java.util.concurrent.Semaphore.tryAcquire(java.base@11.0.12/Semaphore.java:592) at com.hazelcast.internal.partition.impl.PartitionReplicaStateChecker.checkAndTriggerReplicaSync(PartitionReplicaStateChecker.java:238) at com.hazelcast.internal.partition.impl.PartitionReplicaStateChecker.getPartitionServiceState(PartitionReplicaStateChecker.java:107) at com.hazelcast.internal.partition.impl.InternalPartitionServiceImpl.isMemberStateSafe(InternalPartitionServiceImpl.java:1107) "ForkJoinPool.commonPool-worker-7" #120 daemon prio=5 os_prio=0 cpu=940.15ms elapsed=4695.04s tid=0x00007f3cf800b000 nid=0x1d11 waiting on condition [0x00007f3c9a5dc000] java.lang.Thread.State: TIMED_WAITING (parking) at jdk.internal.misc.Unsafe.park(java.base@11.0.12/Native Method) - parking to wait for <0x00000007f21c61c0> (a java.util.concurrent.Semaphore$NonfairSync) at java.util.concurrent.locks.LockSupport.parkNanos(java.base@11.0.12/LockSupport.java:234) at java.util.concurrent.locks.AbstractQueuedSynchronizer.doAcquireSharedNanos(java.base@11.0.12/AbstractQueuedSynchronizer.java:1079) at java.util.concurrent.locks.AbstractQueuedSynchronizer.tryAcquireSharedNanos(java.base@11.0.12/AbstractQueuedSynchronizer.java:1369) at java.util.concurrent.Semaphore.tryAcquire(java.base@11.0.12/Semaphore.java:592) at com.hazelcast.internal.partition.impl.PartitionReplicaStateChecker.checkAndTriggerReplicaSync(PartitionReplicaStateChecker.java:238) at com.hazelcast.internal.partition.impl.PartitionReplicaStateChecker.getPartitionServiceState(PartitionReplicaStateChecker.java:107) at com.hazelcast.internal.partition.impl.InternalPartitionServiceImpl.isMemberStateSafe(InternalPartitionServiceImpl.java:1107) ```
non_usab
hazelcast hangs in replica not sync state thanks for reporting your issue please share with us the following information to help us resolve your issue quickly and efficiently describe the bug unfortunately i don t have too much information i can share and also no reproduction case we re experiencing problems with our hazelcast nodes that seem to hang in replica not sync state and even get unresponsive as it seems especially when starting the cluster we notice this we re doing health checks each second that try to call ipartitionservice ismemberstatesafe when we remove that from that from the health check our cluster seems to be fine after startup expected behavior member state recovers to safe eventually and application does not hang to reproduce unfortunately no reproduction available calling ipartitionservice ismemberstatesafe concurrently might be a way additional context hazelcast jdk linux cluster size application is not under load when this happens might be related to excerpt of thread dump forkjoinpool commonpool worker daemon prio os prio cpu elapsed tid nid waiting on condition java lang thread state timed waiting parking at jdk internal misc unsafe park java base native method parking to wait for a java util concurrent semaphore nonfairsync at java util concurrent locks locksupport parknanos java base locksupport java at java util concurrent locks abstractqueuedsynchronizer doacquiresharednanos java base abstractqueuedsynchronizer java at java util concurrent locks abstractqueuedsynchronizer tryacquiresharednanos java base abstractqueuedsynchronizer java at java util concurrent semaphore tryacquire java base semaphore java at com hazelcast internal partition impl partitionreplicastatechecker checkandtriggerreplicasync partitionreplicastatechecker java at com hazelcast internal partition impl partitionreplicastatechecker getpartitionservicestate partitionreplicastatechecker java at com hazelcast internal partition impl internalpartitionserviceimpl ismemberstatesafe internalpartitionserviceimpl java forkjoinpool commonpool worker daemon prio os prio cpu elapsed tid nid waiting on condition java lang thread state timed waiting parking at jdk internal misc unsafe park java base native method parking to wait for a java util concurrent semaphore nonfairsync at java util concurrent locks locksupport parknanos java base locksupport java at java util concurrent locks abstractqueuedsynchronizer doacquiresharednanos java base abstractqueuedsynchronizer java at java util concurrent locks abstractqueuedsynchronizer tryacquiresharednanos java base abstractqueuedsynchronizer java at java util concurrent semaphore tryacquire java base semaphore java at com hazelcast internal partition impl partitionreplicastatechecker checkandtriggerreplicasync partitionreplicastatechecker java at com hazelcast internal partition impl partitionreplicastatechecker getpartitionservicestate partitionreplicastatechecker java at com hazelcast internal partition impl internalpartitionserviceimpl ismemberstatesafe internalpartitionserviceimpl java
0
19,972
14,855,890,483
IssuesEvent
2021-01-18 13:25:19
raiden-network/raiden
https://api.github.com/repos/raiden-network/raiden
closed
Check minimal transfer expiration
Component / API Flag / Usability
In https://github.com/raiden-network/team/issues/894 we agreed to the minimal allowed value for transfer expiration that should be accepted by the client. It needs to be checked that - the client accepts transfers with the minimal and great expiration - the client rejects transfers with lower expiration that the minimal value The default expiration should stay the same
True
Check minimal transfer expiration - In https://github.com/raiden-network/team/issues/894 we agreed to the minimal allowed value for transfer expiration that should be accepted by the client. It needs to be checked that - the client accepts transfers with the minimal and great expiration - the client rejects transfers with lower expiration that the minimal value The default expiration should stay the same
usab
check minimal transfer expiration in we agreed to the minimal allowed value for transfer expiration that should be accepted by the client it needs to be checked that the client accepts transfers with the minimal and great expiration the client rejects transfers with lower expiration that the minimal value the default expiration should stay the same
1
1,614
2,908,672,460
IssuesEvent
2015-06-20 00:35:07
sandstorm-io/sandstorm
https://api.github.com/repos/sandstorm-io/sandstorm
closed
Admin page: confusing message after configuring an OAuth provider
bite-size self-hosting shell usability
After configuring an OAuth provider and clicking "save configuration", the config window closes and a message appears at the bottom of the setting page saying "Success! Your settings have been saved.". But, this only refers to the service config. The fact that I have checked the box to enable the login method (which is what caused the service config window to open) has _not_ been saved, requiring me to click "save" again. I think that: * Clicking "save configuration" on the service config should also immediately update the database to indicate that the service is enabled (without saving the rest of the stuff on the page). * No "success" message should appear when the window closes; generally, the fact that the window closed is already enough feedback for the user that the settings were accepted. (You could still display an error if there is one.)
True
Admin page: confusing message after configuring an OAuth provider - After configuring an OAuth provider and clicking "save configuration", the config window closes and a message appears at the bottom of the setting page saying "Success! Your settings have been saved.". But, this only refers to the service config. The fact that I have checked the box to enable the login method (which is what caused the service config window to open) has _not_ been saved, requiring me to click "save" again. I think that: * Clicking "save configuration" on the service config should also immediately update the database to indicate that the service is enabled (without saving the rest of the stuff on the page). * No "success" message should appear when the window closes; generally, the fact that the window closed is already enough feedback for the user that the settings were accepted. (You could still display an error if there is one.)
