Unnamed: 0
int64
3
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
7
112
repo_url
stringlengths
36
141
action
stringclasses
3 values
title
stringlengths
2
742
labels
stringlengths
4
431
body
stringlengths
5
239k
index
stringclasses
10 values
text_combine
stringlengths
96
240k
label
stringclasses
2 values
text
stringlengths
96
200k
binary_label
int64
0
1
19,064
13,536,130,742
IssuesEvent
2020-09-16 08:36:26
topcoder-platform/qa-fun
https://api.github.com/repos/topcoder-platform/qa-fun
closed
font difference in profile settings
UX/Usability
**Steps to Reproduce:** 1. Log in to https://www.topcoder.com/ 2. Select logged in user settings 3. Font highlighted in red in the attachment is different **Expected Result:** Font should be unique **Actual Result:** Font style not applied [font difference in profile settings.docx](https://github.com/topcoder-platform/qa-fun/files/4579363/font.difference.in.profile.settings.docx) **Device/OS/Browser Information:** Windows 10/ Chrome
True
font difference in profile settings - **Steps to Reproduce:** 1. Log in to https://www.topcoder.com/ 2. Select logged in user settings 3. Font highlighted in red in the attachment is different **Expected Result:** Font should be unique **Actual Result:** Font style not applied [font difference in profile settings.docx](https://github.com/topcoder-platform/qa-fun/files/4579363/font.difference.in.profile.settings.docx) **Device/OS/Browser Information:** Windows 10/ Chrome
usab
font difference in profile settings steps to reproduce log in to select logged in user settings font highlighted in red in the attachment is different expected result font should be unique actual result font style not applied device os browser information windows chrome
1
22,786
20,149,333,134
IssuesEvent
2022-02-09 10:47:00
lgarron/first-world
https://api.github.com/repos/lgarron/first-world
closed
iMusic app doesn't support searching the iTunes store (when you have Apple Music?)
Reason: Usability Level: Medium Software: iTunes / Apple Music Workaround: Functionality Compromise
The iTunes store has a slightly different catalog than Apple Music. Nowadays, you can only search Apple Music. There are a few reasons to search the iTunes Store directly — particularly, making sure you can get a non-DRM track. Related to: - #82 - #83
True
iMusic app doesn't support searching the iTunes store (when you have Apple Music?) - The iTunes store has a slightly different catalog than Apple Music. Nowadays, you can only search Apple Music. There are a few reasons to search the iTunes Store directly — particularly, making sure you can get a non-DRM track. Related to: - #82 - #83
usab
imusic app doesn t support searching the itunes store when you have apple music the itunes store has a slightly different catalog than apple music nowadays you can only search apple music there are a few reasons to search the itunes store directly — particularly making sure you can get a non drm track related to
1
76,289
7,524,060,128
IssuesEvent
2018-04-13 05:00:46
openshift/origin
https://api.github.com/repos/openshift/origin
closed
Error removing intermediate container e12d4a603a4e: Driver devicemapper failed to remove root filesystem
component/containers kind/test-flake lifecycle/rotten priority/P2
``` 21:06:10 2017-03-07T01:22:46.312469000Z Step 11 : RUN chmod og+rw /opt/app-root/src/db 21:06:10 2017-03-07T01:22:47.474152000Z ---> Running in e12d4a603a4e 21:06:10 2017-03-07T01:22:53.259513000Z ---> db3d88c69ee0 21:06:10 2017-03-07T01:22:53.281720000Z Error removing intermediate container e12d4a603a4e: Driver devicemapper failed to remove root filesystem e12d4a603a4e6f12b63addb0c4865978a408209056bf33237c5ff0ab03a5c520: failed to remove device 9f589f96cba60f5f888aa808e38553f3a541a9b9aaf96bd5a6f242212ac2fc65:Device is Busy 21:06:10 2017-03-07T01:22:53.282728000Z Step 12 : USER default 21:06:10 2017-03-07T01:22:54.921731000Z ---> Running in 2c69a204466c 21:06:10 2017-03-07T01:22:59.076777000Z ---> 6f72cff797ea 21:06:10 2017-03-07T01:22:59.077148000Z Error removing intermediate container e12d4a603a4e: No such container: e12d4a603a4e6f12b63addb0c4865978a408209056bf33237c5ff0ab03a5c520 21:06:10 2017-03-07T01:22:59.077502000Z Step 13 : ENV "OPENSHIFT_BUILD_NAME" "test-docker-1" "OPENSHIFT_BUILD_NAMESPACE" "extended-test-build-no-outputname-bb9n2-3dpb6" ``` https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_origin_future/885 @jwhonce this is the other way we've been seeing the device mapper error. It doesn't cause the actual docker build to fail, but it occurs during the docker build.
1.0
Error removing intermediate container e12d4a603a4e: Driver devicemapper failed to remove root filesystem - ``` 21:06:10 2017-03-07T01:22:46.312469000Z Step 11 : RUN chmod og+rw /opt/app-root/src/db 21:06:10 2017-03-07T01:22:47.474152000Z ---> Running in e12d4a603a4e 21:06:10 2017-03-07T01:22:53.259513000Z ---> db3d88c69ee0 21:06:10 2017-03-07T01:22:53.281720000Z Error removing intermediate container e12d4a603a4e: Driver devicemapper failed to remove root filesystem e12d4a603a4e6f12b63addb0c4865978a408209056bf33237c5ff0ab03a5c520: failed to remove device 9f589f96cba60f5f888aa808e38553f3a541a9b9aaf96bd5a6f242212ac2fc65:Device is Busy 21:06:10 2017-03-07T01:22:53.282728000Z Step 12 : USER default 21:06:10 2017-03-07T01:22:54.921731000Z ---> Running in 2c69a204466c 21:06:10 2017-03-07T01:22:59.076777000Z ---> 6f72cff797ea 21:06:10 2017-03-07T01:22:59.077148000Z Error removing intermediate container e12d4a603a4e: No such container: e12d4a603a4e6f12b63addb0c4865978a408209056bf33237c5ff0ab03a5c520 21:06:10 2017-03-07T01:22:59.077502000Z Step 13 : ENV "OPENSHIFT_BUILD_NAME" "test-docker-1" "OPENSHIFT_BUILD_NAMESPACE" "extended-test-build-no-outputname-bb9n2-3dpb6" ``` https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_origin_future/885 @jwhonce this is the other way we've been seeing the device mapper error. It doesn't cause the actual docker build to fail, but it occurs during the docker build.
non_usab
error removing intermediate container driver devicemapper failed to remove root filesystem step run chmod og rw opt app root src db running in error removing intermediate container driver devicemapper failed to remove root filesystem failed to remove device device is busy step user default running in error removing intermediate container no such container step env openshift build name test docker openshift build namespace extended test build no outputname jwhonce this is the other way we ve been seeing the device mapper error it doesn t cause the actual docker build to fail but it occurs during the docker build
0
1,333
2,796,097,507
IssuesEvent
2015-05-12 03:49:25
Elgg/Elgg
https://api.github.com/repos/Elgg/Elgg
closed
Fully document the current Ajax API
dev usability docs
E.g. In ajax views I vaguely remember input is mapped into $vars, "guid" is auto-injected as the loaded "entity", and action responses have kind of special JSON auto-wrapping stuff with system_message(). AFAIK very little of this magical stuff is clearly documented. At minimum it should be straightforward for a dev to create ajax views/actions that return JSON, and know what that JSON is going to look like.
True
Fully document the current Ajax API - E.g. In ajax views I vaguely remember input is mapped into $vars, "guid" is auto-injected as the loaded "entity", and action responses have kind of special JSON auto-wrapping stuff with system_message(). AFAIK very little of this magical stuff is clearly documented. At minimum it should be straightforward for a dev to create ajax views/actions that return JSON, and know what that JSON is going to look like.
usab
fully document the current ajax api e g in ajax views i vaguely remember input is mapped into vars guid is auto injected as the loaded entity and action responses have kind of special json auto wrapping stuff with system message afaik very little of this magical stuff is clearly documented at minimum it should be straightforward for a dev to create ajax views actions that return json and know what that json is going to look like
1
68,278
9,166,083,390
IssuesEvent
2019-03-02 00:31:00
Azure/Azure-Functions
https://api.github.com/repos/Azure/Azure-Functions
closed
Document C# class library examples for all bindings
P1 documentation
The bindings articles have only documentation on CSX, not C# class libraries. All bindings and triggers should be documented in the C# article (https://docs.microsoft.com/en-us/azure/azure-functions/functions-dotnet-class-library), but these samples should be moved to "includes" and also included the the documentation for each binding/trigger.
1.0
Document C# class library examples for all bindings - The bindings articles have only documentation on CSX, not C# class libraries. All bindings and triggers should be documented in the C# article (https://docs.microsoft.com/en-us/azure/azure-functions/functions-dotnet-class-library), but these samples should be moved to "includes" and also included the the documentation for each binding/trigger.
non_usab
document c class library examples for all bindings the bindings articles have only documentation on csx not c class libraries all bindings and triggers should be documented in the c article but these samples should be moved to includes and also included the the documentation for each binding trigger
0
126,263
10,416,301,805
IssuesEvent
2019-09-14 12:23:21
OpenLiberty/guides-common
https://api.github.com/repos/OpenLiberty/guides-common
closed
Guide for MicroProfile Fault Tolerance with Istio Fault Tolerance
ID required SME reviewed dev content reviewed end-to-end tests completed final content reviewed new guide oc1 peer reviewed signed off user reviewed
This is from @Emily-Jiang: I would like a guide to demonstrate the ecosystem of MicroProfile Fault Tolerance with Istio Fault Tolerance: Scenario 1: Use MP FT in dev with Retry Use Istio Retry and switched off MicroProfile FT using the MP FT config. Scenario 2: Use MP FT fallback Use Istio Fault Tolerance When the backend dies and retry was exhausted, FT fallback was triggered.
1.0
Guide for MicroProfile Fault Tolerance with Istio Fault Tolerance - This is from @Emily-Jiang: I would like a guide to demonstrate the ecosystem of MicroProfile Fault Tolerance with Istio Fault Tolerance: Scenario 1: Use MP FT in dev with Retry Use Istio Retry and switched off MicroProfile FT using the MP FT config. Scenario 2: Use MP FT fallback Use Istio Fault Tolerance When the backend dies and retry was exhausted, FT fallback was triggered.
non_usab
guide for microprofile fault tolerance with istio fault tolerance this is from emily jiang i would like a guide to demonstrate the ecosystem of microprofile fault tolerance with istio fault tolerance scenario use mp ft in dev with retry use istio retry and switched off microprofile ft using the mp ft config scenario use mp ft fallback use istio fault tolerance when the backend dies and retry was exhausted ft fallback was triggered
0
7,122
4,778,814,384
IssuesEvent
2016-10-27 20:29:13
rabbitmq/rabbitmq-java-client
https://api.github.com/repos/rabbitmq/rabbitmq-java-client
opened
Enable automatic connection recovery by default
effort-low enhancement usability
Automatic connection recovery has been around for over 2 years in this client and some 5 years total (starting with the amqp gem in Ruby, then Bunny). With a round of fixes up to and in `3.6.6` we know that it works quite well in practice and what kind of bugs and tricky aspects we've discovered over the years. It's time to enable it by default and `4.0.0` is the right moment to do it.
True
Enable automatic connection recovery by default - Automatic connection recovery has been around for over 2 years in this client and some 5 years total (starting with the amqp gem in Ruby, then Bunny). With a round of fixes up to and in `3.6.6` we know that it works quite well in practice and what kind of bugs and tricky aspects we've discovered over the years. It's time to enable it by default and `4.0.0` is the right moment to do it.