usab
admin page confusing message after configuring an oauth provider after configuring an oauth provider and clicking save configuration the config window closes and a message appears at the bottom of the setting page saying success your settings have been saved but this only refers to the service config the fact that i have checked the box to enable the login method which is what caused the service config window to open has not been saved requiring me to click save again i think that clicking save configuration on the service config should also immediately update the database to indicate that the service is enabled without saving the rest of the stuff on the page no success message should appear when the window closes generally the fact that the window closed is already enough feedback for the user that the settings were accepted you could still display an error if there is one
1
4,914
3,898,334,503
IssuesEvent
2016-04-17 01:01:15
lionheart/openradar-mirror
https://api.github.com/repos/lionheart/openradar-mirror
opened
14847817: UIScrollView: Need updated frame when keyboard is being dismissed interactively
classification:ui/usability reproducible:always status:open
#### Description Summary: Setting UIScrollView's keyboardDismissMode property to interactive allows the user to manipulate the keyboard by dragging. However, there is no (easy) way to find out the updated frame of the keyboard. The notifications UIKeyboardDidChangeFrameNotification and UIKeyboardWillChangeFrameNotification are only sent when the keyboard is displayed and dismissed. They are not sent as the frame of the keyboard is updated. Either these notifications should fire every frame as the keyboard is being dragged, or UIScrollViewDelegate should have a new delegate method, something like -scrollView:didChangeKeyboardFrame:, where the second parameter is the frame of the keyboard converted to the scrollview's coordinate space. Steps to Reproduce: Expected Results: Actual Results: Regression: Notes: - Product Version: 7 seed 5 Created: 2013-08-27T19:50:23.461411 Originated: 2013-08-27T13:49:00 Open Radar Link: http://www.openradar.me/14847817
True
14847817: UIScrollView: Need updated frame when keyboard is being dismissed interactively - #### Description Summary: Setting UIScrollView's keyboardDismissMode property to interactive allows the user to manipulate the keyboard by dragging. However, there is no (easy) way to find out the updated frame of the keyboard. The notifications UIKeyboardDidChangeFrameNotification and UIKeyboardWillChangeFrameNotification are only sent when the keyboard is displayed and dismissed. They are not sent as the frame of the keyboard is updated. Either these notifications should fire every frame as the keyboard is being dragged, or UIScrollViewDelegate should have a new delegate method, something like -scrollView:didChangeKeyboardFrame:, where the second parameter is the frame of the keyboard converted to the scrollview's coordinate space. Steps to Reproduce: Expected Results: Actual Results: Regression: Notes: - Product Version: 7 seed 5 Created: 2013-08-27T19:50:23.461411 Originated: 2013-08-27T13:49:00 Open Radar Link: http://www.openradar.me/14847817
usab
uiscrollview need updated frame when keyboard is being dismissed interactively description summary setting uiscrollview s keyboarddismissmode property to interactive allows the user to manipulate the keyboard by dragging however there is no easy way to find out the updated frame of the keyboard the notifications uikeyboarddidchangeframenotification and uikeyboardwillchangeframenotification are only sent when the keyboard is displayed and dismissed they are not sent as the frame of the keyboard is updated either these notifications should fire every frame as the keyboard is being dragged or uiscrollviewdelegate should have a new delegate method something like scrollview didchangekeyboardframe where the second parameter is the frame of the keyboard converted to the scrollview s coordinate space steps to reproduce expected results actual results regression notes product version seed created originated open radar link
1
387,153
11,457,107,714
IssuesEvent
2020-02-06 22:47:50
LinkedEarth/Pyleoclim_util
https://api.github.com/repos/LinkedEarth/Pyleoclim_util
closed
update interp function to allow for linear and spline
High Priority bug
Use this: https://docs.scipy.org/doc/scipy/reference/generated/scipy.interpolate.interp2d.html instead of the bumpy version
1.0
update interp function to allow for linear and spline - Use this: https://docs.scipy.org/doc/scipy/reference/generated/scipy.interpolate.interp2d.html instead of the bumpy version
non_usab
update interp function to allow for linear and spline use this instead of the bumpy version
0
24,678
24,134,585,483
IssuesEvent
2022-09-21 10:10:50
pypi/warehouse
https://api.github.com/repos/pypi/warehouse
opened
[FR] Multiline (and rich?) yank reason
UX/UI usability HTML feature request requires triaging needs discussion
**What's the problem this feature will solve?** <!-- A clear and concise description of what the problem is. --> Having a comprehensive explanation for yanking. I think it is important not to limit the maintainers with a very small input box. It would be useful to be able to show a descriptive message to the end-users too (related to FR #9837). **Describe the solution you'd like** <!-- A clear and concise description of what you want to happen. --> I want `<textarea>` in the UI, not an `<input>`. It could then also be displayed on the individual release pages and only the first line (maybe) would appear in badge tooltips (as suggested in #9837). Not sure if allowing renderable Markdown would be safe but, I'd at least make the links clickable there too. **Additional context** <!-- Add any other context, links, etc. about the feature here. --> N/A
True
[FR] Multiline (and rich?) yank reason - **What's the problem this feature will solve?** <!-- A clear and concise description of what the problem is. --> Having a comprehensive explanation for yanking. I think it is important not to limit the maintainers with a very small input box. It would be useful to be able to show a descriptive message to the end-users too (related to FR #9837). **Describe the solution you'd like** <!-- A clear and concise description of what you want to happen. --> I want `<textarea>` in the UI, not an `<input>`. It could then also be displayed on the individual release pages and only the first line (maybe) would appear in badge tooltips (as suggested in #9837). Not sure if allowing renderable Markdown would be safe but, I'd at least make the links clickable there too. **Additional context** <!-- Add any other context, links, etc. about the feature here. --> N/A
usab
multiline and rich yank reason what s the problem this feature will solve having a comprehensive explanation for yanking i think it is important not to limit the maintainers with a very small input box it would be useful to be able to show a descriptive message to the end users too related to fr describe the solution you d like i want in the ui not an it could then also be displayed on the individual release pages and only the first line maybe would appear in badge tooltips as suggested in not sure if allowing renderable markdown would be safe but i d at least make the links clickable there too additional context n a
1
671,958
22,782,057,465
IssuesEvent
2022-07-08 21:08:02
Templarian/MaterialDesign
https://api.github.com/repos/Templarian/MaterialDesign
closed
Currency icons for Ukrainian hryvnia
Icon Request High Priority
I have: - [x] [Searched all issues](https://github.com/Templarian/MaterialDesign/issues) to make sure there isn't a request for this icon. - [x] [Searched the current library](https://materialdesignicons.com/) to make sure the icon doesn't exist. - [x] Only requested a single icon in this issue. ## Usage * It will be used to show the currency sign for money value in hryvnia. * It's sign is: ₴. * The code is: UAH * [Wikipedia](https://en.wikipedia.org/wiki/Ukrainian_hryvnia) * [Hryvnia sign](https://en.wikipedia.org/wiki/Hryvnia_sign) * [Unicode Character](http://www.fileformat.info/info/unicode/char/20b4/index.htm) ## Examples ![1](https://camo.githubusercontent.com/96388bac39576ce8bef99e922a292aea0412e885/68747470733a2f2f706f6f686974616e2e636f6d2f73747566662f7561682f7561687369676e2e706e67) ![2](https://camo.githubusercontent.com/ad89d1367673c4db40b159e6b92157b146cb2ab5/68747470733a2f2f696d6167652e666c617469636f6e2e636f6d2f69636f6e732f7376672f36362f36363233302e737667)
1.0
Currency icons for Ukrainian hryvnia - I have: - [x] [Searched all issues](https://github.com/Templarian/MaterialDesign/issues) to make sure there isn't a request for this icon. - [x] [Searched the current library](https://materialdesignicons.com/) to make sure the icon doesn't exist. - [x] Only requested a single icon in this issue. ## Usage * It will be used to show the currency sign for money value in hryvnia. * It's sign is: ₴. * The code is: UAH * [Wikipedia](https://en.wikipedia.org/wiki/Ukrainian_hryvnia) * [Hryvnia sign](https://en.wikipedia.org/wiki/Hryvnia_sign) * [Unicode Character](http://www.fileformat.info/info/unicode/char/20b4/index.htm) ## Examples ![1](https://camo.githubusercontent.com/96388bac39576ce8bef99e922a292aea0412e885/68747470733a2f2f706f6f686974616e2e636f6d2f73747566662f7561682f7561687369676e2e706e67) ![2](https://camo.githubusercontent.com/ad89d1367673c4db40b159e6b92157b146cb2ab5/68747470733a2f2f696d6167652e666c617469636f6e2e636f6d2f69636f6e732f7376672f36362f36363233302e737667)
non_usab
currency icons for ukrainian hryvnia i have to make sure there isn t a request for this icon to make sure the icon doesn t exist only requested a single icon in this issue usage it will be used to show the currency sign for money value in hryvnia it s sign is ₴ the code is uah examples
0
14,123
8,848,154,789
IssuesEvent
2019-01-08 05:37:42
openstreetmap/iD
https://api.github.com/repos/openstreetmap/iD
closed
Swing to changes spot upon clicking Restore Changes
usability
If we click the Restore changes from previous session choice, our field of view should perhaps swing to where those changes were.