usab
enable automatic connection recovery by default automatic connection recovery has been around for over years in this client and some years total starting with the amqp gem in ruby then bunny with a round of fixes up to and in we know that it works quite well in practice and what kind of bugs and tricky aspects we ve discovered over the years it s time to enable it by default and is the right moment to do it
1
312,822
23,444,824,499
IssuesEvent
2022-08-15 18:29:31
celestiaorg/celestia-core
https://api.github.com/repos/celestiaorg/celestia-core
opened
Document release process
C:documentation
## Summary This repo could benefit from a guide on how to cut a new release ## Problem Definition Current release process is to ask @evan-forbes or @liamsi to cut a new release ## Proposal Steps documented in a Markdown file (e.g. `README.md`) that describe the release process, who has permission to cut a release, and any non standard release steps. Something like: 1. Create a release in Github UI 1. Upgrade to the new celestia-core version in cosmos-sdk and celestia-app
1.0
Document release process - ## Summary This repo could benefit from a guide on how to cut a new release ## Problem Definition Current release process is to ask @evan-forbes or @liamsi to cut a new release ## Proposal Steps documented in a Markdown file (e.g. `README.md`) that describe the release process, who has permission to cut a release, and any non standard release steps. Something like: 1. Create a release in Github UI 1. Upgrade to the new celestia-core version in cosmos-sdk and celestia-app
non_usab
document release process summary this repo could benefit from a guide on how to cut a new release problem definition current release process is to ask evan forbes or liamsi to cut a new release proposal steps documented in a markdown file e g readme md that describe the release process who has permission to cut a release and any non standard release steps something like create a release in github ui upgrade to the new celestia core version in cosmos sdk and celestia app
0
252,031
27,225,927,547
IssuesEvent
2023-02-21 09:42:32
uriel-naor/Test
https://api.github.com/repos/uriel-naor/Test
closed
tap-5.8.0.tgz: 25 vulnerabilities (highest severity is: 9.8) - autoclosed
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tap-5.8.0.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p></details> #### <img src='https://whitesource-resources.whitesourcesoftware.com/suggestedVersion.png' width=19 height=20> Mend has checked all newer package trees, and you are on the least vulnerable package! #### Please note: There might be a version that explicitly solves one or more of the vulnerabilities listed below, but we do not recommend it. For more info about the optional fixes, check the section “Details” below. ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (tap version) | Fix PR available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2019-19919](https://www.mend.io/vulnerability-database/CVE-2019-19919) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [CVE-2018-1000620](https://www.mend.io/vulnerability-database/CVE-2018-1000620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2018-3728](https://www.mend.io/vulnerability-database/CVE-2018-3728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [WS-2019-0333](https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0063](https://github.com/nodeca/js-yaml/pull/480) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.0 | js-yaml-3.6.1.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0064](https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.0 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [CVE-2019-20922](https://www.mend.io/vulnerability-database/CVE-2019-20922) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [CVE-2016-10540](https://www.mend.io/vulnerability-database/CVE-2016-10540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2016-2515](https://www.mend.io/vulnerability-database/CVE-2016-2515) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | hawk-1.1.1.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0492](https://github.com/handlebars-lang/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0493](https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [CVE-2017-18077](https://www.mend.io/vulnerability-database/CVE-2017-18077) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | brace-expansion-1.1.4.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0318](https://github.com/wycats/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2018-0590](https://bugzilla.redhat.com/show_bug.cgi?id=1552148) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | diff-1.4.0.tgz | Transitive | N/A* | &#10060; | | [CVE-2017-16026](https://www.mend.io/vulnerability-database/CVE-2017-16026) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | request-2.42.0.tgz | Transitive | N/A* | &#10060; | | [CVE-2020-7598](https://www.mend.io/vulnerability-database/CVE-2020-7598) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.6 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [WS-2017-0266](https://github.com/joyent/node-http-signature/commit/78ab1da232f31f695f5c362d863593a143aa8b56) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | http-signature-0.10.1.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0103](https://github.com/wycats/handlebars.js/issues/1267#issue-187151586) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2021-0154](https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | glob-parent-2.0.0.tgz | Transitive | N/A* | &#10060; | | [CVE-2020-7608](https://www.mend.io/vulnerability-database/CVE-2020-7608) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | yargs-parser-2.4.0.tgz | Transitive | N/A* | &#10060; | | [CVE-2017-16028](https://www.mend.io/vulnerability-database/CVE-2017-16028) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | randomatic-1.1.5.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0332](https://github.com/wycats/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0331](https://github.com/wycats/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0032](https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | js-yaml-3.6.1.tgz | Transitive | N/A* | &#10060; | | [WS-2018-0076](https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | tunnel-agent-0.4.3.tgz | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-19919</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's __proto__ and __defineGetter__ properties, which may allow an attacker to execute arbitrary code through crafted payloads. <p>Publish Date: 2019-12-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-19919>CVE-2019-19919</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1164">https://www.npmjs.com/advisories/1164</a></p> <p>Release Date: 2019-12-20</p> <p>Fix Resolution: 4.3.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-1000620</summary> ### Vulnerable Libraries - <b>cryptiles-0.2.2.tgz</b>, <b>cryptiles-2.0.5.tgz</b></p> <p> ### <b>cryptiles-0.2.2.tgz</b></p> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-0.2.2.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-0.2.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cryptiles/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - request-2.42.0.tgz - hawk-1.1.1.tgz - :x: **cryptiles-0.2.2.tgz** (Vulnerable Library) ### <b>cryptiles-2.0.5.tgz</b></p> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/coveralls/node_modules/cryptiles/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - coveralls-2.13.3.tgz - request-2.79.0.tgz - hawk-3.1.3.tgz - :x: **cryptiles-2.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2. <p>Publish Date: 2018-07-09 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-1000620>CVE-2018-1000620</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620</a></p> <p>Release Date: 2018-07-09</p> <p>Fix Resolution: v4.1.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-3728</summary> ### Vulnerable Libraries - <b>hoek-0.9.1.tgz</b>, <b>hoek-2.16.3.tgz</b></p> <p> ### <b>hoek-0.9.1.tgz</b></p> <p>General purpose node utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz">https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/hoek/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - request-2.42.0.tgz - hawk-1.1.1.tgz - :x: **hoek-0.9.1.tgz** (Vulnerable Library) ### <b>hoek-2.16.3.tgz</b></p> <p>General purpose node utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/coveralls/node_modules/hoek/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - coveralls-2.13.3.tgz - request-2.79.0.tgz - hawk-3.1.3.tgz - :x: **hoek-2.16.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects. <p>Publish Date: 2018-03-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-3728>CVE-2018-3728</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-3728">https://nvd.nist.gov/vuln/detail/CVE-2018-3728</a></p> <p>Release Date: 2018-03-30</p> <p>Fix Resolution: 4.2.1,5.0.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0333</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In handlebars, versions prior to v4.5.3 are vulnerable to prototype pollution. Using a malicious template it's possbile to add or modify properties to the Object prototype. This can also lead to DOS and RCE in certain conditions. <p>Publish Date: 2019-11-18 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08>WS-2019-0333</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1325">https://www.npmjs.com/advisories/1325</a></p> <p>Release Date: 2019-11-18</p> <p>Fix Resolution: handlebars - 4.5.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0063</summary> ### Vulnerable Library - <b>js-yaml-3.6.1.tgz</b></p> <p>YAML 1.2 parser and serializer</p> <p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **js-yaml-3.6.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file. <p>Publish Date: 2019-04-05 <p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>8.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p> <p>Release Date: 2019-04-05</p> <p>Fix Resolution: js-yaml - 3.13.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0064</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. <p>Publish Date: 2019-01-30 <p>URL: <a href=https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2>WS-2019-0064</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>8.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/755/versions">https://www.npmjs.com/advisories/755/versions</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 1.0.6-2,4.0.14,4.1.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20922</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources. <p>Publish Date: 2020-09-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20922>CVE-2019-20922</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1300">https://www.npmjs.com/advisories/1300</a></p> <p>Release Date: 2020-09-30</p> <p>Fix Resolution: handlebars - 4.4.5</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-10540</summary> ### Vulnerable Libraries - <b>minimatch-2.0.10.tgz</b>, <b>minimatch-3.0.0.tgz</b></p> <p> ### <b>minimatch-2.0.10.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz">https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/fileset/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - fileset-0.2.1.tgz - :x: **minimatch-2.0.10.tgz** (Vulnerable Library) ### <b>minimatch-3.0.0.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.0.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/glob/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - glob-7.0.3.tgz - :x: **minimatch-3.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript `RegExp` objects. The primary function, `minimatch(path, pattern)` in Minimatch 3.0.1 and earlier is vulnerable to ReDoS in the `pattern` parameter. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10540>CVE-2016-10540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/118">https://nodesecurity.io/advisories/118</a></p> <p>Release Date: 2016-06-20</p> <p>Fix Resolution: Update to version 3.0.2 or later.</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-2515</summary> ### Vulnerable Library - <b>hawk-1.1.1.tgz</b></p> <p>HTTP Hawk Authentication Scheme</p> <p>Library home page: <a href="https://registry.npmjs.org/hawk/-/hawk-1.1.1.tgz">https://registry.npmjs.org/hawk/-/hawk-1.1.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/hawk/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - request-2.42.0.tgz - :x: **hawk-1.1.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Hawk before 3.1.3 and 4.x before 4.1.1 allow remote attackers to cause a denial of service (CPU consumption or partial outage) via a long (1) header or (2) URI that is matched against an improper regular expression. <p>Publish Date: 2016-04-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-2515>CVE-2016-2515</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2515">https://nvd.nist.gov/vuln/detail/CVE-2016-2515</a></p> <p>Release Date: 2016-04-13</p> <p>Fix Resolution: 3.1.3,4.1.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0492</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. <p>Publish Date: 2019-11-19 <p>URL: <a href=https://github.com/handlebars-lang/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7>WS-2019-0492</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p> <p>Release Date: 2019-11-19</p> <p>Fix Resolution: handlebars - 3.0.8,4.5.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0493</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> handlebars before 3.0.8 and 4.x before 4.5.2 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. <p>Publish Date: 2019-11-14 <p>URL: <a href=https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e>WS-2019-0493</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1316">https://www.npmjs.com/advisories/1316</a></p> <p>Release Date: 2019-11-14</p> <p>Fix Resolution: handlebars - 3.0.8,4.5.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-18077</summary> ### Vulnerable Library - <b>brace-expansion-1.1.4.tgz</b></p> <p>Brace expansion as known from sh/bash</p> <p>Library home page: <a href="https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.4.tgz">https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/fileset/node_modules/minimatch/node_modules/brace-expansion/package.json,/node_modules/nyc/node_modules/glob/node_modules/minimatch/node_modules/brace-expansion/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - fileset-0.2.1.tgz - minimatch-2.0.10.tgz - :x: **brace-expansion-1.1.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> index.js in brace-expansion before 1.1.7 is vulnerable to Regular Expression Denial of Service (ReDoS) attacks, as demonstrated by an expand argument containing many comma characters. <p>Publish Date: 2018-01-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-18077>CVE-2017-18077</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18077">https://nvd.nist.gov/vuln/detail/CVE-2017-18077</a></p> <p>Release Date: 2018-01-27</p> <p>Fix Resolution: 1.1.7</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0318</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In "showdownjs/showdown", versions prior to v4.4.5 are vulnerable against Regular expression Denial of Service (ReDOS) once receiving specially-crafted templates. <p>Publish Date: 2019-10-20 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b>WS-2019-0318</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1300">https://www.npmjs.com/advisories/1300</a></p> <p>Release Date: 2019-10-20</p> <p>Fix Resolution: handlebars - 4.4.5</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2018-0590</summary> ### Vulnerable Library - <b>diff-1.4.0.tgz</b></p> <p>A javascript text diff implementation.</p> <p>Library home page: <a href="https://registry.npmjs.org/diff/-/diff-1.4.0.tgz">https://registry.npmjs.org/diff/-/diff-1.4.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/diff/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - tap-mocha-reporter-0.0.27.tgz - :x: **diff-1.4.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. <p>Publish Date: 2018-03-05 <p>URL: <a href=https://bugzilla.redhat.com/show_bug.cgi?id=1552148>WS-2018-0590</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>7.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2018-03-05</p> <p>Fix Resolution: 3.5.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16026</summary> ### Vulnerable Library - <b>request-2.42.0.tgz</b></p> <p>Simplified HTTP request client.</p> <p>Library home page: <a href="https://registry.npmjs.org/request/-/request-2.42.0.tgz">https://registry.npmjs.org/request/-/request-2.42.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/request/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - :x: **request-2.42.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Request is an http client. If a request is made using ```multipart```, and the body type is a ```number```, then the specified number of non-zero memory is passed in the body. This affects Request >=2.2.6 <2.47.0 || >2.51.0 <=2.67.0. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16026>CVE-2017-16026</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-16026">https://nvd.nist.gov/vuln/detail/CVE-2017-16026</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution: 2.47.1,2.67.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7598</summary> ### Vulnerable Libraries - <b>minimist-1.2.0.tgz</b>, <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b></p> <p> ### <b>minimist-1.2.0.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/coveralls/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - coveralls-2.13.3.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) ### <b>minimist-0.0.8.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/mkdirp/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) ### <b>minimist-0.0.10.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/node_modules/optimist/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - handlebars-4.0.5.tgz - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7598>CVE-2020-7598</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.6</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7598">https://nvd.nist.gov/vuln/detail/CVE-2020-7598</a></p> <p>Release Date: 2020-03-12</p> <p>Fix Resolution: Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;org.webjars:npm - 5.0.0-1;Indianadavy.VueJsWebAPITemplate.CSharp - 1.0.1;NorDroN.AngularTemplate - 0.1.6;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 2.0.0;ApiExplorer.HelpPage - 1.0.0-alpha3;CoreVueWebTest - 3.0.101;dotnetng.template - 1.0.0.4;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;Fable.Template.Elmish.React - 0.1.6;BumperLane.Public.Api.Client - 0.23.35.214-prerelease;Yarn.MSBuild - 0.24.6,0.22.0;Bridge.AWS - 0.3.30.36;Nodejs.Redist.x64 - 7.7.3.1,10.3.0;tslint - 5.6.0,6.1.1;org.webjars.npm:bourbon-neat - 2.0.0-beta.2;GR.PageRender.Razor - 1.8.0;MIDIator.WebClient - 1.0.105;EntityFramework.LookupTables - 1.1.14.119;BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;org.webjars.npm:minimist - 1.2.4;minimist - 1.2.3,0.2.1;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Romano.Vue - 1.0.1;Yarnpkg.Yarn - 0.26.1;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;Chutzpah - 4.4.10;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;VueJS.NetCore - 1.1.1;Dianoga - 5.0.0-beta.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2017-0266</summary> ### Vulnerable Library - <b>http-signature-0.10.1.tgz</b></p> <p>Reference implementation of Joyent's HTTP Signature scheme.</p> <p>Library home page: <a href="https://registry.npmjs.org/http-signature/-/http-signature-0.10.1.tgz">https://registry.npmjs.org/http-signature/-/http-signature-0.10.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/http-signature/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - request-2.42.0.tgz - :x: **http-signature-0.10.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Affected versions (before 1.0.0) of the http-signature package are vulnerable to Timing Attacks. <p>Publish Date: 2015-01-22 <p>URL: <a href=https://github.com/joyent/node-http-signature/commit/78ab1da232f31f695f5c362d863593a143aa8b56>WS-2017-0266</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.5</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2017-01-31</p> <p>Fix Resolution: 1.0.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0103</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Handlebars.js before 4.1.0 has Remote Code Execution (RCE) <p>Publish Date: 2019-01-30 <p>URL: <a href=https://github.com/wycats/handlebars.js/issues/1267#issue-187151586>WS-2019-0103</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.5</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-05-30</p> <p>Fix Resolution: 4.1.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2021-0154</summary> ### Vulnerable Library - <b>glob-parent-2.0.0.tgz</b></p> <p>Strips glob magic from a string to provide the parent path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/micromatch/node_modules/parse-glob/node_modules/glob-base/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - micromatch-2.3.8.tgz - parse-glob-3.0.4.tgz - glob-base-0.3.0.tgz - :x: **glob-parent-2.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Regular Expression Denial of Service (ReDoS) vulnerability was found in glob-parent before 5.1.2. <p>Publish Date: 2021-01-27 <p>URL: <a href=https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366>WS-2021-0154</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2021-01-27</p> <p>Fix Resolution: glob-parent - 5.1.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7608</summary> ### Vulnerable Library - <b>yargs-parser-2.4.0.tgz</b></p> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-2.4.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-2.4.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/yargs/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - yargs-4.7.1.tgz - :x: **yargs-parser-2.4.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload. <p>Publish Date: 2020-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7608>CVE-2020-7608</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608</a></p> <p>Release Date: 2020-03-16</p> <p>Fix Resolution: v18.1.1;13.1.2;15.0.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16028</summary> ### Vulnerable Library - <b>randomatic-1.1.5.tgz</b></p> <p>Generate randomized strings of a specified length, fast. Only the length is necessary, but you can optionally generate patterns using any combination of numeric, alpha-numeric, alphabetical, special or custom characters.</p> <p>Library home page: <a href="https://registry.npmjs.org/randomatic/-/randomatic-1.1.5.tgz">https://registry.npmjs.org/randomatic/-/randomatic-1.1.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/micromatch/node_modules/braces/node_modules/expand-range/node_modules/fill-range/node_modules/randomatic/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - micromatch-2.3.8.tgz - braces-1.8.5.tgz - expand-range-1.8.2.tgz - fill-range-2.2.3.tgz - :x: **randomatic-1.1.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> react-native-meteor-oauth is a library for Oauth2 login to a Meteor server in React Native. The oauth Random Token is generated using a non-cryptographically strong RNG (Math.random()). <p>Publish Date: 2018-06-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16028>CVE-2017-16028</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/157">https://nodesecurity.io/advisories/157</a></p> <p>Release Date: 2017-04-14</p> <p>Fix Resolution: Update to version 3.0.0 or later.</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0332</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Arbitrary Code Execution vulnerability found in handlebars before 4.5.3. Lookup helper fails to validate templates. Attack may submit templates that execute arbitrary JavaScript in the system.It is due to an incomplete fix for a WS-2019-0331. <p>Publish Date: 2019-11-17 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7>WS-2019-0332</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p> <p>Release Date: 2019-11-17</p> <p>Fix Resolution: handlebars - 4.5.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0331</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Arbitrary Code Execution vulnerability found in handlebars before 4.5.2. Lookup helper fails to validate templates. Attack may submit templates that execute arbitrary JavaScript in the system. <p>Publish Date: 2019-11-13 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e>WS-2019-0331</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1316">https://www.npmjs.com/advisories/1316</a></p> <p>Release Date: 2019-11-13</p> <p>Fix Resolution: handlebars - 4.5.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0032</summary> ### Vulnerable Library - <b>js-yaml-3.6.1.tgz</b></p> <p>YAML 1.2 parser and serializer</p> <p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **js-yaml-3.6.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service. <p>Publish Date: 2019-03-20 <p>URL: <a href=https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235>WS-2019-0032</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/788/versions">https://www.npmjs.com/advisories/788/versions</a></p> <p>Release Date: 2019-03-20</p> <p>Fix Resolution: js-yaml - 3.13.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2018-0076</summary> ### Vulnerable Library - <b>tunnel-agent-0.4.3.tgz</b></p> <p>HTTP proxy tunneling agent. Formerly part of mikeal/request, now a standalone module.</p> <p>Library home page: <a href="https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz">https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/tunnel-agent/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - request-2.42.0.tgz - :x: **tunnel-agent-0.4.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Versions of tunnel-agent before 0.6.0 are vulnerable to memory exposure. This is exploitable if user supplied input is provided to the auth value and is a number. <p>Publish Date: 2017-03-05 <p>URL: <a href=https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0>WS-2018-0076</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/598">https://nodesecurity.io/advisories/598</a></p> <p>Release Date: 2018-01-27</p> <p>Fix Resolution: 0.6.0</p> </p> <p></p> </details>
True
tap-5.8.0.tgz: 25 vulnerabilities (highest severity is: 9.8) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tap-5.8.0.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p></details> #### <img src='https://whitesource-resources.whitesourcesoftware.com/suggestedVersion.png' width=19 height=20> Mend has checked all newer package trees, and you are on the least vulnerable package! #### Please note: There might be a version that explicitly solves one or more of the vulnerabilities listed below, but we do not recommend it. For more info about the optional fixes, check the section “Details” below. ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (tap version) | Fix PR available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2019-19919](https://www.mend.io/vulnerability-database/CVE-2019-19919) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [CVE-2018-1000620](https://www.mend.io/vulnerability-database/CVE-2018-1000620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2018-3728](https://www.mend.io/vulnerability-database/CVE-2018-3728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [WS-2019-0333](https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0063](https://github.com/nodeca/js-yaml/pull/480) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.0 | js-yaml-3.6.1.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0064](https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.0 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [CVE-2019-20922](https://www.mend.io/vulnerability-database/CVE-2019-20922) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [CVE-2016-10540](https://www.mend.io/vulnerability-database/CVE-2016-10540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2016-2515](https://www.mend.io/vulnerability-database/CVE-2016-2515) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | hawk-1.1.1.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0492](https://github.com/handlebars-lang/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0493](https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [CVE-2017-18077](https://www.mend.io/vulnerability-database/CVE-2017-18077) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | brace-expansion-1.1.4.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0318](https://github.com/wycats/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2018-0590](https://bugzilla.redhat.com/show_bug.cgi?id=1552148) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | diff-1.4.0.tgz | Transitive | N/A* | &#10060; | | [CVE-2017-16026](https://www.mend.io/vulnerability-database/CVE-2017-16026) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | request-2.42.0.tgz | Transitive | N/A* | &#10060; | | [CVE-2020-7598](https://www.mend.io/vulnerability-database/CVE-2020-7598) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.6 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [WS-2017-0266](https://github.com/joyent/node-http-signature/commit/78ab1da232f31f695f5c362d863593a143aa8b56) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | http-signature-0.10.1.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0103](https://github.com/wycats/handlebars.js/issues/1267#issue-187151586) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2021-0154](https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | glob-parent-2.0.0.tgz | Transitive | N/A* | &#10060; | | [CVE-2020-7608](https://www.mend.io/vulnerability-database/CVE-2020-7608) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | yargs-parser-2.4.0.tgz | Transitive | N/A* | &#10060; | | [CVE-2017-16028](https://www.mend.io/vulnerability-database/CVE-2017-16028) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | randomatic-1.1.5.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0332](https://github.com/wycats/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0331](https://github.com/wycats/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | handlebars-4.0.5.tgz | Transitive | N/A* | &#10060; | | [WS-2019-0032](https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | js-yaml-3.6.1.tgz | Transitive | N/A* | &#10060; | | [WS-2018-0076](https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | tunnel-agent-0.4.3.tgz | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-19919</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's __proto__ and __defineGetter__ properties, which may allow an attacker to execute arbitrary code through crafted payloads. <p>Publish Date: 2019-12-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-19919>CVE-2019-19919</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1164">https://www.npmjs.com/advisories/1164</a></p> <p>Release Date: 2019-12-20</p> <p>Fix Resolution: 4.3.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-1000620</summary> ### Vulnerable Libraries - <b>cryptiles-0.2.2.tgz</b>, <b>cryptiles-2.0.5.tgz</b></p> <p> ### <b>cryptiles-0.2.2.tgz</b></p> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-0.2.2.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-0.2.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cryptiles/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - request-2.42.0.tgz - hawk-1.1.1.tgz - :x: **cryptiles-0.2.2.tgz** (Vulnerable Library) ### <b>cryptiles-2.0.5.tgz</b></p> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/coveralls/node_modules/cryptiles/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - coveralls-2.13.3.tgz - request-2.79.0.tgz - hawk-3.1.3.tgz - :x: **cryptiles-2.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2. <p>Publish Date: 2018-07-09 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-1000620>CVE-2018-1000620</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620</a></p> <p>Release Date: 2018-07-09</p> <p>Fix Resolution: v4.1.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-3728</summary> ### Vulnerable Libraries - <b>hoek-0.9.1.tgz</b>, <b>hoek-2.16.3.tgz</b></p> <p> ### <b>hoek-0.9.1.tgz</b></p> <p>General purpose node utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz">https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/hoek/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - request-2.42.0.tgz - hawk-1.1.1.tgz - :x: **hoek-0.9.1.tgz** (Vulnerable Library) ### <b>hoek-2.16.3.tgz</b></p> <p>General purpose node utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/coveralls/node_modules/hoek/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - coveralls-2.13.3.tgz - request-2.79.0.tgz - hawk-3.1.3.tgz - :x: **hoek-2.16.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects. <p>Publish Date: 2018-03-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-3728>CVE-2018-3728</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-3728">https://nvd.nist.gov/vuln/detail/CVE-2018-3728</a></p> <p>Release Date: 2018-03-30</p> <p>Fix Resolution: 4.2.1,5.0.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0333</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In handlebars, versions prior to v4.5.3 are vulnerable to prototype pollution. Using a malicious template it's possbile to add or modify properties to the Object prototype. This can also lead to DOS and RCE in certain conditions. <p>Publish Date: 2019-11-18 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08>WS-2019-0333</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1325">https://www.npmjs.com/advisories/1325</a></p> <p>Release Date: 2019-11-18</p> <p>Fix Resolution: handlebars - 4.5.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0063</summary> ### Vulnerable Library - <b>js-yaml-3.6.1.tgz</b></p> <p>YAML 1.2 parser and serializer</p> <p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **js-yaml-3.6.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file. <p>Publish Date: 2019-04-05 <p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>8.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p> <p>Release Date: 2019-04-05</p> <p>Fix Resolution: js-yaml - 3.13.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0064</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. <p>Publish Date: 2019-01-30 <p>URL: <a href=https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2>WS-2019-0064</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>8.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/755/versions">https://www.npmjs.com/advisories/755/versions</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 1.0.6-2,4.0.14,4.1.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20922</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources. <p>Publish Date: 2020-09-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20922>CVE-2019-20922</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1300">https://www.npmjs.com/advisories/1300</a></p> <p>Release Date: 2020-09-30</p> <p>Fix Resolution: handlebars - 4.4.5</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-10540</summary> ### Vulnerable Libraries - <b>minimatch-2.0.10.tgz</b>, <b>minimatch-3.0.0.tgz</b></p> <p> ### <b>minimatch-2.0.10.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz">https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/fileset/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - fileset-0.2.1.tgz - :x: **minimatch-2.0.10.tgz** (Vulnerable Library) ### <b>minimatch-3.0.0.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.0.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/glob/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - glob-7.0.3.tgz - :x: **minimatch-3.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript `RegExp` objects. The primary function, `minimatch(path, pattern)` in Minimatch 3.0.1 and earlier is vulnerable to ReDoS in the `pattern` parameter. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10540>CVE-2016-10540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/118">https://nodesecurity.io/advisories/118</a></p> <p>Release Date: 2016-06-20</p> <p>Fix Resolution: Update to version 3.0.2 or later.</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-2515</summary> ### Vulnerable Library - <b>hawk-1.1.1.tgz</b></p> <p>HTTP Hawk Authentication Scheme</p> <p>Library home page: <a href="https://registry.npmjs.org/hawk/-/hawk-1.1.1.tgz">https://registry.npmjs.org/hawk/-/hawk-1.1.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/hawk/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - request-2.42.0.tgz - :x: **hawk-1.1.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Hawk before 3.1.3 and 4.x before 4.1.1 allow remote attackers to cause a denial of service (CPU consumption or partial outage) via a long (1) header or (2) URI that is matched against an improper regular expression. <p>Publish Date: 2016-04-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-2515>CVE-2016-2515</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2515">https://nvd.nist.gov/vuln/detail/CVE-2016-2515</a></p> <p>Release Date: 2016-04-13</p> <p>Fix Resolution: 3.1.3,4.1.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0492</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. <p>Publish Date: 2019-11-19 <p>URL: <a href=https://github.com/handlebars-lang/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7>WS-2019-0492</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p> <p>Release Date: 2019-11-19</p> <p>Fix Resolution: handlebars - 3.0.8,4.5.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0493</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> handlebars before 3.0.8 and 4.x before 4.5.2 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. <p>Publish Date: 2019-11-14 <p>URL: <a href=https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e>WS-2019-0493</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1316">https://www.npmjs.com/advisories/1316</a></p> <p>Release Date: 2019-11-14</p> <p>Fix Resolution: handlebars - 3.0.8,4.5.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-18077</summary> ### Vulnerable Library - <b>brace-expansion-1.1.4.tgz</b></p> <p>Brace expansion as known from sh/bash</p> <p>Library home page: <a href="https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.4.tgz">https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/fileset/node_modules/minimatch/node_modules/brace-expansion/package.json,/node_modules/nyc/node_modules/glob/node_modules/minimatch/node_modules/brace-expansion/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - fileset-0.2.1.tgz - minimatch-2.0.10.tgz - :x: **brace-expansion-1.1.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> index.js in brace-expansion before 1.1.7 is vulnerable to Regular Expression Denial of Service (ReDoS) attacks, as demonstrated by an expand argument containing many comma characters. <p>Publish Date: 2018-01-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-18077>CVE-2017-18077</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18077">https://nvd.nist.gov/vuln/detail/CVE-2017-18077</a></p> <p>Release Date: 2018-01-27</p> <p>Fix Resolution: 1.1.7</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0318</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In "showdownjs/showdown", versions prior to v4.4.5 are vulnerable against Regular expression Denial of Service (ReDOS) once receiving specially-crafted templates. <p>Publish Date: 2019-10-20 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b>WS-2019-0318</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1300">https://www.npmjs.com/advisories/1300</a></p> <p>Release Date: 2019-10-20</p> <p>Fix Resolution: handlebars - 4.4.5</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2018-0590</summary> ### Vulnerable Library - <b>diff-1.4.0.tgz</b></p> <p>A javascript text diff implementation.