True
Swing to changes spot upon clicking Restore Changes - If we click the Restore changes from previous session choice, our field of view should perhaps swing to where those changes were.
usab
swing to changes spot upon clicking restore changes if we click the restore changes from previous session choice our field of view should perhaps swing to where those changes were
1
9,955
6,529,246,106
IssuesEvent
2017-08-30 10:46:55
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Ability to translate and scale 3D nodes on two axes at once, locking the remaining axis
enhancement topic:editor usability
In Blender, it is possible to translate and scale 3D nodes on two axes at once (XY, YZ, or XZ) while locking the remaining axis (it is done by holding <kbd>Shift</kbd> while pressing an axis modifier key). This makes it easier and quicker to move or scale 3D geometry along a flat surface, for example. Supporting this in Godot would make the 3D workflow more convenient.
True
Ability to translate and scale 3D nodes on two axes at once, locking the remaining axis - In Blender, it is possible to translate and scale 3D nodes on two axes at once (XY, YZ, or XZ) while locking the remaining axis (it is done by holding <kbd>Shift</kbd> while pressing an axis modifier key). This makes it easier and quicker to move or scale 3D geometry along a flat surface, for example. Supporting this in Godot would make the 3D workflow more convenient.
usab
ability to translate and scale nodes on two axes at once locking the remaining axis in blender it is possible to translate and scale nodes on two axes at once xy yz or xz while locking the remaining axis it is done by holding shift while pressing an axis modifier key this makes it easier and quicker to move or scale geometry along a flat surface for example supporting this in godot would make the workflow more convenient
1
269,616
23,452,672,316
IssuesEvent
2022-08-16 05:33:56
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
opened
roachtest: sqlsmith/setup=rand-tables/setting=no-mutations failed
C-test-failure O-robot O-roachtest branch-master
roachtest.sqlsmith/setup=rand-tables/setting=no-mutations [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6107800?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6107800?buildTab=artifacts#/sqlsmith/setup=rand-tables/setting=no-mutations) on master @ [f4042d47fa8062a612c38d4696eb6bee9cee7c21](https://github.com/cockroachdb/cockroach/commits/f4042d47fa8062a612c38d4696eb6bee9cee7c21): ``` test artifacts and logs in: /artifacts/sqlsmith/setup=rand-tables/setting=no-mutations/run_1 sqlsmith.go:265,sqlsmith.go:325,test_runner.go:896: error: pq: internal error: crdb_internal.set_compaction_concurrency(): compaction_concurrency must be > 0 stmt: WITH with_54090 (col_318446) AS ( SELECT * FROM (VALUES ('1.190.141.9/6':::INET)) AS tab_131235 (col_318446) EXCEPT SELECT * FROM (VALUES ('ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff':::INET)) AS tab_131236 (col_318447) ), with_54091 (col_318448) AS ( SELECT * FROM (VALUES (true), (true), (false), (false)) AS tab_131237 (col_318448) UNION SELECT * FROM ( VALUES ( crdb_internal.set_compaction_concurrency(7368933071913653453:::INT8::INT8, (-6393098846911290752):::INT8::INT8, (-909226569288498097):::INT8::INT8)::BOOL ), ( st_dwithin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aN':::FLOAT8::FLOAT8)::BOOL ) ) AS tab_131238 (col_318449) ), with_54092 (col_318450) AS (SELECT * FROM (VALUES (868781623:::OID), (3138052886:::OID)) AS tab_131239 (col_318450)) SELECT '1.244.205.8/29':::INET AS col_318451 FROM with_54090 AS cte_ref_15617 WHERE true ORDER BY cte_ref_15617.col_318446, cte_ref_15617.col_318446 LIMIT 37:::INT8; ``` <p>Parameters: <code>ROACHTEST_cloud=gce</code> , <code>ROACHTEST_cpu=4</code> , <code>ROACHTEST_ssd=0</code> </p> <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/sql-queries <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*sqlsmith/setup=rand-tables/setting=no-mutations.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
2.0
roachtest: sqlsmith/setup=rand-tables/setting=no-mutations failed - roachtest.sqlsmith/setup=rand-tables/setting=no-mutations [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6107800?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6107800?buildTab=artifacts#/sqlsmith/setup=rand-tables/setting=no-mutations) on master @ [f4042d47fa8062a612c38d4696eb6bee9cee7c21](https://github.com/cockroachdb/cockroach/commits/f4042d47fa8062a612c38d4696eb6bee9cee7c21): ``` test artifacts and logs in: /artifacts/sqlsmith/setup=rand-tables/setting=no-mutations/run_1 sqlsmith.go:265,sqlsmith.go:325,test_runner.go:896: error: pq: internal error: crdb_internal.set_compaction_concurrency(): compaction_concurrency must be > 0 stmt: WITH with_54090 (col_318446) AS ( SELECT * FROM (VALUES ('1.190.141.9/6':::INET)) AS tab_131235 (col_318446) EXCEPT SELECT * FROM (VALUES ('ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff':::INET)) AS tab_131236 (col_318447) ), with_54091 (col_318448) AS ( SELECT * FROM (VALUES (true), (true), (false), (false)) AS tab_131237 (col_318448) UNION SELECT * FROM ( VALUES ( crdb_internal.set_compaction_concurrency(7368933071913653453:::INT8::INT8, (-6393098846911290752):::INT8::INT8, (-909226569288498097):::INT8::INT8)::BOOL ), ( st_dwithin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aN':::FLOAT8::FLOAT8)::BOOL ) ) AS tab_131238 (col_318449) ), with_54092 (col_318450) AS (SELECT * FROM (VALUES (868781623:::OID), (3138052886:::OID)) AS tab_131239 (col_318450)) SELECT '1.244.205.8/29':::INET AS col_318451 FROM with_54090 AS cte_ref_15617 WHERE true ORDER BY cte_ref_15617.col_318446, cte_ref_15617.col_318446 LIMIT 37:::INT8; ``` <p>Parameters: <code>ROACHTEST_cloud=gce</code> , <code>ROACHTEST_cpu=4</code> , <code>ROACHTEST_ssd=0</code> </p> <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/sql-queries <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*sqlsmith/setup=rand-tables/setting=no-mutations.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
non_usab
roachtest sqlsmith setup rand tables setting no mutations failed roachtest sqlsmith setup rand tables setting no mutations with on master test artifacts and logs in artifacts sqlsmith setup rand tables setting no mutations run sqlsmith go sqlsmith go test runner go error pq internal error crdb internal set compaction concurrency compaction concurrency must be stmt with with col as select from values inet as tab col except select from values ffff ffff ffff ffff ffff ffff ffff ffff inet as tab col with col as select from values true true false false as tab col union select from values crdb internal set compaction concurrency bool st dwithin geography geography geography geography nan bool as tab col with col as select from values oid oid as tab col select inet as col from with as cte ref where true order by cte ref col cte ref col limit parameters roachtest cloud gce roachtest cpu roachtest ssd help see see cc cockroachdb sql queries
0
5,624
3,970,365,354
IssuesEvent
2016-05-04 06:49:05
kolliSuman/issues
https://api.github.com/repos/kolliSuman/issues
closed
QA_Mohirs circle_Back to experiment_smk
Category: Usability Developed By: VLEAD Release Number: 1 Severity: S2 Status: Open
Defect Description : In “Mohirs circle” experiment, back to the experiments link is not present instead back to the experiments link should be displayed on the experiment home page, where the user can easily get back and view the experiments Actual Result : In Mohirs circle” experiment, back to the experiments link is not present Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 Test Step Link: https://github.com/Virtual-Labs/strength-of-materials-nitk/blob/master/test-cases/integration_test-cases/Mohirs%20circle/Mohirs%20circle_14_Back%20to%20experiment_smk.org
True
QA_Mohirs circle_Back to experiment_smk - Defect Description : In “Mohirs circle” experiment, back to the experiments link is not present instead back to the experiments link should be displayed on the experiment home page, where the user can easily get back and view the experiments Actual Result : In Mohirs circle” experiment, back to the experiments link is not present Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 Test Step Link: https://github.com/Virtual-Labs/strength-of-materials-nitk/blob/master/test-cases/integration_test-cases/Mohirs%20circle/Mohirs%20circle_14_Back%20to%20experiment_smk.org
usab