</p> <p>Library home page: <a href="https://registry.npmjs.org/diff/-/diff-1.4.0.tgz">https://registry.npmjs.org/diff/-/diff-1.4.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/diff/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - tap-mocha-reporter-0.0.27.tgz - :x: **diff-1.4.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. <p>Publish Date: 2018-03-05 <p>URL: <a href=https://bugzilla.redhat.com/show_bug.cgi?id=1552148>WS-2018-0590</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>7.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2018-03-05</p> <p>Fix Resolution: 3.5.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16026</summary> ### Vulnerable Library - <b>request-2.42.0.tgz</b></p> <p>Simplified HTTP request client.</p> <p>Library home page: <a href="https://registry.npmjs.org/request/-/request-2.42.0.tgz">https://registry.npmjs.org/request/-/request-2.42.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/request/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - :x: **request-2.42.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Request is an http client. If a request is made using ```multipart```, and the body type is a ```number```, then the specified number of non-zero memory is passed in the body. This affects Request >=2.2.6 <2.47.0 || >2.51.0 <=2.67.0. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16026>CVE-2017-16026</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-16026">https://nvd.nist.gov/vuln/detail/CVE-2017-16026</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution: 2.47.1,2.67.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7598</summary> ### Vulnerable Libraries - <b>minimist-1.2.0.tgz</b>, <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b></p> <p> ### <b>minimist-1.2.0.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/coveralls/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - coveralls-2.13.3.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) ### <b>minimist-0.0.8.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/mkdirp/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) ### <b>minimist-0.0.10.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/node_modules/optimist/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - handlebars-4.0.5.tgz - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7598>CVE-2020-7598</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.6</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7598">https://nvd.nist.gov/vuln/detail/CVE-2020-7598</a></p> <p>Release Date: 2020-03-12</p> <p>Fix Resolution: Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;org.webjars:npm - 5.0.0-1;Indianadavy.VueJsWebAPITemplate.CSharp - 1.0.1;NorDroN.AngularTemplate - 0.1.6;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 2.0.0;ApiExplorer.HelpPage - 1.0.0-alpha3;CoreVueWebTest - 3.0.101;dotnetng.template - 1.0.0.4;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;Fable.Template.Elmish.React - 0.1.6;BumperLane.Public.Api.Client - 0.23.35.214-prerelease;Yarn.MSBuild - 0.24.6,0.22.0;Bridge.AWS - 0.3.30.36;Nodejs.Redist.x64 - 7.7.3.1,10.3.0;tslint - 5.6.0,6.1.1;org.webjars.npm:bourbon-neat - 2.0.0-beta.2;GR.PageRender.Razor - 1.8.0;MIDIator.WebClient - 1.0.105;EntityFramework.LookupTables - 1.1.14.119;BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;org.webjars.npm:minimist - 1.2.4;minimist - 1.2.3,0.2.1;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Romano.Vue - 1.0.1;Yarnpkg.Yarn - 0.26.1;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;Chutzpah - 4.4.10;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;VueJS.NetCore - 1.1.1;Dianoga - 5.0.0-beta.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2017-0266</summary> ### Vulnerable Library - <b>http-signature-0.10.1.tgz</b></p> <p>Reference implementation of Joyent's HTTP Signature scheme.</p> <p>Library home page: <a href="https://registry.npmjs.org/http-signature/-/http-signature-0.10.1.tgz">https://registry.npmjs.org/http-signature/-/http-signature-0.10.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/http-signature/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - request-2.42.0.tgz - :x: **http-signature-0.10.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Affected versions (before 1.0.0) of the http-signature package are vulnerable to Timing Attacks. <p>Publish Date: 2015-01-22 <p>URL: <a href=https://github.com/joyent/node-http-signature/commit/78ab1da232f31f695f5c362d863593a143aa8b56>WS-2017-0266</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.5</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2017-01-31</p> <p>Fix Resolution: 1.0.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0103</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Handlebars.js before 4.1.0 has Remote Code Execution (RCE) <p>Publish Date: 2019-01-30 <p>URL: <a href=https://github.com/wycats/handlebars.js/issues/1267#issue-187151586>WS-2019-0103</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.5</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-05-30</p> <p>Fix Resolution: 4.1.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2021-0154</summary> ### Vulnerable Library - <b>glob-parent-2.0.0.tgz</b></p> <p>Strips glob magic from a string to provide the parent path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/micromatch/node_modules/parse-glob/node_modules/glob-base/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - micromatch-2.3.8.tgz - parse-glob-3.0.4.tgz - glob-base-0.3.0.tgz - :x: **glob-parent-2.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Regular Expression Denial of Service (ReDoS) vulnerability was found in glob-parent before 5.1.2. <p>Publish Date: 2021-01-27 <p>URL: <a href=https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366>WS-2021-0154</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2021-01-27</p> <p>Fix Resolution: glob-parent - 5.1.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7608</summary> ### Vulnerable Library - <b>yargs-parser-2.4.0.tgz</b></p> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-2.4.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-2.4.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/yargs/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - yargs-4.7.1.tgz - :x: **yargs-parser-2.4.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload. <p>Publish Date: 2020-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7608>CVE-2020-7608</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608</a></p> <p>Release Date: 2020-03-16</p> <p>Fix Resolution: v18.1.1;13.1.2;15.0.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16028</summary> ### Vulnerable Library - <b>randomatic-1.1.5.tgz</b></p> <p>Generate randomized strings of a specified length, fast. Only the length is necessary, but you can optionally generate patterns using any combination of numeric, alpha-numeric, alphabetical, special or custom characters.</p> <p>Library home page: <a href="https://registry.npmjs.org/randomatic/-/randomatic-1.1.5.tgz">https://registry.npmjs.org/randomatic/-/randomatic-1.1.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/micromatch/node_modules/braces/node_modules/expand-range/node_modules/fill-range/node_modules/randomatic/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - micromatch-2.3.8.tgz - braces-1.8.5.tgz - expand-range-1.8.2.tgz - fill-range-2.2.3.tgz - :x: **randomatic-1.1.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> react-native-meteor-oauth is a library for Oauth2 login to a Meteor server in React Native. The oauth Random Token is generated using a non-cryptographically strong RNG (Math.random()). <p>Publish Date: 2018-06-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16028>CVE-2017-16028</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/157">https://nodesecurity.io/advisories/157</a></p> <p>Release Date: 2017-04-14</p> <p>Fix Resolution: Update to version 3.0.0 or later.</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0332</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Arbitrary Code Execution vulnerability found in handlebars before 4.5.3. Lookup helper fails to validate templates. Attack may submit templates that execute arbitrary JavaScript in the system.It is due to an incomplete fix for a WS-2019-0331. <p>Publish Date: 2019-11-17 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7>WS-2019-0332</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p> <p>Release Date: 2019-11-17</p> <p>Fix Resolution: handlebars - 4.5.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0331</summary> ### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **handlebars-4.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Arbitrary Code Execution vulnerability found in handlebars before 4.5.2. Lookup helper fails to validate templates. Attack may submit templates that execute arbitrary JavaScript in the system. <p>Publish Date: 2019-11-13 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e>WS-2019-0331</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1316">https://www.npmjs.com/advisories/1316</a></p> <p>Release Date: 2019-11-13</p> <p>Fix Resolution: handlebars - 4.5.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0032</summary> ### Vulnerable Library - <b>js-yaml-3.6.1.tgz</b></p> <p>YAML 1.2 parser and serializer</p> <p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - nyc-6.6.1.tgz - istanbul-0.4.3.tgz - :x: **js-yaml-3.6.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service. <p>Publish Date: 2019-03-20 <p>URL: <a href=https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235>WS-2019-0032</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/788/versions">https://www.npmjs.com/advisories/788/versions</a></p> <p>Release Date: 2019-03-20</p> <p>Fix Resolution: js-yaml - 3.13.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2018-0076</summary> ### Vulnerable Library - <b>tunnel-agent-0.4.3.tgz</b></p> <p>HTTP proxy tunneling agent. Formerly part of mikeal/request, now a standalone module.</p> <p>Library home page: <a href="https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz">https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/tunnel-agent/package.json</p> <p> Dependency Hierarchy: - tap-5.8.0.tgz (Root Library) - codecov.io-0.1.6.tgz - request-2.42.0.tgz - :x: **tunnel-agent-0.4.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Versions of tunnel-agent before 0.6.0 are vulnerable to memory exposure. This is exploitable if user supplied input is provided to the auth value and is a number. <p>Publish Date: 2017-03-05 <p>URL: <a href=https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0>WS-2018-0076</a></p> </p> <p></p> ### CVSS 2 Score Details (<b>5.0</b>) <p> Base Score Metrics not available</p> </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/598">https://nodesecurity.io/advisories/598</a></p> <p>Release Date: 2018-01-27</p> <p>Fix Resolution: 0.6.0</p> </p> <p></p> </details>
non_usab
tap tgz vulnerabilities highest severity is autoclosed vulnerable library tap tgz path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules js yaml package json node modules coveralls node modules js yaml package json found in head commit a href mend has checked all newer package trees and you are on the least vulnerable package please note there might be a version that explicitly solves one or more of the vulnerabilities listed below but we do not recommend it for more info about the optional fixes check the section “details” below vulnerabilities cve severity cvss dependency type fixed in tap version fix pr available high handlebars tgz transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high handlebars tgz transitive n a high js yaml tgz transitive n a high handlebars tgz transitive n a high handlebars tgz transitive n a high detected in multiple dependencies transitive n a high hawk tgz transitive n a high handlebars tgz transitive n a high handlebars tgz transitive n a high brace expansion tgz transitive n a high handlebars tgz transitive n a high diff tgz transitive n a medium request tgz transitive n a medium detected in multiple dependencies transitive n a medium http signature tgz transitive n a medium handlebars tgz transitive n a medium glob parent tgz transitive n a medium yargs parser tgz transitive n a medium randomatic tgz transitive n a medium handlebars tgz transitive n a medium handlebars tgz transitive n a medium js yaml tgz transitive n a medium tunnel agent tgz transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the section details below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details versions of handlebars prior to are vulnerable to prototype pollution leading to remote code execution templates may alter an object s proto and definegetter properties which may allow an attacker to execute arbitrary code through crafted payloads publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable libraries cryptiles tgz cryptiles tgz cryptiles tgz general purpose crypto utilities library home page a href path to dependency file package json path to vulnerable library node modules cryptiles package json dependency hierarchy tap tgz root library codecov io tgz request tgz hawk tgz x cryptiles tgz vulnerable library cryptiles tgz general purpose crypto utilities library home page a href path to dependency file package json path to vulnerable library node modules coveralls node modules cryptiles package json dependency hierarchy tap tgz root library coveralls tgz request tgz hawk tgz x cryptiles tgz vulnerable library found in head commit a href found in base branch main vulnerability details eran hammer cryptiles version earlier contains a cwe insufficient entropy vulnerability in randomdigits method that can result in an attacker is more likely to be able to brute force something that was supposed to be random this attack appear to be exploitable via depends upon the calling application this vulnerability appears to have been fixed in publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable libraries hoek tgz hoek tgz hoek tgz general purpose node utilities library home page a href path to dependency file package json path to vulnerable library node modules hoek package json dependency hierarchy tap tgz root library codecov io tgz request tgz hawk tgz x hoek tgz vulnerable library hoek tgz general purpose node utilities library home page a href path to dependency file package json path to vulnerable library node modules coveralls node modules hoek package json dependency hierarchy tap tgz root library coveralls tgz request tgz hawk tgz x hoek tgz vulnerable library found in head commit a href found in base branch main vulnerability details hoek node module before and x before suffers from a modification of assumed immutable data maid vulnerability via merge and applytodefaults functions which allows a malicious user to modify the prototype of object via proto causing the addition or modification of an existing property that will exist on all objects publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details in handlebars versions prior to are vulnerable to prototype pollution using a malicious template it s possbile to add or modify properties to the object prototype this can also lead to dos and rce in certain conditions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars ws vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules js yaml package json node modules coveralls node modules js yaml package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x js yaml tgz vulnerable library found in head commit a href found in base branch main vulnerability details js yaml prior to are vulnerable to code injection the load function may execute arbitrary code injected through a malicious yaml file publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution js yaml ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details versions of handlebars prior to are vulnerable to prototype pollution templates may alter an objects prototype thus allowing an attacker to execute arbitrary code on the server publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution cve vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details handlebars before allows regular expression denial of service redos because of eager matching the parser may be forced into an endless loop while processing crafted templates this may allow attackers to exhaust system resources publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars cve vulnerable libraries minimatch tgz minimatch tgz minimatch tgz a glob matcher in javascript library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules fileset node modules minimatch package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz fileset tgz x minimatch tgz vulnerable library minimatch tgz a glob matcher in javascript library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules glob node modules minimatch package json dependency hierarchy tap tgz root library nyc tgz glob tgz x minimatch tgz vulnerable library found in head commit a href found in base branch main vulnerability details minimatch is a minimal matching utility that works by converting glob expressions into javascript regexp objects the primary function minimatch path pattern in minimatch and earlier is vulnerable to redos in the pattern parameter publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution update to version or later cve vulnerable library hawk tgz http hawk authentication scheme library home page a href path to dependency file package json path to vulnerable library node modules hawk package json dependency hierarchy tap tgz root library codecov io tgz request tgz x hawk tgz vulnerable library found in head commit a href found in base branch main vulnerability details hawk before and x before allow remote attackers to cause a denial of service cpu consumption or partial outage via a long header or uri that is matched against an improper regular expression publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details handlebars before and x before is vulnerable to arbitrary code execution the package s lookup helper fails to properly validate templates allowing attackers to submit templates that execute arbitrary javascript in the system publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details handlebars before and x before is vulnerable to arbitrary code execution the package s lookup helper fails to properly validate templates allowing attackers to submit templates that execute arbitrary javascript in the system publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars cve vulnerable library brace expansion tgz brace expansion as known from sh bash library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules fileset node modules minimatch node modules brace expansion package json node modules nyc node modules glob node modules minimatch node modules brace expansion package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz fileset tgz minimatch tgz x brace expansion tgz vulnerable library found in head commit a href found in base branch main vulnerability details index js in brace expansion before is vulnerable to regular expression denial of service redos attacks as demonstrated by an expand argument containing many comma characters publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details in showdownjs showdown versions prior to are vulnerable against regular expression denial of service redos once receiving specially crafted templates publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars ws vulnerable library diff tgz a javascript text diff implementation library home page a href path to dependency file package json path to vulnerable library node modules diff package json dependency hierarchy tap tgz root library tap mocha reporter tgz x diff tgz vulnerable library found in head commit a href found in base branch main vulnerability details a vulnerability was found in diff before the affected versions of this package are vulnerable to regular expression denial of service redos attacks publish date url a href cvss score details base score metrics not available suggested fix type upgrade version release date fix resolution cve vulnerable library request tgz simplified http request client library home page a href path to dependency file package json path to vulnerable library node modules request package json dependency hierarchy tap tgz root library codecov io tgz x request tgz vulnerable library found in head commit a href found in base branch main vulnerability details request is an http client if a request is made using multipart and the body type is a number then the specified number of non zero memory is passed in the body this affects request publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable libraries minimist tgz minimist tgz minimist tgz minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules coveralls node modules minimist package json dependency hierarchy tap tgz root library coveralls tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules mkdirp node modules minimist package json dependency hierarchy tap tgz root library nyc tgz mkdirp tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars node modules optimist node modules minimist package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz handlebars tgz optimist tgz x minimist tgz vulnerable library found in head commit a href found in base branch main vulnerability details minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution virteom tenant mobile bluetooth ios prerelease virteom public utilities prerelease org webjars npm indianadavy vuejswebapitemplate csharp nordron angulartemplate virteom tenant mobile framework prerelease virteom tenant mobile bluetooth android prerelease dotnet scaffold raml parser apiexplorer helppage corevuewebtest dotnetng template sitecoremaster truedynamicplaceholders virteom tenant mobile framework android prerelease fable template elmish react bumperlane public api client prerelease yarn msbuild bridge aws nodejs redist tslint org webjars npm bourbon neat beta gr pagerender razor midiator webclient entityframework lookuptables bumperlane public service contracts prerelease org webjars npm minimist minimist virteom tenant mobile bluetooth prerelease showingvault dotnet sdk prerelease romano vue yarnpkg yarn virteom tenant mobile framework uwp prerelease virteom tenant mobile framework ios prerelease chutzpah bumperlane public api clientmodule prerelease vuejs netcore dianoga beta ws vulnerable library http signature tgz reference implementation of joyent s http signature scheme library home page a href path to dependency file package json path to vulnerable library node modules http signature package json dependency hierarchy tap tgz root library codecov io tgz request tgz x http signature tgz vulnerable library found in head commit a href found in base branch main vulnerability details affected versions before of the http signature package are vulnerable to timing attacks publish date url a href cvss score details base score metrics not available suggested fix type upgrade version release date fix resolution ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details handlebars js before has remote code execution rce publish date url a href cvss score details base score metrics not available suggested fix type upgrade version release date fix resolution ws vulnerable library glob parent tgz strips glob magic from a string to provide the parent path library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules micromatch node modules parse glob node modules glob base node modules glob parent package json dependency hierarchy tap tgz root library nyc tgz micromatch tgz parse glob tgz glob base tgz x glob parent tgz vulnerable library found in head commit a href found in base branch main vulnerability details regular expression denial of service redos vulnerability was found in glob parent before publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version release date fix resolution glob parent cve vulnerable library yargs parser tgz the mighty option parser used by yargs library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules yargs node modules yargs parser package json dependency hierarchy tap tgz root library nyc tgz yargs tgz x yargs parser tgz vulnerable library found in head commit a href found in base branch main vulnerability details yargs parser could be tricked into adding or modifying properties of object prototype using a proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable library randomatic tgz generate randomized strings of a specified length fast only the length is necessary but you can optionally generate patterns using any combination of numeric alpha numeric alphabetical special or custom characters library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules micromatch node modules braces node modules expand range node modules fill range node modules randomatic package json dependency hierarchy tap tgz root library nyc tgz micromatch tgz braces tgz expand range tgz fill range tgz x randomatic tgz vulnerable library found in head commit a href found in base branch main vulnerability details react native meteor oauth is a library for login to a meteor server in react native the oauth random token is generated using a non cryptographically strong rng math random publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution update to version or later ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details arbitrary code execution vulnerability found in handlebars before lookup helper fails to validate templates attack may submit templates that execute arbitrary javascript in the system it is due to an incomplete fix for a ws publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution handlebars ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details arbitrary code execution vulnerability found in handlebars before lookup helper fails to validate templates attack may submit templates that execute arbitrary javascript in the system publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution handlebars ws vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules js yaml package json node modules coveralls node modules js yaml package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x js yaml tgz vulnerable library found in head commit a href found in base branch main vulnerability details versions js yaml prior to are vulnerable to denial of service by parsing a carefully crafted yaml file the node process stalls and may exhaust system resources leading to a denial of service publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution js yaml ws vulnerable library tunnel agent tgz http proxy tunneling agent formerly part of mikeal request now a standalone module library home page a href path to dependency file package json path to vulnerable library node modules tunnel agent package json dependency hierarchy tap tgz root library codecov io tgz request tgz x tunnel agent tgz vulnerable library found in head commit a href found in base branch main vulnerability details versions of tunnel agent before are vulnerable to memory exposure this is exploitable if user supplied input is provided to the auth value and is a number publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution
0
202,772
15,300,247,052
IssuesEvent
2021-02-24 12:03:11
fetchai/agents-aea
https://api.github.com/repos/fetchai/agents-aea
closed
Add remaining tests for Tac_Negotiation
bug test
**What** Add the remaining tests for `tac_negotiation` skill. Coverage for methods that reference `self.context.decision_maker_handler_context` is missing. This was due to the skill testing tool not being able to deal with it. Add support for this in the skill testing tool and add coverage for these parts of tac_negotiation skill. Specifically the following four: - `behaviour.py::GoodsRegisterAndSearchBehaviour::act::if not self.context.decision_maker_handler_context.goal_pursuit_readiness.is_ready` - transactions.py::Transactions::ownership_state_after_locks - strategy.py::Strategy::_generate_candidate_proposals - strategy.py::Strategy::is_profitable_transaction
1.0
Add remaining tests for Tac_Negotiation - **What** Add the remaining tests for `tac_negotiation` skill. Coverage for methods that reference `self.context.decision_maker_handler_context` is missing. This was due to the skill testing tool not being able to deal with it. Add support for this in the skill testing tool and add coverage for these parts of tac_negotiation skill. Specifically the following four: - `behaviour.py::GoodsRegisterAndSearchBehaviour::act::if not self.context.decision_maker_handler_context.goal_pursuit_readiness.is_ready` - transactions.py::Transactions::ownership_state_after_locks - strategy.py::Strategy::_generate_candidate_proposals - strategy.py::Strategy::is_profitable_transaction
non_usab
add remaining tests for tac negotiation what add the remaining tests for tac negotiation skill coverage for methods that reference self context decision maker handler context is missing this was due to the skill testing tool not being able to deal with it add support for this in the skill testing tool and add coverage for these parts of tac negotiation skill specifically the following four behaviour py goodsregisterandsearchbehaviour act if not self context decision maker handler context goal pursuit readiness is ready transactions py transactions ownership state after locks strategy py strategy generate candidate proposals strategy py strategy is profitable transaction
0
6,256
4,203,418,286
IssuesEvent
2016-06-28 05:09:32
Virtual-Labs/structural-dynamics-iiith
https://api.github.com/repos/Virtual-Labs/structural-dynamics-iiith
closed
QA_Free Vibration of Single Degree of Freedom System_Prerequisites_p1
Category: Usability Developed by: VLEAD Release Number: Production Resolved Severity: S2
Defect Description : In the "Free Vibration of Single Degree of Freedom System" experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required. Actual Result : In the "Free Vibration of Single Degree of Freedom System" experiment, the minimum requirement to run the experiment is not displayed in the page. Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM Processor:i5 Test Step Link: https://github.com/Virtual-Labs/structural-dynamics-iiith/blob/master/test-cases/integration_test-cases/Free%20Vibration%20of%20Single%20Degree/Free%20Vibration%20of%20Single%20Degree_17_Prerequisites_p1.org Attachment: ![sd22](https://cloud.githubusercontent.com/assets/14869397/14703591/3828ed58-07ce-11e6-8806-7a47422dea5f.png)
True
QA_Free Vibration of Single Degree of Freedom System_Prerequisites_p1 - Defect Description : In the "Free Vibration of Single Degree of Freedom System" experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required. Actual Result : In the "Free Vibration of Single Degree of Freedom System" experiment, the minimum requirement to run the experiment is not displayed in the page. Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM Processor:i5 Test Step Link: https://github.com/Virtual-Labs/structural-dynamics-iiith/blob/master/test-cases/integration_test-cases/Free%20Vibration%20of%20Single%20Degree/Free%20Vibration%20of%20Single%20Degree_17_Prerequisites_p1.org Attachment: ![sd22](https://cloud.githubusercontent.com/assets/14869397/14703591/3828ed58-07ce-11e6-8806-7a47422dea5f.png)
usab
qa free vibration of single degree of freedom system prerequisites defect description in the free vibration of single degree of freedom system experiment the minimum requirement to run the experiment is not displayed in the page instead a page or scrolling should appear providing information on minimum requirement to run this experiment information like bandwidth device resolution hardware configuration and software required actual result in the free vibration of single degree of freedom system experiment the minimum requirement to run the experiment is not displayed in the page environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor test step link attachment
1
3,539
3,482,147,743
IssuesEvent
2015-12-29 21:07:29
spiral/spiral
https://api.github.com/repos/spiral/spiral
closed
Create ?? polyfill for views or built an alternative syntax
improvement module usability
Or replace invocations of some short function like first($data, $value, $default) => automatically process using InvocationLocator and replace with valid statement (getSource + arguments, like in a past for i18n functions). Other "functions" like that? I should probably fix runtimeVariable/evaluatorVariable like that as well - no regexp.
True
Create ?? polyfill for views or built an alternative syntax - Or replace invocations of some short function like first($data, $value, $default) => automatically process using InvocationLocator and replace with valid statement (getSource + arguments, like in a past for i18n functions). Other "functions" like that? I should probably fix runtimeVariable/evaluatorVariable like that as well - no regexp.
usab
create polyfill for views or built an alternative syntax or replace invocations of some short function like first data value default automatically process using invocationlocator and replace with valid statement getsource arguments like in a past for functions other functions like that i should probably fix runtimevariable evaluatorvariable like that as well no regexp
1
4,342
2,718,494,051
IssuesEvent
2015-04-12 11:04:40
shokai/Android-GMapStars
https://api.github.com/repos/shokai/Android-GMapStars
closed
Circle CIでテストする
test
- [x] configure GitHub->Circle CI webhook - [x] テストする - [x] READMEにstatus badgeを表示する
1.0
Circle CIでテストする - - [x] configure GitHub->Circle CI webhook - [x] テストする - [x] READMEにstatus badgeを表示する
non_usab
circle ciでテストする configure github circle ci webhook テストする readmeにstatus badgeを表示する
0
597,751
18,170,950,923
IssuesEvent
2021-09-27 19:58:44
googleapis/repo-automation-bots
https://api.github.com/repos/googleapis/repo-automation-bots
closed
Owl Bot fails on corrupt lock file, but the lock file mostly seems ok
type: bug priority: p3
Looking at this PR: https://github.com/googleapis/nodejs-eventarc/pull/28 The Owl Bot status check fails with the message: `The OwlBot lock file on this repository is corrupt`: https://github.com/googleapis/nodejs-eventarc/pull/28/checks?check_run_id=3694777305 At a glance, the lock file seems mostly ok, but I could be missing something: https://github.com/googleapis/nodejs-eventarc/blob/main/.github/.OwlBot.lock.yaml Flagging as a P1 since we can't ship/update the module at the moment.
1.0
Owl Bot fails on corrupt lock file, but the lock file mostly seems ok - Looking at this PR: https://github.com/googleapis/nodejs-eventarc/pull/28 The Owl Bot status check fails with the message: `The OwlBot lock file on this repository is corrupt`: https://github.com/googleapis/nodejs-eventarc/pull/28/checks?check_run_id=3694777305 At a glance, the lock file seems mostly ok, but I could be missing something: https://github.com/googleapis/nodejs-eventarc/blob/main/.github/.OwlBot.lock.yaml Flagging as a P1 since we can't ship/update the module at the moment.
non_usab
owl bot fails on corrupt lock file but the lock file mostly seems ok looking at this pr the owl bot status check fails with the message the owlbot lock file on this repository is corrupt at a glance the lock file seems mostly ok but i could be missing something flagging as a since we can t ship update the module at the moment
0
229,854
17,580,392,085
IssuesEvent
2021-08-16 06:28:02
lorezyra/Richie2.com
https://api.github.com/repos/lorezyra/Richie2.com
closed
For both CSS & JS, please use only letters for class,var,function names
documentation
In both the (S)CSS and JavaScript, please don't use a hyphen `-` or other non-alphabet letters. Please use [camelCase](https://www.crockford.com/code.html) characters. Should be: `[A-Za-z]` Ref: https://en.wikipedia.org/wiki/Naming_convention_(programming)
1.0
For both CSS & JS, please use only letters for class,var,function names - In both the (S)CSS and JavaScript, please don't use a hyphen `-` or other non-alphabet letters. Please use [camelCase](https://www.crockford.com/code.html) characters. Should be: `[A-Za-z]` Ref: https://en.wikipedia.org/wiki/Naming_convention_(programming)
non_usab
for both css js please use only letters for class var function names in both the s css and javascript please don t use a hyphen or other non alphabet letters please use characters should be ref
0
17,711
12,267,853,971
IssuesEvent
2020-05-07 11:27:51
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
opened
Ambigious datetime in HTTP protocol
usability
HTTP protocol displays datetime values as ISO8601 format without offset. For non-UTC values this leads to ambiguity: ```(sql) select toDateTime('2010-10-31 01:30:00', 'Europe/Moscow') + arrayJoin(range(7)) * 60 * 30 as val, groupArray(cast(val as Int64)) as val_ts group by val order by val format TabSeparatedWithNamesAndTypes ``` ``` val val_ts DateTime(\'Europe/Moscow\') Array(Int64) 2010-10-31 01:30:00 [1288474200] 2010-10-31 02:00:00 [1288476000] 2010-10-31 02:30:00 [1288477800] 2010-10-31 02:00:00 [1288479600] 2010-10-31 02:30:00 [1288481400] 2010-10-31 03:00:00 [1288483200] 2010-10-31 03:30:00 [1288485000] ``` It would be more correct to either: * Serialize datetime values for HTTP with the effective offset, e.g.: ``` DateTime(\'Europe/Moscow\') Array(Int64) 2010-10-31 02:30:00+04:00 [1288477800] 2010-10-31 02:30:00+03:00 [1288481400] ``` * Serialize datetime as the underlying integer values, e.g. ``` DateTime(\'Europe/Moscow\') Array(Int64) 1288477800 [1288477800] 1288481400 [1288481400] ``` and to configure the serialization over settings (HTTP query parameters).
True
Ambigious datetime in HTTP protocol - HTTP protocol displays datetime values as ISO8601 format without offset. For non-UTC values this leads to ambiguity: ```(sql) select toDateTime('2010-10-31 01:30:00', 'Europe/Moscow') + arrayJoin(range(7)) * 60 * 30 as val, groupArray(cast(val as Int64)) as val_ts group by val order by val format TabSeparatedWithNamesAndTypes ``` ``` val val_ts DateTime(\'Europe/Moscow\') Array(Int64) 2010-10-31 01:30:00 [1288474200] 2010-10-31 02:00:00 [1288476000] 2010-10-31 02:30:00 [1288477800] 2010-10-31 02:00:00 [1288479600] 2010-10-31 02:30:00 [1288481400] 2010-10-31 03:00:00 [1288483200] 2010-10-31 03:30:00 [1288485000] ``` It would be more correct to either: * Serialize datetime values for HTTP with the effective offset, e.g.: ``` DateTime(\'Europe/Moscow\') Array(Int64) 2010-10-31 02:30:00+04:00 [1288477800] 2010-10-31 02:30:00+03:00 [1288481400] ``` * Serialize datetime as the underlying integer values, e.g. ``` DateTime(\'Europe/Moscow\') Array(Int64) 1288477800 [1288477800] 1288481400 [1288481400] ``` and to configure the serialization over settings (HTTP query parameters).
usab
ambigious datetime in http protocol http protocol displays datetime values as format without offset for non utc values this leads to ambiguity sql select todatetime europe moscow arrayjoin range as val grouparray cast val as as val ts group by val order by val format tabseparatedwithnamesandtypes val val ts datetime europe moscow array it would be more correct to either serialize datetime values for http with the effective offset e g datetime europe moscow array serialize datetime as the underlying integer values e g datetime europe moscow array and to configure the serialization over settings http query parameters
1
2,404
3,830,641,148
IssuesEvent
2016-03-31 15:12:38
symfony/symfony
https://api.github.com/repos/symfony/symfony
closed
remember_me authentication causes loss of entity associations?