qa mohirs circle back to experiment smk defect description in “mohirs circle” experiment back to the experiments link is not present instead back to the experiments link should be displayed on the experiment home page where the user can easily get back and view the experiments actual result in mohirs circle” experiment back to the experiments link is not present environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor test step link
1
167,654
13,038,710,773
IssuesEvent
2020-07-28 15:36:17
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
roachtest: decommission/nodes=4/duration=1h0m0s failed
C-test-failure O-roachtest O-robot branch-provisional_202007271721_v20.1.4 release-blocker
[(roachtest).decommission/nodes=4/duration=1h0m0s failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2122385&tab=buildLog) on [provisional_202007271721_v20.1.4@9a822f51a64af9eebcf9ea5e5ecc0fdfcc1521fa](https://github.com/cockroachdb/cockroach/commits/9a822f51a64af9eebcf9ea5e5ecc0fdfcc1521fa): ``` The test failed on branch=provisional_202007271721_v20.1.4, cloud=gce: test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/decommission/nodes=4/duration=1h0m0s/run_1 decommission.go:262,decommission.go:47,test_runner.go:754: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod start -a=--join 10.128.0.45:26257 --attrs=node1 teamcity-2122385-1595896218-01-n4cpu4:1 returned: exit status 1 (1) /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod start -a=--join 10.128.0.45:26257 --attrs=node1 teamcity-2122385-1595896218-01-n4cpu4:1 returned | stderr: | | stdout: | teamcity-2122385-1595896218-01-n4cpu4: starting nodes | teamcity-2122385-1595896218-01-n4cpu4: initializing clusterI200728 00:34:59.441576 21 cockroach.go:163 unable to initialize cluster: ~ | if ! test -e /mnt/data1/cockroach/cluster-bootstrapped ; then | COCKROACH_CONNECT_TIMEOUT=0 ./cockroach init --url 'postgres://root@localhost:26257?sslmode=disable' && touch /mnt/data1/cockroach/cluster-bootstrapped | fi | warning: --url specifies user/password, but command "init" does not accept user/password details - details ignored | * | * ERROR: ERROR: rpc error: code = Unknown desc = already connected to cluster | * | E200728 00:34:59.408191 1 cli/error.go:373 ERROR: rpc error: code = Unknown desc = already connected to cluster | ERROR: rpc error: code = Unknown desc = already connected to cluster | Failed running "init": exit status 1 Wraps: (2) exit status 1 Error types: (1) *main.withCommandDetails (2) *exec.ExitError ``` <details><summary>More</summary><p> Artifacts: [/decommission/nodes=4/duration=1h0m0s](https://teamcity.cockroachdb.com/viewLog.html?buildId=2122385&tab=artifacts#/decommission/nodes=4/duration=1h0m0s) Related: - #51713 roachtest: decommission/nodes=4/duration=1h0m0s failed [C-test-failure](https://api.github.com/repos/cockroachdb/cockroach/labels/C-test-failure) [O-roachtest](https://api.github.com/repos/cockroachdb/cockroach/labels/O-roachtest) [O-robot](https://api.github.com/repos/cockroachdb/cockroach/labels/O-robot) [branch-master](https://api.github.com/repos/cockroachdb/cockroach/labels/branch-master) [release-blocker](https://api.github.com/repos/cockroachdb/cockroach/labels/release-blocker) [See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Adecommission%2Fnodes%3D4%2Fduration%3D1h0m0s.%2A&sort=title&restgroup=false&display=lastcommented+project) <sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
2.0
roachtest: decommission/nodes=4/duration=1h0m0s failed - [(roachtest).decommission/nodes=4/duration=1h0m0s failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2122385&tab=buildLog) on [provisional_202007271721_v20.1.4@9a822f51a64af9eebcf9ea5e5ecc0fdfcc1521fa](https://github.com/cockroachdb/cockroach/commits/9a822f51a64af9eebcf9ea5e5ecc0fdfcc1521fa): ``` The test failed on branch=provisional_202007271721_v20.1.4, cloud=gce: test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/decommission/nodes=4/duration=1h0m0s/run_1 decommission.go:262,decommission.go:47,test_runner.go:754: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod start -a=--join 10.128.0.45:26257 --attrs=node1 teamcity-2122385-1595896218-01-n4cpu4:1 returned: exit status 1 (1) /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod start -a=--join 10.128.0.45:26257 --attrs=node1 teamcity-2122385-1595896218-01-n4cpu4:1 returned | stderr: | | stdout: | teamcity-2122385-1595896218-01-n4cpu4: starting nodes | teamcity-2122385-1595896218-01-n4cpu4: initializing clusterI200728 00:34:59.441576 21 cockroach.go:163 unable to initialize cluster: ~ | if ! test -e /mnt/data1/cockroach/cluster-bootstrapped ; then | COCKROACH_CONNECT_TIMEOUT=0 ./cockroach init --url 'postgres://root@localhost:26257?sslmode=disable' && touch /mnt/data1/cockroach/cluster-bootstrapped | fi | warning: --url specifies user/password, but command "init" does not accept user/password details - details ignored | * | * ERROR: ERROR: rpc error: code = Unknown desc = already connected to cluster | * | E200728 00:34:59.408191 1 cli/error.go:373 ERROR: rpc error: code = Unknown desc = already connected to cluster | ERROR: rpc error: code = Unknown desc = already connected to cluster | Failed running "init": exit status 1 Wraps: (2) exit status 1 Error types: (1) *main.withCommandDetails (2) *exec.ExitError ``` <details><summary>More</summary><p> Artifacts: [/decommission/nodes=4/duration=1h0m0s](https://teamcity.cockroachdb.com/viewLog.html?buildId=2122385&tab=artifacts#/decommission/nodes=4/duration=1h0m0s) Related: - #51713 roachtest: decommission/nodes=4/duration=1h0m0s failed [C-test-failure](https://api.github.com/repos/cockroachdb/cockroach/labels/C-test-failure) [O-roachtest](https://api.github.com/repos/cockroachdb/cockroach/labels/O-roachtest) [O-robot](https://api.github.com/repos/cockroachdb/cockroach/labels/O-robot) [branch-master](https://api.github.com/repos/cockroachdb/cockroach/labels/branch-master) [release-blocker](https://api.github.com/repos/cockroachdb/cockroach/labels/release-blocker) [See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Adecommission%2Fnodes%3D4%2Fduration%3D1h0m0s.%2A&sort=title&restgroup=false&display=lastcommented+project) <sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
non_usab
roachtest decommission nodes duration failed on the test failed on branch provisional cloud gce test artifacts and logs in home agent work go src github com cockroachdb cockroach artifacts decommission nodes duration run decommission go decommission go test runner go home agent work go src github com cockroachdb cockroach bin roachprod start a join attrs teamcity returned exit status home agent work go src github com cockroachdb cockroach bin roachprod start a join attrs teamcity returned stderr stdout teamcity starting nodes teamcity initializing cockroach go unable to initialize cluster if test e mnt cockroach cluster bootstrapped then cockroach connect timeout cockroach init url postgres root localhost sslmode disable touch mnt cockroach cluster bootstrapped fi warning url specifies user password but command init does not accept user password details details ignored error error rpc error code unknown desc already connected to cluster cli error go error rpc error code unknown desc already connected to cluster error rpc error code unknown desc already connected to cluster failed running init exit status wraps exit status error types main withcommanddetails exec exiterror more artifacts related roachtest decommission nodes duration failed powered by
0
114,428
17,209,456,835
IssuesEvent
2021-07-19 00:12:31
turkdevops/javascript-sdk
https://api.github.com/repos/turkdevops/javascript-sdk
opened
CVE-2021-29418 (Medium) detected in netmask-1.0.6.tgz
security vulnerability