Bug Security Status: Needs Review Unconfirmed
This is a weird one. I've tested this with both the client cookie and doctrine provider and the outcome is the same. I've implemented "Remember Me" login functionality for our application. I also have an AuthenticationListener implemented which updates the 'User' entity with a 'lastLogin' DateTime: ```php public function onAuthenticationSuccess( AuthenticationEvent $event ) { $user = $event->getAuthenticationToken()->getUser(); if( $user instanceof \Veromo\Bundle\CoreBundle\Entity\User ) { $user->set( 'lastLogin', new \DateTime() ); $this->manager->flush(); } } ``` My 'User' Entity is associated with a 'Contact' Entity with a OneToOne Relationship which is cascaded. **NOW ...** When this code executes on an interactive login (user physically enters username and password), all is well - everything goes off without a hitch. When this code executes on a non-interactive login (user has selected 'Remember Me' has a valid cookie, etc ..), it all falls in a heap. It appears that when the `flush` command executes, Doctrine has 'forgotten' about the relationship that exists between the 'User' Entity and the 'Contact' Entity and attempts to re-create them (opting for an INSERT rather than an UPDATE on `flush`): >1. INFO - Matched route "adminimiser_home". >2. DEBUG - Remember-me cookie detected. >3. DEBUG - SELECT u0_.id AS id0, u0_.email AS email1, u0_.mobile AS mobile2, u0_.username AS username3, u0_.password AS password4, u0_.change_password AS change_password5, u0_.validated AS validated6, u0_.is_blocked AS is_blocked7, u0_.hash AS hash8, u0_.created AS created9, u0_.updated AS updated10, u0_.last_login AS last_login11, u0_.timezone AS timezone12, u0_.contact_id AS contact_id13 FROM `user` u0_ WHERE u0_.username = ? OR u0_.email = ? >4. DEBUG - SELECT t0.id AS id3, t0.full_name AS full_name4, t0.created AS created5, t0.updated AS updated6, t0.account_id AS account_id7, t0.type, t1.abn AS abn8, t2.title AS title9, t2.first_name AS first_name10, t2.middle_name AS middle_name11, t2.last_name AS last_name12, t2.gender AS gender13 FROM contact t0 LEFT JOIN contact_business t1 ON t0.id = t1.id LEFT JOIN contact_person t2 ON t0.id = t2.id WHERE t0.id = ? >5. INFO - Remember-me cookie accepted. >6. DEBUG - "START TRANSACTION" >7. DEBUG - INSERT INTO log (date_time, channel, level, ip_address, session_id, message, context) VALUES (?, ?, ?, ?, ?, ?, ?) >8. DEBUG - "COMMIT" >9. DEBUG - SELECT t0.id AS id1, t0.roles AS roles2, t0.is_active AS is_active3, t0.account_id AS account_id4, t0.user_id AS user_id5 FROM user_account t0 WHERE t0.user_id = ? >10. DEBUG - "START TRANSACTION" >11. DEBUG - INSERT INTO contact (full_name, created, updated, account_id, type) VALUES (?, ?, ?, ?, ?) >12. DEBUG - INSERT INTO contact_person (id, title, first_name, middle_name, last_name, gender) VALUES (?, ?, ?, ?, ?, ?) >13. DEBUG - INSERT INTO `user` (email, mobile, username, password, change_password, validated, is_blocked, hash, created, updated, last_login, timezone, contact_id) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?) >14. DEBUG - "ROLLBACK" >15. CRITICAL - Uncaught PHP Exception Doctrine\DBAL\DBALException: "An exception occurred while executing 'INSERT INTO `user` (email, mobile, username, password, change_password, validated, is_blocked, hash, created, updated, last_login, timezone, contact_id) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)' with params ["testuser@blah", null, null, "1MKVMPQp5ODniTDDt2PlGIlMGR9C1ZlLzYo\/Y\/2LMneA4yU3lVJ1oA==", 0, 1, 0, "c590db7b8cac19accae613f2ead63da1", "2016-01-25 04:21:40", "2016-01-25 04:21:40", "2016-01-26 00:06:40", null, 18]: SQLSTATE[23000]: Integrity constraint violation: 1062 Duplicate entry 'testuser@blah' for key 'UNIQ_8D93D649E7927C74'" at /var/veromo/vendor/doctrine/dbal/lib/Doctrine/DBAL/DBALException.php line 91 As you can see - the AUTHENTICATION is fine ... there's no issue there. I've tried everything - including re-associating the contact with the user before the `flush` - but it appears that **the association is lost after this point**. And again - only when the `RememberMeToken` comes into play.
True
remember_me authentication causes loss of entity associations? - This is a weird one. I've tested this with both the client cookie and doctrine provider and the outcome is the same. I've implemented "Remember Me" login functionality for our application. I also have an AuthenticationListener implemented which updates the 'User' entity with a 'lastLogin' DateTime: ```php public function onAuthenticationSuccess( AuthenticationEvent $event ) { $user = $event->getAuthenticationToken()->getUser(); if( $user instanceof \Veromo\Bundle\CoreBundle\Entity\User ) { $user->set( 'lastLogin', new \DateTime() ); $this->manager->flush(); } } ``` My 'User' Entity is associated with a 'Contact' Entity with a OneToOne Relationship which is cascaded. **NOW ...** When this code executes on an interactive login (user physically enters username and password), all is well - everything goes off without a hitch. When this code executes on a non-interactive login (user has selected 'Remember Me' has a valid cookie, etc ..), it all falls in a heap. It appears that when the `flush` command executes, Doctrine has 'forgotten' about the relationship that exists between the 'User' Entity and the 'Contact' Entity and attempts to re-create them (opting for an INSERT rather than an UPDATE on `flush`): >1. INFO - Matched route "adminimiser_home". >2. DEBUG - Remember-me cookie detected. >3. DEBUG - SELECT u0_.id AS id0, u0_.email AS email1, u0_.mobile AS mobile2, u0_.username AS username3, u0_.password AS password4, u0_.change_password AS change_password5, u0_.validated AS validated6, u0_.is_blocked AS is_blocked7, u0_.hash AS hash8, u0_.created AS created9, u0_.updated AS updated10, u0_.last_login AS last_login11, u0_.timezone AS timezone12, u0_.contact_id AS contact_id13 FROM `user` u0_ WHERE u0_.username = ? OR u0_.email = ? >4. DEBUG - SELECT t0.id AS id3, t0.full_name AS full_name4, t0.created AS created5, t0.updated AS updated6, t0.account_id AS account_id7, t0.type, t1.abn AS abn8, t2.title AS title9, t2.first_name AS first_name10, t2.middle_name AS middle_name11, t2.last_name AS last_name12, t2.gender AS gender13 FROM contact t0 LEFT JOIN contact_business t1 ON t0.id = t1.id LEFT JOIN contact_person t2 ON t0.id = t2.id WHERE t0.id = ? >5. INFO - Remember-me cookie accepted. >6. DEBUG - "START TRANSACTION" >7. DEBUG - INSERT INTO log (date_time, channel, level, ip_address, session_id, message, context) VALUES (?, ?, ?, ?, ?, ?, ?) >8. DEBUG - "COMMIT" >9. DEBUG - SELECT t0.id AS id1, t0.roles AS roles2, t0.is_active AS is_active3, t0.account_id AS account_id4, t0.user_id AS user_id5 FROM user_account t0 WHERE t0.user_id = ? >10. DEBUG - "START TRANSACTION" >11. DEBUG - INSERT INTO contact (full_name, created, updated, account_id, type) VALUES (?, ?, ?, ?, ?) >12. DEBUG - INSERT INTO contact_person (id, title, first_name, middle_name, last_name, gender) VALUES (?, ?, ?, ?, ?, ?) >13. DEBUG - INSERT INTO `user` (email, mobile, username, password, change_password, validated, is_blocked, hash, created, updated, last_login, timezone, contact_id) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?) >14. DEBUG - "ROLLBACK" >15. CRITICAL - Uncaught PHP Exception Doctrine\DBAL\DBALException: "An exception occurred while executing 'INSERT INTO `user` (email, mobile, username, password, change_password, validated, is_blocked, hash, created, updated, last_login, timezone, contact_id) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)' with params ["testuser@blah", null, null, "1MKVMPQp5ODniTDDt2PlGIlMGR9C1ZlLzYo\/Y\/2LMneA4yU3lVJ1oA==", 0, 1, 0, "c590db7b8cac19accae613f2ead63da1", "2016-01-25 04:21:40", "2016-01-25 04:21:40", "2016-01-26 00:06:40", null, 18]: SQLSTATE[23000]: Integrity constraint violation: 1062 Duplicate entry 'testuser@blah' for key 'UNIQ_8D93D649E7927C74'" at /var/veromo/vendor/doctrine/dbal/lib/Doctrine/DBAL/DBALException.php line 91 As you can see - the AUTHENTICATION is fine ... there's no issue there. I've tried everything - including re-associating the contact with the user before the `flush` - but it appears that **the association is lost after this point**. And again - only when the `RememberMeToken` comes into play.
non_usab
remember me authentication causes loss of entity associations this is a weird one i ve tested this with both the client cookie and doctrine provider and the outcome is the same i ve implemented remember me login functionality for our application i also have an authenticationlistener implemented which updates the user entity with a lastlogin datetime php public function onauthenticationsuccess authenticationevent event user event getauthenticationtoken getuser if user instanceof veromo bundle corebundle entity user user set lastlogin new datetime this manager flush my user entity is associated with a contact entity with a onetoone relationship which is cascaded now when this code executes on an interactive login user physically enters username and password all is well everything goes off without a hitch when this code executes on a non interactive login user has selected remember me has a valid cookie etc it all falls in a heap it appears that when the flush command executes doctrine has forgotten about the relationship that exists between the user entity and the contact entity and attempts to re create them opting for an insert rather than an update on flush info matched route adminimiser home debug remember me cookie detected debug select id as email as mobile as username as password as change password as change validated as is blocked as is hash as created as updated as last login as last timezone as contact id as contact from user where username or email debug select id as full name as full created as updated as account id as account type abn as title as first name as first middle name as middle last name as last gender as from contact left join contact business on id id left join contact person on id id where id info remember me cookie accepted debug start transaction debug insert into log date time channel level ip address session id message context values debug commit debug select id as roles as is active as is account id as account user id as user from user account where user id debug start transaction debug insert into contact full name created updated account id type values debug insert into contact person id title first name middle name last name gender values debug insert into user email mobile username password change password validated is blocked hash created updated last login timezone contact id values debug rollback critical uncaught php exception doctrine dbal dbalexception an exception occurred while executing insert into user email mobile username password change password validated is blocked hash created updated last login timezone contact id values with params sqlstate integrity constraint violation duplicate entry testuser blah for key uniq at var veromo vendor doctrine dbal lib doctrine dbal dbalexception php line as you can see the authentication is fine there s no issue there i ve tried everything including re associating the contact with the user before the flush but it appears that the association is lost after this point and again only when the remembermetoken comes into play
0
115,367
4,663,875,254
IssuesEvent
2016-10-05 10:50:40
liquidvote/liquid-ios
https://api.github.com/repos/liquidvote/liquid-ios
closed
View #xx of type RCTView has a shadow set but cannot calculate shadow efficiently.
bug low priority
![screen shot 2016-10-05 at 1 33 49 am](https://cloud.githubusercontent.com/assets/6340841/19106382/e5781204-8a9b-11e6-8bf3-893efce20a64.png) This is being caused by the buttons, because they have a transparent `backgroundColor` and a shadow.
1.0
View #xx of type RCTView has a shadow set but cannot calculate shadow efficiently. - ![screen shot 2016-10-05 at 1 33 49 am](https://cloud.githubusercontent.com/assets/6340841/19106382/e5781204-8a9b-11e6-8bf3-893efce20a64.png) This is being caused by the buttons, because they have a transparent `backgroundColor` and a shadow.
non_usab
view xx of type rctview has a shadow set but cannot calculate shadow efficiently this is being caused by the buttons because they have a transparent backgroundcolor and a shadow
0
9,379
6,277,913,940
IssuesEvent
2017-07-18 13:22:00
giantswarm/cli
https://api.github.com/repos/giantswarm/cli
closed
Alias `swarm rm` with `swarm delete`
1 - status/later area/usability kind/feature
@JosephSalisbury wants to save time and headaches by using a common shortcut (muscle memory) :) <!--- @huboard:{"order":514.0,"milestone_order":514,"custom_state":""} -->
True
Alias `swarm rm` with `swarm delete` - @JosephSalisbury wants to save time and headaches by using a common shortcut (muscle memory) :) <!--- @huboard:{"order":514.0,"milestone_order":514,"custom_state":""} -->
usab
alias swarm rm with swarm delete josephsalisbury wants to save time and headaches by using a common shortcut muscle memory huboard order milestone order custom state
1
361,298
10,706,969,239
IssuesEvent
2019-10-24 16:25:31
carbon-design-system/carbon
https://api.github.com/repos/carbon-design-system/carbon
closed
AVT 3 - React Select issues with VoiceOver on macOS and iOS
Severity 1 🚨 package: react priority: high type: a11y ♿
## Environment ~macOS Mojave version 10.14.5~ ~Chrome Version 75.0.3770.100 (Official Build) (64-bit)~ ~Carbon v10 - React~ ~Voice Over~ Also tested on iOS 12.3.1 with Safari and Voice Over ## Detailed Description For macOS: Start VoiceOver Navigate to the Select box, VO does not announce the text in the select box. Note: This works as expected in Windows 10 with Firefox. For iOS: Start VoiceOver Swipe right to navigate to the select box. VoiceOver announces "Choose an option pop-up button selected." as expected. Double tap to open the menu, VoiceOver announces, "Choose an option pop-up button selected." as expected. Swipe right again and nothing happens. Issue: Swipe right should navigate down the menu. In order to get focus on the list of options, the user must swipe left first before swiping right which is an unexpected behavior.
1.0
AVT 3 - React Select issues with VoiceOver on macOS and iOS - ## Environment ~macOS Mojave version 10.14.5~ ~Chrome Version 75.0.3770.100 (Official Build) (64-bit)~ ~Carbon v10 - React~ ~Voice Over~ Also tested on iOS 12.3.1 with Safari and Voice Over ## Detailed Description For macOS: Start VoiceOver Navigate to the Select box, VO does not announce the text in the select box. Note: This works as expected in Windows 10 with Firefox. For iOS: Start VoiceOver Swipe right to navigate to the select box. VoiceOver announces "Choose an option pop-up button selected." as expected. Double tap to open the menu, VoiceOver announces, "Choose an option pop-up button selected." as expected. Swipe right again and nothing happens. Issue: Swipe right should navigate down the menu. In order to get focus on the list of options, the user must swipe left first before swiping right which is an unexpected behavior.
non_usab
avt react select issues with voiceover on macos and ios environment macos mojave version chrome version official build bit carbon react voice over also tested on ios with safari and voice over detailed description for macos start voiceover navigate to the select box vo does not announce the text in the select box note this works as expected in windows with firefox for ios start voiceover swipe right to navigate to the select box voiceover announces choose an option pop up button selected as expected double tap to open the menu voiceover announces choose an option pop up button selected as expected swipe right again and nothing happens issue swipe right should navigate down the menu in order to get focus on the list of options the user must swipe left first before swiping right which is an unexpected behavior
0
7
2,491,078,390
IssuesEvent
2015-01-03 00:16:13
ewxrjk/rsbackup
https://api.github.com/repos/ewxrjk/rsbackup
closed
rsbackup should allow all valid DNS hostnames as host names
bug usability
I have a machine I'm backing up whose hostname happens to contain hyphens ("cam-vm-266"). I did the obvious thing and used the hostname as the 'HOST' part of the host stanza: root@e104462:~# cat /etc/rsbackup/hosts.d/cam-vm-266 host cam-vm-266 hostname cam-vm-266.mydomain.com volume root / exclude /tmp/* exclude /var/lib/schroot/mount/* and rsbackup complains: root@e104462:~# rsbackup --backup --dry-run ERROR: /etc/rsbackup/hosts.d/cam-vm-266:1: invalid host name Removing all the 'hyphens' from the "host" line placates it, but it would be nice if the allowed character sets lined up.
True
rsbackup should allow all valid DNS hostnames as host names - I have a machine I'm backing up whose hostname happens to contain hyphens ("cam-vm-266"). I did the obvious thing and used the hostname as the 'HOST' part of the host stanza: root@e104462:~# cat /etc/rsbackup/hosts.d/cam-vm-266 host cam-vm-266 hostname cam-vm-266.mydomain.com volume root / exclude /tmp/* exclude /var/lib/schroot/mount/* and rsbackup complains: root@e104462:~# rsbackup --backup --dry-run ERROR: /etc/rsbackup/hosts.d/cam-vm-266:1: invalid host name Removing all the 'hyphens' from the "host" line placates it, but it would be nice if the allowed character sets lined up.
usab
rsbackup should allow all valid dns hostnames as host names i have a machine i m backing up whose hostname happens to contain hyphens cam vm i did the obvious thing and used the hostname as the host part of the host stanza root cat etc rsbackup hosts d cam vm host cam vm hostname cam vm mydomain com volume root exclude tmp exclude var lib schroot mount and rsbackup complains root rsbackup backup dry run error etc rsbackup hosts d cam vm invalid host name removing all the hyphens from the host line placates it but it would be nice if the allowed character sets lined up
1
6,566
4,346,747,661
IssuesEvent
2016-07-29 17:03:20
bocoup/skillsbot
https://api.github.com/repos/bocoup/skillsbot
closed
Rename “find” command to “skill” and test
usability
(eg. “skill build workflows” to see all users’ interest/experience for that skill)
True
Rename “find” command to “skill” and test - (eg. “skill build workflows” to see all users’ interest/experience for that skill)
usab
rename “find” command to “skill” and test eg “skill build workflows” to see all users’ interest experience for that skill
1
15,668
9,592,262,329
IssuesEvent
2019-05-09 08:30:13
alpersonalwebsite/decoupled-cloud-mirror-sec
https://api.github.com/repos/alpersonalwebsite/decoupled-cloud-mirror-sec
opened
CVE-2019-10742 (Medium) detected in axios-0.18.0.tgz
security vulnerability
## CVE-2019-10742 - Medium Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axios-0.18.0.tgz</b></p></summary> <p>Promise based HTTP client for the browser and node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/axios/-/axios-0.18.0.tgz">https://registry.npmjs.org/axios/-/axios-0.18.0.tgz</a></p> <p>Path to dependency file: /decoupled-cloud-mirror-sec/package.json</p> <p>Path to vulnerable library: /decoupled-cloud-mirror-sec/node_modules/axios/package.json</p> <p> Dependency Hierarchy: - :x: **axios-0.18.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/alpersonalwebsite/decoupled-cloud-mirror-sec/commit/15a74b93b5e98c8c97ac16a395ea62fa211d2cd0">15a74b93b5e98c8c97ac16a395ea62fa211d2cd0</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Axios up to and including 0.18.0 allows attackers to cause a denial of service (application crash) by continuing to accepting content after maxContentLength is exceeded. <p>Publish Date: 2019-05-07 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10742>CVE-2019-10742</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-10742 (Medium) detected in axios-0.18.0.tgz - ## CVE-2019-10742 - Medium Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axios-0.18.0.tgz</b></p></summary> <p>Promise based HTTP client for the browser and node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/axios/-/axios-0.18.0.tgz">https://registry.npmjs.org/axios/-/axios-0.18.0.tgz</a></p> <p>Path to dependency file: /decoupled-cloud-mirror-sec/package.json</p> <p>Path to vulnerable library: /decoupled-cloud-mirror-sec/node_modules/axios/package.json</p> <p> Dependency Hierarchy: - :x: **axios-0.18.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/alpersonalwebsite/decoupled-cloud-mirror-sec/commit/15a74b93b5e98c8c97ac16a395ea62fa211d2cd0">15a74b93b5e98c8c97ac16a395ea62fa211d2cd0</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Axios up to and including 0.18.0 allows attackers to cause a denial of service (application crash) by continuing to accepting content after maxContentLength is exceeded. <p>Publish Date: 2019-05-07 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10742>CVE-2019-10742</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve medium detected in axios tgz cve medium severity vulnerability vulnerable library axios tgz promise based http client for the browser and node js library home page a href path to dependency file decoupled cloud mirror sec package json path to vulnerable library decoupled cloud mirror sec node modules axios package json dependency hierarchy x axios tgz vulnerable library found in head commit a href vulnerability details axios up to and including allows attackers to cause a denial of service application crash by continuing to accepting content after maxcontentlength is exceeded publish date url a href cvss score details base score metrics not available step up your open source security game with whitesource
0
1,709
2,966,622,709
IssuesEvent
2015-07-12 02:41:11
Elgg/Elgg
https://api.github.com/repos/Elgg/Elgg
opened
Replace tag-based Group search with "Search for groups"
usability
Why can't I search a name? Why would know tags on groups? It should just use the regular search endpoint limited to group results.
True
Replace tag-based Group search with "Search for groups" - Why can't I search a name? Why would know tags on groups? It should just use the regular search endpoint limited to group results.
usab
replace tag based group search with search for groups why can t i search a name why would know tags on groups it should just use the regular search endpoint limited to group results
1
18,623
13,105,208,179
IssuesEvent
2020-08-04 11:45:44
pragmatrix/tnt
https://api.github.com/repos/pragmatrix/tnt
opened
tnt translate does not support -l
bug usability
If `tnt translate` is run without any target languages, it suggests to use command line option `-l`, which is not supported. ``` $ tnt translate No languages selected, use -l or --all to select one or more languages. $ tnt translate -l de ERROR(S): Option 'l' is unknown. --all Translate new strings of all languages. --help Display this help screen. --version Display version information. value pos. 0 The language(s) to translate new strings to, use --all to translate all languages. ```
True
tnt translate does not support -l - If `tnt translate` is run without any target languages, it suggests to use command line option `-l`, which is not supported. ``` $ tnt translate No languages selected, use -l or --all to select one or more languages. $ tnt translate -l de ERROR(S): Option 'l' is unknown. --all Translate new strings of all languages. --help Display this help screen. --version Display version information. value pos. 0 The language(s) to translate new strings to, use --all to translate all languages. ```
usab
tnt translate does not support l if tnt translate is run without any target languages it suggests to use command line option l which is not supported tnt translate no languages selected use l or all to select one or more languages tnt translate l de error s option l is unknown all translate new strings of all languages help display this help screen version display version information value pos the language s to translate new strings to use all to translate all languages
1
124,445
26,458,966,564
IssuesEvent
2023-01-16 16:02:27
smartcontractkit/full-blockchain-solidity-course-js
https://api.github.com/repos/smartcontractkit/full-blockchain-solidity-course-js
closed
Course repo returning TypeError
code-bug
### Lesson Lesson 17 ### Could you please leave a link to the timestamp in the video where this error occurs? (You can right click a video and "copy video URL at current time") _No response_ ### Operating System Windows ### Describe the bug Everything is in this discussion created after 4 requests for help in the discussions section of the course without 1 single response from the team or other devs https://github.com/smartcontractkit/full-blockchain-solidity-course-js/discussions/4523#discussion-4761860
1.0
Course repo returning TypeError - ### Lesson Lesson 17 ### Could you please leave a link to the timestamp in the video where this error occurs? (You can right click a video and "copy video URL at current time") _No response_ ### Operating System Windows ### Describe the bug Everything is in this discussion created after 4 requests for help in the discussions section of the course without 1 single response from the team or other devs https://github.com/smartcontractkit/full-blockchain-solidity-course-js/discussions/4523#discussion-4761860
non_usab
course repo returning typeerror lesson lesson could you please leave a link to the timestamp in the video where this error occurs you can right click a video and copy video url at current time no response operating system windows describe the bug everything is in this discussion created after requests for help in the discussions section of the course without single response from the team or other devs
0
8,539
5,806,878,963
IssuesEvent
2017-05-04 05:20:00
bwsw/cloudstack-ui
https://api.github.com/repos/bwsw/cloudstack-ui
closed
Customize calendar control to support two types of weeks Sunday - Saturday or Monday - Sunday
enhancement localization usability
Actually there are two types of them as specified in the title. We have to add to the settings the chooser which allows to switch the user between them.
True
Customize calendar control to support two types of weeks Sunday - Saturday or Monday - Sunday - Actually there are two types of them as specified in the title. We have to add to the settings the chooser which allows to switch the user between them.
usab
customize calendar control to support two types of weeks sunday saturday or monday sunday actually there are two types of them as specified in the title we have to add to the settings the chooser which allows to switch the user between them
1
286,715
31,758,243,950
IssuesEvent
2023-09-12 01:35:47
samq-wsdemo/intentionally-vulnerable-golang-project
https://api.github.com/repos/samq-wsdemo/intentionally-vulnerable-golang-project
reopened
CVE-2018-14042 (Medium) detected in github.com/gophish/gophish-v0.1.2
Mend: dependency security vulnerability
## CVE-2018-14042 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/gophish/gophish-v0.1.2</b></p></summary> <p>Open-Source Phishing Toolkit</p> <p>Library home page: <a href="https://proxy.golang.org/github.com/gophish/gophish/@v/v0.1.2.zip">https://proxy.golang.org/github.com/gophish/gophish/@v/v0.1.2.zip</a></p> <p> Dependency Hierarchy: - :x: **github.com/gophish/gophish-v0.1.2** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-wsdemo/intentionally-vulnerable-golang-project/commit/fad3f37965fe63942d2c0f558471e8bd3166eb21">fad3f37965fe63942d2c0f558471e8bd3166eb21</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. <p>Publish Date: 2018-07-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-14042>CVE-2018-14042</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2018-07-13</p> <p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0</p> </p> </details> <p></p>
True
CVE-2018-14042 (Medium) detected in github.com/gophish/gophish-v0.1.2 - ## CVE-2018-14042 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/gophish/gophish-v0.1.2</b></p></summary> <p>Open-Source Phishing Toolkit</p> <p>Library home page: <a href="https://proxy.golang.org/github.com/gophish/gophish/@v/v0.1.2.zip">https://proxy.golang.org/github.com/gophish/gophish/@v/v0.1.2.zip</a></p> <p> Dependency Hierarchy: - :x: **github.com/gophish/gophish-v0.1.2** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-wsdemo/intentionally-vulnerable-golang-project/commit/fad3f37965fe63942d2c0f558471e8bd3166eb21">fad3f37965fe63942d2c0f558471e8bd3166eb21</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. <p>Publish Date: 2018-07-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-14042>CVE-2018-14042</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2018-07-13</p> <p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0</p> </p> </details> <p></p>
non_usab
cve medium detected in github com gophish gophish cve medium severity vulnerability vulnerable library github com gophish gophish open source phishing toolkit library home page a href dependency hierarchy x github com gophish gophish vulnerable library found in head commit a href found in base branch master vulnerability details in bootstrap before xss is possible in the data container property of tooltip publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution org webjars npm bootstrap org webjars bootstrap
0
8,638
5,893,222,061
IssuesEvent
2017-05-17 21:23:29
coreos/bugs
https://api.github.com/repos/coreos/bugs
closed
"coreos-install" does not work on VMWare vSphere
area/usability component/other kind/question team/os
Hi all, I use the VMWare OVA image installation for CoreOS : https://stable.release.core-os.net/amd64-usr/current/coreos_production_vmware_ova.ova When the VM is up (network and dns was configured well), I issued the command : sudo coreos-install -d /dev/sda -C stable -c cloud_config.yml then got the error Image URL unavailable, because "coreos-install" fetch the URL "https://stable.release.core-os.net/amd64-usr/1122.2.0/coreos_production_vmware_image.bin.bz2" but it's not available. So how can fix this issue ? Thanks Best Regards,
True
"coreos-install" does not work on VMWare vSphere - Hi all, I use the VMWare OVA image installation for CoreOS : https://stable.release.core-os.net/amd64-usr/current/coreos_production_vmware_ova.ova When the VM is up (network and dns was configured well), I issued the command : sudo coreos-install -d /dev/sda -C stable -c cloud_config.yml then got the error Image URL unavailable, because "coreos-install" fetch the URL "https://stable.release.core-os.net/amd64-usr/1122.2.0/coreos_production_vmware_image.bin.bz2" but it's not available. So how can fix this issue ? Thanks Best Regards,
usab
coreos install does not work on vmware vsphere hi all i use the vmware ova image installation for coreos when the vm is up network and dns was configured well i issued the command sudo coreos install d dev sda c stable c cloud config yml then got the error image url unavailable because coreos install fetch the url but it s not available so how can fix this issue thanks best regards
1
342,775
10,321,579,776
IssuesEvent
2019-08-31 03:27:54
Azure/mmlspark
https://api.github.com/repos/Azure/mmlspark
closed
Probability values still incorrect when requesting raw and probability columns
LightGBM bug high priority
**Describe the bug** There is a caching bug in the new native code which causes the probability values to be calculated as raw when requesting both columns to be computed. **To Reproduce** Print out the results of lightgbm model, see that the probabilities are invalid, eg not between 0 and 1 **Expected behavior** Probabilities should correspond to output label and raw predictions transformed from log odds. **Info (please complete the following information):** - MMLSpark Version: v0.18.1 - Spark Version Any - Spark Platform Any ``` Please post the stacktrace here if applicable ``` If the bug pertains to a specific feature please tag the appropriate [CODEOWNER](https://github.com/Azure/mmlspark/blob/master/CODEOWNERS) for better visibility **Additional context** See lightgbm PR here: https://github.com/microsoft/LightGBM/pull/2356 a new maven dependency will need to be published once it is in. See related issue, but fixed in correct way as long as user only asks for one column: https://github.com/Azure/mmlspark/issues/568
1.0
Probability values still incorrect when requesting raw and probability columns - **Describe the bug** There is a caching bug in the new native code which causes the probability values to be calculated as raw when requesting both columns to be computed. **To Reproduce** Print out the results of lightgbm model, see that the probabilities are invalid, eg not between 0 and 1 **Expected behavior** Probabilities should correspond to output label and raw predictions transformed from log odds. **Info (please complete the following information):** - MMLSpark Version: v0.18.1 - Spark Version Any - Spark Platform Any ``` Please post the stacktrace here if applicable ``` If the bug pertains to a specific feature please tag the appropriate [CODEOWNER](https://github.com/Azure/mmlspark/blob/master/CODEOWNERS) for better visibility **Additional context** See lightgbm PR here: https://github.com/microsoft/LightGBM/pull/2356 a new maven dependency will need to be published once it is in. See related issue, but fixed in correct way as long as user only asks for one column: https://github.com/Azure/mmlspark/issues/568
non_usab
probability values still incorrect when requesting raw and probability columns describe the bug there is a caching bug in the new native code which causes the probability values to be calculated as raw when requesting both columns to be computed to reproduce print out the results of lightgbm model see that the probabilities are invalid eg not between and expected behavior probabilities should correspond to output label and raw predictions transformed from log odds info please complete the following information mmlspark version spark version any spark platform any please post the stacktrace here if applicable if the bug pertains to a specific feature please tag the appropriate for better visibility additional context see lightgbm pr here a new maven dependency will need to be published once it is in see related issue but fixed in correct way as long as user only asks for one column
0
11,393
7,197,688,694
IssuesEvent
2018-02-05 10:02:06
Yakindu/statecharts
https://api.github.com/repos/Yakindu/statecharts
closed
SCTUnit: Context menu operations are missing in the main menu
Comp-Graphical Editor Comp-UI is-Usability-Issue
In the SCTUnit editor, many operations are available in the context menu, e.g., to rename a test class. However, these operations are missing in the main menu.
True
SCTUnit: Context menu operations are missing in the main menu - In the SCTUnit editor, many operations are available in the context menu, e.g., to rename a test class. However, these operations are missing in the main menu.
usab
sctunit context menu operations are missing in the main menu in the sctunit editor many operations are available in the context menu e g to rename a test class however these operations are missing in the main menu
1
13,646
8,632,097,915
IssuesEvent
2018-11-22 09:50:59
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Changing the tooltip delay in project settings affects the editor
bug topic:core topic:editor usability
**Operating system or device - Godot version:** Windows 10 64bit - Godot 2.1.3 and Godot 3.0 **Issue description:** Changing the tooltip delay in project settings will affect the editor's tooltips (after closing the project and reopening it). It should only affect the tooltips in-game. **Steps to reproduce:** Open any project, go to project settings and set tooltip delay to 0, then close the project and reopen it. Now all tooltips in the editor appear instantly.