## CVE-2021-29418 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netmask-1.0.6.tgz</b></p></summary> <p>Parse and lookup IP network blocks</p> <p>Library home page: <a href="https://registry.npmjs.org/netmask/-/netmask-1.0.6.tgz">https://registry.npmjs.org/netmask/-/netmask-1.0.6.tgz</a></p> <p>Path to dependency file: javascript-sdk/package.json</p> <p>Path to vulnerable library: javascript-sdk/node_modules/netmask/package.json</p> <p> Dependency Hierarchy: - nightwatch-0.9.21.tgz (Root Library) - proxy-agent-2.0.0.tgz - pac-proxy-agent-1.1.0.tgz - pac-resolver-2.0.0.tgz - :x: **netmask-1.0.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/javascript-sdk/commit/2ed96566365ee89d8a9b1250ccd7c049281ed09c">2ed96566365ee89d8a9b1250ccd7c049281ed09c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918. <p>Publish Date: 2021-03-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29418>CVE-2021-29418</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://vuln.ryotak.me/advisories/6.txt">https://vuln.ryotak.me/advisories/6.txt</a></p> <p>Release Date: 2021-03-30</p> <p>Fix Resolution: 2.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-29418 (Medium) detected in netmask-1.0.6.tgz - ## CVE-2021-29418 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netmask-1.0.6.tgz</b></p></summary> <p>Parse and lookup IP network blocks</p> <p>Library home page: <a href="https://registry.npmjs.org/netmask/-/netmask-1.0.6.tgz">https://registry.npmjs.org/netmask/-/netmask-1.0.6.tgz</a></p> <p>Path to dependency file: javascript-sdk/package.json</p> <p>Path to vulnerable library: javascript-sdk/node_modules/netmask/package.json</p> <p> Dependency Hierarchy: - nightwatch-0.9.21.tgz (Root Library) - proxy-agent-2.0.0.tgz - pac-proxy-agent-1.1.0.tgz - pac-resolver-2.0.0.tgz - :x: **netmask-1.0.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/javascript-sdk/commit/2ed96566365ee89d8a9b1250ccd7c049281ed09c">2ed96566365ee89d8a9b1250ccd7c049281ed09c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918. <p>Publish Date: 2021-03-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29418>CVE-2021-29418</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://vuln.ryotak.me/advisories/6.txt">https://vuln.ryotak.me/advisories/6.txt</a></p> <p>Release Date: 2021-03-30</p> <p>Fix Resolution: 2.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve medium detected in netmask tgz cve medium severity vulnerability vulnerable library netmask tgz parse and lookup ip network blocks library home page a href path to dependency file javascript sdk package json path to vulnerable library javascript sdk node modules netmask package json dependency hierarchy nightwatch tgz root library proxy agent tgz pac proxy agent tgz pac resolver tgz x netmask tgz vulnerable library found in head commit a href found in base branch master vulnerability details the netmask package before for node js mishandles certain unexpected characters in an ip address string such as an octal digit of this in some situations allows attackers to bypass access control that is based on ip addresses note this issue exists because of an incomplete fix for cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
75,030
9,816,967,812
IssuesEvent
2019-06-13 15:41:11
MontrealCorpusTools/PolyglotDB
https://api.github.com/repos/MontrealCorpusTools/PolyglotDB
opened
Subannotation documentation
documentation
There needs to be more explanation of subannotation enrichment (like the functionality developed for AutoVOT, as well as more generally). The name "subannotation" is still not great, but since annotation is used to refer to linguistic annotations like words/phones/etc, I'm not sure what a better name would be. Meta-annotation seems clunky. Regardless, some explanation of what subannotations are and how they differ from annotations is needed at some place. User documentation: - [ ] Add page for "Subannotation enrichment" to https://polyglotdb.readthedocs.io/en/latest/enrichment.html (might be a subset of Enrichment via CSV files) - [ ] Add page for querying/exporting subannotations to https://polyglotdb.readthedocs.io/en/latest/queries.html API documentation: - [ ] Docstrings for subannotation import functions (There isn't currently a place for the subannotation from CSV functions to be in the API documentation, this will be part of #137)
1.0
Subannotation documentation - There needs to be more explanation of subannotation enrichment (like the functionality developed for AutoVOT, as well as more generally). The name "subannotation" is still not great, but since annotation is used to refer to linguistic annotations like words/phones/etc, I'm not sure what a better name would be. Meta-annotation seems clunky. Regardless, some explanation of what subannotations are and how they differ from annotations is needed at some place. User documentation: - [ ] Add page for "Subannotation enrichment" to https://polyglotdb.readthedocs.io/en/latest/enrichment.html (might be a subset of Enrichment via CSV files) - [ ] Add page for querying/exporting subannotations to https://polyglotdb.readthedocs.io/en/latest/queries.html API documentation: - [ ] Docstrings for subannotation import functions (There isn't currently a place for the subannotation from CSV functions to be in the API documentation, this will be part of #137)
non_usab
subannotation documentation there needs to be more explanation of subannotation enrichment like the functionality developed for autovot as well as more generally the name subannotation is still not great but since annotation is used to refer to linguistic annotations like words phones etc i m not sure what a better name would be meta annotation seems clunky regardless some explanation of what subannotations are and how they differ from annotations is needed at some place user documentation add page for subannotation enrichment to might be a subset of enrichment via csv files add page for querying exporting subannotations to api documentation docstrings for subannotation import functions there isn t currently a place for the subannotation from csv functions to be in the api documentation this will be part of
0
15,814
5,188,078,134
IssuesEvent
2017-01-20 18:49:01
phetsims/unit-rates
https://api.github.com/repos/phetsims/unit-rates
closed
check for memory leaks
dev:code-review type:wontfix
Code review #52, checklist item: > - [ ] Does a heap comparison using Chrome Developer Tools indicate a memory leak? (Describing this process is beyond the scope of this document.) In implementation-notes.md, @schmitzware indicated: > - When profiling memory usage, if asserts are enabled the sim will leak memory because of the > SUN/buttons/RectangularPushButton's being used. Apparently SUN buttons dispose fails when assertions are enabled, so the disposes are turned off if asserts are turned on (see sun/#212) > - FuzzMouse memory testing seems to stabilize around 30Mb, though I have a sneaking suspicion a few URNumberLineMarkers are still not getting disposed of properly. So it sounds like heap companions have been done, but more investigation may be needed. I'm not going to do this as part of code review, since I think that it makes sense only after the sim is feature complete (which it's not yet).
1.0
check for memory leaks - Code review #52, checklist item: > - [ ] Does a heap comparison using Chrome Developer Tools indicate a memory leak? (Describing this process is beyond the scope of this document.) In implementation-notes.md, @schmitzware indicated: > - When profiling memory usage, if asserts are enabled the sim will leak memory because of the > SUN/buttons/RectangularPushButton's being used. Apparently SUN buttons dispose fails when assertions are enabled, so the disposes are turned off if asserts are turned on (see sun/#212) > - FuzzMouse memory testing seems to stabilize around 30Mb, though I have a sneaking suspicion a few URNumberLineMarkers are still not getting disposed of properly. So it sounds like heap companions have been done, but more investigation may be needed. I'm not going to do this as part of code review, since I think that it makes sense only after the sim is feature complete (which it's not yet).
non_usab
check for memory leaks code review checklist item does a heap comparison using chrome developer tools indicate a memory leak describing this process is beyond the scope of this document in implementation notes md schmitzware indicated when profiling memory usage if asserts are enabled the sim will leak memory because of the sun buttons rectangularpushbutton s being used apparently sun buttons dispose fails when assertions are enabled so the disposes are turned off if asserts are turned on see sun fuzzmouse memory testing seems to stabilize around though i have a sneaking suspicion a few urnumberlinemarkers are still not getting disposed of properly so it sounds like heap companions have been done but more investigation may be needed i m not going to do this as part of code review since i think that it makes sense only after the sim is feature complete which it s not yet
0
128,403
5,064,775,880
IssuesEvent
2016-12-23 08:44:45
praekeltfoundation/gem-bbb-indo
https://api.github.com/repos/praekeltfoundation/gem-bbb-indo
closed
Add Email to Registration
enhancement priority - highest qa
_Language: Indonesian Device Make: Xiaomi Device Model: Mi5 App Version: 0.0.9 Logged by: Pippa_ Add a new field to registration: Email and enable registration to be successful if either email or mobile number is completed (or both). Error text: _We need either your phone number or email address_ Two users during testing did not remember their phone number so we need to give them an option of inputting mobile number or email address or both.
1.0
Add Email to Registration - _Language: Indonesian Device Make: Xiaomi Device Model: Mi5 App Version: 0.0.9 Logged by: Pippa_ Add a new field to registration: Email and enable registration to be successful if either email or mobile number is completed (or both). Error text: _We need either your phone number or email address_ Two users during testing did not remember their phone number so we need to give them an option of inputting mobile number or email address or both.
non_usab
add email to registration language indonesian device make xiaomi device model app version logged by pippa add a new field to registration email and enable registration to be successful if either email or mobile number is completed or both error text we need either your phone number or email address two users during testing did not remember their phone number so we need to give them an option of inputting mobile number or email address or both
0
6,261
4,203,527,873
IssuesEvent
2016-06-28 05:57:42
Virtual-Labs/structural-dynamics-iiith
https://api.github.com/repos/Virtual-Labs/structural-dynamics-iiith
closed
QA_Impulse Response of SDOF_Prerequisites_p1
Category: Usability Developed by: VLEAD Release Number: Production Resolved Severity: S2
Defect Description : In the "Impulse Response of SDOF" experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required. Actual Result : In the "Impulse Response of SDOF" experiment, the minimum requirement to run the experiment is not displayed in the page. Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM Processor:i5 Test Step Link: https://github.com/Virtual-Labs/structural-dynamics-iiith/blob/master/test-cases/integration_test-cases/Impulse%20Response%20of%20SDOF/Impulse%20Response%20of%20SDOF_17_Prerequisites_p1.org Attachment: ![sd42](https://cloud.githubusercontent.com/assets/14869397/14703959/26bb162a-07d0-11e6-93bd-ea1f8b53d776.png)
True
QA_Impulse Response of SDOF_Prerequisites_p1 - Defect Description : In the "Impulse Response of SDOF" experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required. Actual Result : In the "Impulse Response of SDOF" experiment, the minimum requirement to run the experiment is not displayed in the page. Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM Processor:i5 Test Step Link: https://github.com/Virtual-Labs/structural-dynamics-iiith/blob/master/test-cases/integration_test-cases/Impulse%20Response%20of%20SDOF/Impulse%20Response%20of%20SDOF_17_Prerequisites_p1.org Attachment: ![sd42](https://cloud.githubusercontent.com/assets/14869397/14703959/26bb162a-07d0-11e6-93bd-ea1f8b53d776.png)
usab
qa impulse response of sdof prerequisites defect description in the impulse response of sdof experiment the minimum requirement to run the experiment is not displayed in the page instead a page or scrolling should appear providing information on minimum requirement to run this experiment information like bandwidth device resolution hardware configuration and software required actual result in the impulse response of sdof experiment the minimum requirement to run the experiment is not displayed in the page environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor test step link attachment
1
445,317
12,828,935,799
IssuesEvent
2020-07-06 21:36:28
alerj/docigp
https://api.github.com/repos/alerj/docigp
closed
Alterar a cor das badges dos transportes
priority 1
- [x] Se o valor for transporte positivo, colocar `badge-success` nos transportes do mês atual e do mês seguinte. Se for negativo, `badge-danger`. ![image](https://user-images.githubusercontent.com/15174854/86158554-5123de80-badf-11ea-9579-b4e04cd68f97.png)
1.0
Alterar a cor das badges dos transportes - - [x] Se o valor for transporte positivo, colocar `badge-success` nos transportes do mês atual e do mês seguinte. Se for negativo, `badge-danger`. ![image](https://user-images.githubusercontent.com/15174854/86158554-5123de80-badf-11ea-9579-b4e04cd68f97.png)
non_usab
alterar a cor das badges dos transportes se o valor for transporte positivo colocar badge success nos transportes do mês atual e do mês seguinte se for negativo badge danger
0
383
2,587,529,181
IssuesEvent
2015-02-17 19:03:06
mavlink/qgroundcontrol
https://api.github.com/repos/mavlink/qgroundcontrol
opened
Rename "Connect" button on toolbar to "Open"
component-theming/usability difficulty-easy
The opposite would now be "Closed" instead of "Disconnect". These are both shorter words in English and also make more sense since the ManageLinks option is in the toolbar.
True
Rename "Connect" button on toolbar to "Open" - The opposite would now be "Closed" instead of "Disconnect". These are both shorter words in English and also make more sense since the ManageLinks option is in the toolbar.
usab
rename connect button on toolbar to open the opposite would now be closed instead of disconnect these are both shorter words in english and also make more sense since the managelinks option is in the toolbar
1
101,727
16,525,372,026
IssuesEvent
2021-05-26 19:21:26
OSWeekends/EventPoints
https://api.github.com/repos/OSWeekends/EventPoints
opened
CVE-2021-23368 (Medium) detected in multiple libraries
security vulnerability
## CVE-2021-23368 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>postcss-7.0.5.tgz</b>, <b>postcss-7.0.21.tgz</b>, <b>postcss-7.0.35.tgz</b></p></summary> <p> <details><summary><b>postcss-7.0.5.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.5.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.5.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-4.0.0.tgz (Root Library) - postcss-loader-3.0.0.tgz - :x: **postcss-7.0.5.tgz** (Vulnerable Library) </details> <details><summary><b>postcss-7.0.21.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.21.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.21.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-4.0.0.tgz (Root Library) - resolve-url-loader-3.1.3.tgz - :x: **postcss-7.0.21.tgz** (Vulnerable Library) </details> <details><summary><b>postcss-7.0.35.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-4.0.0.tgz (Root Library) - postcss-normalize-8.0.1.tgz - postcss-browser-comments-3.0.0.tgz - :x: **postcss-7.0.35.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/OSWeekends/EventPoints/commit/abf2c9dcf38a40d49f6f8c5344a09f668e48fff4">abf2c9dcf38a40d49f6f8c5344a09f668e48fff4</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package postcss from 7.0.0 and before 8.2.10 are vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing. <p>Publish Date: 2021-04-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23368>CVE-2021-23368</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23368</a></p> <p>Release Date: 2021-04-12</p> <p>Fix Resolution: postcss -8.2.10</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23368 (Medium) detected in multiple libraries - ## CVE-2021-23368 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>postcss-7.0.5.tgz</b>, <b>postcss-7.0.21.tgz</b>, <b>postcss-7.0.35.tgz</b></p></summary> <p> <details><summary><b>postcss-7.0.5.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.5.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.5.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-4.0.0.tgz (Root Library) - postcss-loader-3.0.0.tgz - :x: **postcss-7.0.5.tgz** (Vulnerable Library) </details> <details><summary><b>postcss-7.0.21.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.21.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.21.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-4.0.0.tgz (Root Library) - resolve-url-loader-3.1.3.tgz - :x: **postcss-7.0.21.tgz** (Vulnerable Library) </details> <details><summary><b>postcss-7.0.35.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz</a></p> <p> Dependency Hierarchy: - react-scripts-4.0.0.tgz (Root Library) - postcss-normalize-8.0.1.tgz - postcss-browser-comments-3.0.0.tgz - :x: **postcss-7.0.35.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/OSWeekends/EventPoints/commit/abf2c9dcf38a40d49f6f8c5344a09f668e48fff4">abf2c9dcf38a40d49f6f8c5344a09f668e48fff4</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package postcss from 7.0.0 and before 8.2.10 are vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing. <p>Publish Date: 2021-04-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23368>CVE-2021-23368</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23368</a></p> <p>Release Date: 2021-04-12</p> <p>Fix Resolution: postcss -8.2.10</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries postcss tgz postcss tgz postcss tgz postcss tgz tool for transforming styles with js plugins library home page a href dependency hierarchy react scripts tgz root library postcss loader tgz x postcss tgz vulnerable library postcss tgz tool for transforming styles with js plugins library home page a href dependency hierarchy react scripts tgz root library resolve url loader tgz x postcss tgz vulnerable library postcss tgz tool for transforming styles with js plugins library home page a href dependency hierarchy react scripts tgz root library postcss normalize tgz postcss browser comments tgz x postcss tgz vulnerable library found in head commit a href vulnerability details the package postcss from and before are vulnerable to regular expression denial of service redos during source map parsing publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution postcss step up your open source security game with whitesource
0
323,476
27,728,799,544
IssuesEvent
2023-03-15 05:57:46
Azure/azure-sdk-for-js
https://api.github.com/repos/Azure/azure-sdk-for-js
closed
[Event Hubs] Subscribed to multiple partitions failed on China cloud.
Client Event Hubs test-sovereign-cloud
We are running live Tests against other clouds like US Gov and Azure China Cloud. The goal is to check whether new azure sdk package work with other clouds or not. **Error Description:** Live test `when subscribed to multiple partitions` failed in all environments on `China` cloud in [weekly pipeline](https://dev.azure.com/azure-sdk/internal/_build/results?buildId=1609120&view=logs&j=90d65a40-c17a-520d-9c6f-63e72be21f54&t=46b4abb8-2fd4-54f0-4720-3b6e44bf3729). ![image](https://user-images.githubusercontent.com/81678720/171138236-8c424066-d21f-4233-9c29-36e50ea28e35.png) After investigation, error message: `Waited way too long for Wait for subscription2 to read from all partitions and subscription1 to invoke close handlers` is thrown from method `loopUntil`, but we cannot reproduce this problem locally. **Expected behavior:** Test `when subscribed to multiple partitions` can pass on `China` cloud like it on `Public` and `UsGov` clouds. @benbp , @xirzec , @lilyjma , @jsquire , @deyaaeldeen for notification.
1.0
[Event Hubs] Subscribed to multiple partitions failed on China cloud. - We are running live Tests against other clouds like US Gov and Azure China Cloud. The goal is to check whether new azure sdk package work with other clouds or not. **Error Description:** Live test `when subscribed to multiple partitions` failed in all environments on `China` cloud in [weekly pipeline](https://dev.azure.com/azure-sdk/internal/_build/results?buildId=1609120&view=logs&j=90d65a40-c17a-520d-9c6f-63e72be21f54&t=46b4abb8-2fd4-54f0-4720-3b6e44bf3729). ![image](https://user-images.githubusercontent.com/81678720/171138236-8c424066-d21f-4233-9c29-36e50ea28e35.png) After investigation, error message: `Waited way too long for Wait for subscription2 to read from all partitions and subscription1 to invoke close handlers` is thrown from method `loopUntil`, but we cannot reproduce this problem locally. **Expected behavior:** Test `when subscribed to multiple partitions` can pass on `China` cloud like it on `Public` and `UsGov` clouds. @benbp , @xirzec , @lilyjma , @jsquire , @deyaaeldeen for notification.
non_usab
subscribed to multiple partitions failed on china cloud we are running live tests against other clouds like us gov and azure china cloud the goal is to check whether new azure sdk package work with other clouds or not error description live test when subscribed to multiple partitions failed in all environments on china cloud in after investigation error message waited way too long for wait for to read from all partitions and to invoke close handlers is thrown from method loopuntil but we cannot reproduce this problem locally expected behavior test when subscribed to multiple partitions can pass on china cloud like it on public and usgov clouds benbp xirzec lilyjma jsquire deyaaeldeen for notification
0
73,658
15,278,812,135
IssuesEvent
2021-02-23 02:24:01
MohamedElashri/blog-theme
https://api.github.com/repos/MohamedElashri/blog-theme
closed
CVE-2017-1000048 (High) detected in qs-6.2.3.tgz - autoclosed
security vulnerability
## CVE-2017-1000048 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>qs-6.2.3.tgz</b></p></summary> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.2.3.tgz">https://registry.npmjs.org/qs/-/qs-6.2.3.tgz</a></p> <p>Path to dependency file: blog-theme/package.json</p> <p>Path to vulnerable library: blog-theme/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - browser-sync-2.26.13.tgz (Root Library) - :x: **qs-6.2.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/MohamedElashri/blog-theme/commit/c7939ca9cfb9a703f690395b2e84f88cab3b01f4">c7939ca9cfb9a703f690395b2e84f88cab3b01f4</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> the web framework using ljharb's qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash. <p>Publish Date: 2017-07-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048>CVE-2017-1000048</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000048">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000048</a></p> <p>Release Date: 2017-07-17</p> <p>Fix Resolution: 6.0.4,6.1.2,6.2.3,6.3.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-1000048 (High) detected in qs-6.2.3.tgz - autoclosed - ## CVE-2017-1000048 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>qs-6.2.3.tgz</b></p></summary> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.2.3.tgz">https://registry.npmjs.org/qs/-/qs-6.2.3.tgz</a></p> <p>Path to dependency file: blog-theme/package.json</p> <p>Path to vulnerable library: blog-theme/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - browser-sync-2.26.13.tgz (Root Library) - :x: **qs-6.2.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/MohamedElashri/blog-theme/commit/c7939ca9cfb9a703f690395b2e84f88cab3b01f4">c7939ca9cfb9a703f690395b2e84f88cab3b01f4</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> the web framework using ljharb's qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash. <p>Publish Date: 2017-07-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048>CVE-2017-1000048</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000048">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000048</a></p> <p>Release Date: 2017-07-17</p> <p>Fix Resolution: 6.0.4,6.1.2,6.2.3,6.3.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve high detected in qs tgz autoclosed cve high severity vulnerability vulnerable library qs tgz a querystring parser that supports nesting and arrays with a depth limit library home page a href path to dependency file blog theme package json path to vulnerable library blog theme node modules qs package json dependency hierarchy browser sync tgz root library x qs tgz vulnerable library found in head commit a href found in base branch main vulnerability details the web framework using ljharb s qs module older than and is vulnerable to a dos a malicious user can send a evil request to cause the web framework crash publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
15,552
10,130,511,528
IssuesEvent
2019-08-01 17:08:19
openstreetmap/iD
https://api.github.com/repos/openstreetmap/iD
closed
Don't default to generic preset favorites for new users
usability
When launching iD 3 for the first time, the generic Point, Line, and Area presets are the defaults favorites. The intention is to help longtime iD users with the transition by starting them off with the legacy workflow option. They can remove or customize these at any time. <img width="250" alt="Screen Shot 2019-08-01 at 12 33 39 PM" src="https://user-images.githubusercontent.com/2046746/62311051-e4c8d700-b458-11e9-9cf6-185bf8dc7dea.png"> However, new users shouldn't have to worry about the old workflow. For brand new sessions we should present just the single Add Feature button. Users who want the generic favorites can add them manually. <img width="188" alt="Screen Shot 2019-08-01 at 12 33 54 PM" src="https://user-images.githubusercontent.com/2046746/62311445-d9c27680-b459-11e9-8d79-7bc5c5c68a4e.png"> Re: #6684, #6665
True
Don't default to generic preset favorites for new users - When launching iD 3 for the first time, the generic Point, Line, and Area presets are the defaults favorites. The intention is to help longtime iD users with the transition by starting them off with the legacy workflow option. They can remove or customize these at any time. <img width="250" alt="Screen Shot 2019-08-01 at 12 33 39 PM" src="https://user-images.githubusercontent.com/2046746/62311051-e4c8d700-b458-11e9-9cf6-185bf8dc7dea.png"> However, new users shouldn't have to worry about the old workflow. For brand new sessions we should present just the single Add Feature button. Users who want the generic favorites can add them manually. <img width="188" alt="Screen Shot 2019-08-01 at 12 33 54 PM" src="https://user-images.githubusercontent.com/2046746/62311445-d9c27680-b459-11e9-8d79-7bc5c5c68a4e.png"> Re: #6684, #6665
usab
don t default to generic preset favorites for new users when launching id for the first time the generic point line and area presets are the defaults favorites the intention is to help longtime id users with the transition by starting them off with the legacy workflow option they can remove or customize these at any time img width alt screen shot at pm src however new users shouldn t have to worry about the old workflow for brand new sessions we should present just the single add feature button users who want the generic favorites can add them manually img width alt screen shot at pm src re
1
394,178
11,633,022,990
IssuesEvent
2020-02-28 07:07:58
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.netflix.com - see bug description
browser-firefox engine-gecko priority-critical
<!-- @browser: Firefox 75.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0 --> <!-- @reported_with: desktop-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/49174 --> **URL**: https://www.netflix.com/br-en/ **Browser / Version**: Firefox 75.0 **Operating System**: Windows 10 **Tested Another Browser**: Yes **Problem type**: Something else **Description**: Netflix Site Error **Steps to Reproduce**: Netflix Site Error We were unable to process your request. Please go to the Netflix home page by clicking the button below. Netflix Home <details><summary>View the screenshot</summary><img alt='Screenshot' src='https://webcompat.com/uploads/2020/2/c5209710-0a5a-40c0-a28f-628dc3b4073d.jpeg'></details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20200227094956</li><li>channel: nightly</li><li>hasTouchScreen: false</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2020/2/51b0008b-58ee-43d1-b95d-86e3367d693b) _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
www.netflix.com - see bug description - <!-- @browser: Firefox 75.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0 --> <!-- @reported_with: desktop-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/49174 --> **URL**: https://www.netflix.com/br-en/ **Browser / Version**: Firefox 75.0 **Operating System**: Windows 10 **Tested Another Browser**: Yes **Problem type**: Something else **Description**: Netflix Site Error **Steps to Reproduce**: Netflix Site Error We were unable to process your request. Please go to the Netflix home page by clicking the button below. Netflix Home <details><summary>View the screenshot</summary><img alt='Screenshot' src='https://webcompat.com/uploads/2020/2/c5209710-0a5a-40c0-a28f-628dc3b4073d.jpeg'></details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20200227094956</li><li>channel: nightly</li><li>hasTouchScreen: false</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2020/2/51b0008b-58ee-43d1-b95d-86e3367d693b) _From [webcompat.com](https://webcompat.com/) with ❤️_
non_usab
see bug description url browser version firefox operating system windows tested another browser yes problem type something else description netflix site error steps to reproduce netflix site error we were unable to process your request please go to the netflix home page by clicking the button below netflix home view the screenshot img alt screenshot src browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel nightly hastouchscreen false mixed active content blocked false mixed passive content blocked false tracking content blocked false from with ❤️
0
16,593
11,101,281,974
IssuesEvent
2019-12-16 21:05:29
spanezz/staticsite
https://api.github.com/repos/spanezz/staticsite
closed
Taxonomies and series
usability
(from a conversation with @DonKult) > > In the example you have a dropdown menu which is nice, but I would like > > to link to a page showing all entries of the series, which is the page > > of the associated tag, but reaching that seems hard: > > url_for(taxonomy('tags').categories[page.meta.series]) > > I was kinda hoping for `url_for(page.meta.series_tag)` especially if > > – not that I have tried – you have multiple taxonomies with series's… > If the series is autogenerated from a tag, indeed a way to generate a > link to the tag page would be enough. If the series is not > autogenerated from a tag, we currently wouldn't have a recap page for > the series. > > For the first case, the series feature could easily add a metadata to > the page pointing to the series tag. > > For the second case, I'm thinking of mandating that series have to be > tags. One can always create a 'series' taxonomy, if one doesn't want to > add some series to the normal set of tags. This would also automatically > provide each series with an RSS feed, and maybe simplify some of the > series code, by just using tags code to track which pages belong to a > series. TL;DR: merge series and taxonomies, mandating the fact that a series is an entry in a taxonomy. The `series` header can be used to both add a tag and state that it is used as a series. Document that if one doesn't want to mix series in one's own tag, one can create a new taxonomy for series. That would also give an index pages to all the series in a website.
True
Taxonomies and series - (from a conversation with @DonKult) > > In the example you have a dropdown menu which is nice, but I would like > > to link to a page showing all entries of the series, which is the page > > of the associated tag, but reaching that seems hard: > > url_for(taxonomy('tags').categories[page.meta.series]) > > I was kinda hoping for `url_for(page.meta.series_tag)` especially if > > – not that I have tried – you have multiple taxonomies with series's… > If the series is autogenerated from a tag, indeed a way to generate a > link to the tag page would be enough. If the series is not > autogenerated from a tag, we currently wouldn't have a recap page for > the series. > > For the first case, the series feature could easily add a metadata to > the page pointing to the series tag. > > For the second case, I'm thinking of mandating that series have to be > tags. One can always create a 'series' taxonomy, if one doesn't want to > add some series to the normal set of tags. This would also automatically > provide each series with an RSS feed, and maybe simplify some of the > series code, by just using tags code to track which pages belong to a > series. TL;DR: merge series and taxonomies, mandating the fact that a series is an entry in a taxonomy. The `series` header can be used to both add a tag and state that it is used as a series. Document that if one doesn't want to mix series in one's own tag, one can create a new taxonomy for series. That would also give an index pages to all the series in a website.
usab
taxonomies and series from a conversation with donkult in the example you have a dropdown menu which is nice but i would like to link to a page showing all entries of the series which is the page of the associated tag but reaching that seems hard url for taxonomy tags categories i was kinda hoping for url for page meta series tag especially if – not that i have tried – you have multiple taxonomies with series s… if the series is autogenerated from a tag indeed a way to generate a link to the tag page would be enough if the series is not autogenerated from a tag we currently wouldn t have a recap page for the series for the first case the series feature could easily add a metadata to the page pointing to the series tag for the second case i m thinking of mandating that series have to be tags one can always create a series taxonomy if one doesn t want to add some series to the normal set of tags this would also automatically provide each series with an rss feed and maybe simplify some of the series code by just using tags code to track which pages belong to a series tl dr merge series and taxonomies mandating the fact that a series is an entry in a taxonomy the series header can be used to both add a tag and state that it is used as a series document that if one doesn t want to mix series in one s own tag one can create a new taxonomy for series that would also give an index pages to all the series in a website
1
9,335
6,225,550,202
IssuesEvent
2017-07-10 16:25:40
loconomics/loconomics
https://api.github.com/repos/loconomics/loconomics
opened
Ensure that all interactive elements are keyboard accessible
C: Usability F: Accessbility
Think about keyboard access, especially when developing interactive elements, such as menus, mouseover information, collapsable accordions, or media players. Use tabindex="0" to add an element that does not normally receive focus, such as <div> or <span>, into the navigation order when it is being used for interaction. Use scripting to capture and respond to keyboard events. ![keyboard-menu](https://user-images.githubusercontent.com/1202838/28028517-9ba2a6da-6551-11e7-837a-796688aa80f9.png) For more information WCAG [Keyboard 2.1.1](https://www.w3.org/WAI/WCAG20/quickref/#keyboard-operation-keyboard-operable) [(Understanding 2.1.1)](https://www.w3.org/TR/UNDERSTANDING-WCAG20/keyboard-operation-keyboard-operable.html) User Story [Describes how a user with RSI needs keyboard support](https://www.w3.org/WAI/intro/people-use-web/stories#reporter)
True
Ensure that all interactive elements are keyboard accessible - Think about keyboard access, especially when developing interactive elements, such as menus, mouseover information, collapsable accordions, or media players. Use tabindex="0" to add an element that does not normally receive focus, such as <div> or <span>, into the navigation order when it is being used for interaction. Use scripting to capture and respond to keyboard events. ![keyboard-menu](https://user-images.githubusercontent.com/1202838/28028517-9ba2a6da-6551-11e7-837a-796688aa80f9.png) For more information WCAG [Keyboard 2.1.1](https://www.w3.org/WAI/WCAG20/quickref/#keyboard-operation-keyboard-operable) [(Understanding 2.1.1)](https://www.w3.org/TR/UNDERSTANDING-WCAG20/keyboard-operation-keyboard-operable.html) User Story [Describes how a user with RSI needs keyboard support](https://www.w3.org/WAI/intro/people-use-web/stories#reporter)
usab
ensure that all interactive elements are keyboard accessible think about keyboard access especially when developing interactive elements such as menus mouseover information collapsable accordions or media players use tabindex to add an element that does not normally receive focus such as or into the navigation order when it is being used for interaction use scripting to capture and respond to keyboard events for more information wcag user story
1