True
Changing the tooltip delay in project settings affects the editor - **Operating system or device - Godot version:** Windows 10 64bit - Godot 2.1.3 and Godot 3.0 **Issue description:** Changing the tooltip delay in project settings will affect the editor's tooltips (after closing the project and reopening it). It should only affect the tooltips in-game. **Steps to reproduce:** Open any project, go to project settings and set tooltip delay to 0, then close the project and reopen it. Now all tooltips in the editor appear instantly.
usab
changing the tooltip delay in project settings affects the editor operating system or device godot version windows godot and godot issue description changing the tooltip delay in project settings will affect the editor s tooltips after closing the project and reopening it it should only affect the tooltips in game steps to reproduce open any project go to project settings and set tooltip delay to then close the project and reopen it now all tooltips in the editor appear instantly
1
6,984
4,713,887,546
IssuesEvent
2016-10-14 21:41:05
postmanlabs/postman-app-support
https://api.github.com/repos/postmanlabs/postman-app-support
closed
When viewing an authorization token, content overflows its panel.
pending-close Usability
<!-- Welcome to the Postman Issue tracker. Any feature requests / bug reports can be posted here. Any security-related bugs should be reported directly to security@getpostman.com Version/App Information: --> 1. Postman Version: 4.4.2 2. App: Mac & Chrome 3. OS details: OS X 10.11.2 4. Is the Interceptor on and enabled in the app: No 5. Did you encounter this recently, or has this bug always been there: Always 6. Expected behaviour: Should be able to resize panel or to scroll. 7. Console logs: 8. Screenshots ![screen shot 2016-07-17 at 2 02 47 pm](https://cloud.githubusercontent.com/assets/13706254/16898306/ba56ae9e-4c27-11e6-9167-91e7e4c5254e.png) ![screen shot 2016-07-17 at 1 54 17 pm](https://cloud.githubusercontent.com/assets/13706254/16898308/d015abc2-4c27-11e6-8a1f-b432c9eda56f.png) I've encountered an issue when requesting an authorization token. If more information is received in the token than the panel is sized for then the overflow is simply hidden from view. See screenshots: I need to be able to copy the entirety ID Token to use it as a header, and double clicking the text doesn't highlight the entire block. In the Chrome App I am able to copy it because the overflow seems to flow over the top of the response panel rather than underneath, but this is still less than ideal. Great app on the whole, makes testing my API a breeze thank you :) <!-- Some guidelines: 1. Please file Newman-related issues at https://github.com/postmanlabs/newman/issues 2. If it’s a Cloud-related issue, or you want to include personal information like your username / collection names, mail us at help@getpostman.com 3. If it’s a question (anything along the lines of “How do I … in Postman”), the answer might lie in our documentation - http://getpostman.com/docs. -->
True
When viewing an authorization token, content overflows its panel. - <!-- Welcome to the Postman Issue tracker. Any feature requests / bug reports can be posted here. Any security-related bugs should be reported directly to security@getpostman.com Version/App Information: --> 1. Postman Version: 4.4.2 2. App: Mac & Chrome 3. OS details: OS X 10.11.2 4. Is the Interceptor on and enabled in the app: No 5. Did you encounter this recently, or has this bug always been there: Always 6. Expected behaviour: Should be able to resize panel or to scroll. 7. Console logs: 8. Screenshots ![screen shot 2016-07-17 at 2 02 47 pm](https://cloud.githubusercontent.com/assets/13706254/16898306/ba56ae9e-4c27-11e6-9167-91e7e4c5254e.png) ![screen shot 2016-07-17 at 1 54 17 pm](https://cloud.githubusercontent.com/assets/13706254/16898308/d015abc2-4c27-11e6-8a1f-b432c9eda56f.png) I've encountered an issue when requesting an authorization token. If more information is received in the token than the panel is sized for then the overflow is simply hidden from view. See screenshots: I need to be able to copy the entirety ID Token to use it as a header, and double clicking the text doesn't highlight the entire block. In the Chrome App I am able to copy it because the overflow seems to flow over the top of the response panel rather than underneath, but this is still less than ideal. Great app on the whole, makes testing my API a breeze thank you :) <!-- Some guidelines: 1. Please file Newman-related issues at https://github.com/postmanlabs/newman/issues 2. If it’s a Cloud-related issue, or you want to include personal information like your username / collection names, mail us at help@getpostman.com 3. If it’s a question (anything along the lines of “How do I … in Postman”), the answer might lie in our documentation - http://getpostman.com/docs. -->
usab
when viewing an authorization token content overflows its panel welcome to the postman issue tracker any feature requests bug reports can be posted here any security related bugs should be reported directly to security getpostman com version app information postman version app mac chrome os details os x is the interceptor on and enabled in the app no did you encounter this recently or has this bug always been there always expected behaviour should be able to resize panel or to scroll console logs screenshots i ve encountered an issue when requesting an authorization token if more information is received in the token than the panel is sized for then the overflow is simply hidden from view see screenshots i need to be able to copy the entirety id token to use it as a header and double clicking the text doesn t highlight the entire block in the chrome app i am able to copy it because the overflow seems to flow over the top of the response panel rather than underneath but this is still less than ideal great app on the whole makes testing my api a breeze thank you some guidelines please file newman related issues at if it’s a cloud related issue or you want to include personal information like your username collection names mail us at help getpostman com if it’s a question anything along the lines of “how do i … in postman” the answer might lie in our documentation
1
275,073
23,892,941,783
IssuesEvent
2022-09-08 12:53:52
ctc-oss/omega-edit
https://api.github.com/repos/ctc-oss/omega-edit
closed
TypeScript client test to manage RPC server
enhancement testing CI client javascript
For reference, `server_test.cpp` can optionally startup the C++ RPC server when it starts up, then shutdown the server when it's done. Currently the TS client relies on the server to already be up and listening when it comes up. This issue is to enhance the TS client so that it can manage the lifetime of the RPC server (bringing it up and down as appropriate on a configurable port or Unix domain socket). Ideally the choice of RPC server (e.g., the C++ reference server or the Scala production server) should also be configurable. This Enhancement will streamline integrations and CI testing.
1.0
TypeScript client test to manage RPC server - For reference, `server_test.cpp` can optionally startup the C++ RPC server when it starts up, then shutdown the server when it's done. Currently the TS client relies on the server to already be up and listening when it comes up. This issue is to enhance the TS client so that it can manage the lifetime of the RPC server (bringing it up and down as appropriate on a configurable port or Unix domain socket). Ideally the choice of RPC server (e.g., the C++ reference server or the Scala production server) should also be configurable. This Enhancement will streamline integrations and CI testing.
non_usab
typescript client test to manage rpc server for reference server test cpp can optionally startup the c rpc server when it starts up then shutdown the server when it s done currently the ts client relies on the server to already be up and listening when it comes up this issue is to enhance the ts client so that it can manage the lifetime of the rpc server bringing it up and down as appropriate on a configurable port or unix domain socket ideally the choice of rpc server e g the c reference server or the scala production server should also be configurable this enhancement will streamline integrations and ci testing
0
17,747
12,304,052,036
IssuesEvent
2020-05-11 19:48:11
ONRR/nrrd
https://api.github.com/repos/ONRR/nrrd
closed
Split out the + icon for adding nationwide and Native American cards into two buttons
Explore Data P2: High enhancement usability
Something like this. Users haven't been noticing the plus sign and don't know to go there to get the nationwide card. We should make this change both up on the map and down below in the search area. ![image.png](https://images.zenhubusercontent.com/5c589fe5e180620812ea22aa/13f58507-f10c-4d33-92c0-b8437b504fe5)
True
Split out the + icon for adding nationwide and Native American cards into two buttons - Something like this. Users haven't been noticing the plus sign and don't know to go there to get the nationwide card. We should make this change both up on the map and down below in the search area. ![image.png](https://images.zenhubusercontent.com/5c589fe5e180620812ea22aa/13f58507-f10c-4d33-92c0-b8437b504fe5)
usab
split out the icon for adding nationwide and native american cards into two buttons something like this users haven t been noticing the plus sign and don t know to go there to get the nationwide card we should make this change both up on the map and down below in the search area
1
127,220
27,008,045,776
IssuesEvent
2023-02-10 13:19:15
vadimcn/vscode-lldb
https://api.github.com/repos/vadimcn/vscode-lldb
closed
vs-code URL does not open debugging session if URL is opened from inside VSCode
cause:VSCode
OS: macOS, remotely connected to Ubuntu 22.04 VSCode version: Version: 1.70.2; Commit: e4503b30fc78200f846c62cf8091b76ff5547662; Date: 2022-08-16T05:36:37.829Z CodeLLDB version: v1.7.4 Compiler: not relevant Debuggee: not relevant **Context** I want to use vscode-URLs to directly drop into a debugging session. My script can be found at https://gist.github.com/vogelsgesang/d803377b8b143164961e08e58f5186c0 **Expected behavior** When cmd-clicking this link from inside VSCode, I would expect to be dropped into the debugging session <img width="1287" alt="Screenshot 2022-08-22 at 10 25 59" src="https://user-images.githubusercontent.com/6820896/185875277-3f40bd9a-ccdc-4ac5-8a66-d7a07bd137c9.png"> **Actual behavior** Instead, the link gets opened in VS Code's search bar <img width="904" alt="Screenshot 2022-08-22 at 10 27 17" src="https://user-images.githubusercontent.com/6820896/185875587-cd4839e3-cf70-45ef-a3c4-977a237847c6.png"> **Additional information** I am sure the link itself is fine, because when I copy it from the console and paste it into Chrome's address bar, then VSCode opens my debugging session as expected.
1.0
vs-code URL does not open debugging session if URL is opened from inside VSCode - OS: macOS, remotely connected to Ubuntu 22.04 VSCode version: Version: 1.70.2; Commit: e4503b30fc78200f846c62cf8091b76ff5547662; Date: 2022-08-16T05:36:37.829Z CodeLLDB version: v1.7.4 Compiler: not relevant Debuggee: not relevant **Context** I want to use vscode-URLs to directly drop into a debugging session. My script can be found at https://gist.github.com/vogelsgesang/d803377b8b143164961e08e58f5186c0 **Expected behavior** When cmd-clicking this link from inside VSCode, I would expect to be dropped into the debugging session <img width="1287" alt="Screenshot 2022-08-22 at 10 25 59" src="https://user-images.githubusercontent.com/6820896/185875277-3f40bd9a-ccdc-4ac5-8a66-d7a07bd137c9.png"> **Actual behavior** Instead, the link gets opened in VS Code's search bar <img width="904" alt="Screenshot 2022-08-22 at 10 27 17" src="https://user-images.githubusercontent.com/6820896/185875587-cd4839e3-cf70-45ef-a3c4-977a237847c6.png"> **Additional information** I am sure the link itself is fine, because when I copy it from the console and paste it into Chrome's address bar, then VSCode opens my debugging session as expected.
non_usab
vs code url does not open debugging session if url is opened from inside vscode os macos remotely connected to ubuntu vscode version version commit date codelldb version compiler not relevant debuggee not relevant context i want to use vscode urls to directly drop into a debugging session my script can be found at expected behavior when cmd clicking this link from inside vscode i would expect to be dropped into the debugging session img width alt screenshot at src actual behavior instead the link gets opened in vs code s search bar img width alt screenshot at src additional information i am sure the link itself is fine because when i copy it from the console and paste it into chrome s address bar then vscode opens my debugging session as expected
0
11,484
7,261,046,093
IssuesEvent
2018-02-18 16:52:54
spyder-ide/spyder
https://api.github.com/repos/spyder-ide/spyder
closed
Switch to internal console on the first error
1 star component:Main Window tag:Ux-usability type:Enhancement
_From [techtonik@gmail.com](https://code.google.com/u/techtonik@gmail.com/) on 2011-12-29T12:42:47Z_ When there is an internal error in Spyder on startup or at run-time, the errors may easily pass unnoticed. What is the expected output? What do you see instead? It would be helpful if Spyder: 1. Automatically brought "Internal Console" to the foreground if there were any errors during startup 2. Make "Internal Console" active (or show a flag) when a new error arises at run-time _Original issue: http://code.google.com/p/spyderlib/issues/detail?id=899_
True
Switch to internal console on the first error - _From [techtonik@gmail.com](https://code.google.com/u/techtonik@gmail.com/) on 2011-12-29T12:42:47Z_ When there is an internal error in Spyder on startup or at run-time, the errors may easily pass unnoticed. What is the expected output? What do you see instead? It would be helpful if Spyder: 1. Automatically brought "Internal Console" to the foreground if there were any errors during startup 2. Make "Internal Console" active (or show a flag) when a new error arises at run-time _Original issue: http://code.google.com/p/spyderlib/issues/detail?id=899_
usab
switch to internal console on the first error from on when there is an internal error in spyder on startup or at run time the errors may easily pass unnoticed what is the expected output what do you see instead it would be helpful if spyder automatically brought internal console to the foreground if there were any errors during startup make internal console active or show a flag when a new error arises at run time original issue
1
6,002
4,111,551,489
IssuesEvent
2016-06-07 06:49:59
Virtual-Labs/image-processing-iiith
https://api.github.com/repos/Virtual-Labs/image-processing-iiith
closed
QA_Point Operations_Usability_smk
Category: Usability Developed By: VLEAD Differed Release Number: 1.0 Severity: S2
Defect Description : In the landing page/home page of "Point Operations" experiment, the name of the experiment is not present in the screen instead the experiment name should be displayed on the screen at the top of the header options Actual Result : In the landing page/home page of "Point Operations" experiment, the name of the experiment is not present in the screen Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 Test Step Link: https://github.com/Virtual-Labs/image-processing-iiith/blob/master/test-cases/integration_test-cases/Point%20Operations/Point%20Operations_01_Usability_smk.org Attachment: ![ip13](https://cloud.githubusercontent.com/assets/14869397/14632891/a5814090-0638-11e6-8b2a-e5803a9fa208.png)
True
QA_Point Operations_Usability_smk - Defect Description : In the landing page/home page of "Point Operations" experiment, the name of the experiment is not present in the screen instead the experiment name should be displayed on the screen at the top of the header options Actual Result : In the landing page/home page of "Point Operations" experiment, the name of the experiment is not present in the screen Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 Test Step Link: https://github.com/Virtual-Labs/image-processing-iiith/blob/master/test-cases/integration_test-cases/Point%20Operations/Point%20Operations_01_Usability_smk.org Attachment: ![ip13](https://cloud.githubusercontent.com/assets/14869397/14632891/a5814090-0638-11e6-8b2a-e5803a9fa208.png)
usab
qa point operations usability smk defect description in the landing page home page of point operations experiment the name of the experiment is not present in the screen instead the experiment name should be displayed on the screen at the top of the header options actual result in the landing page home page of point operations experiment the name of the experiment is not present in the screen environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor test step link attachment
1
9,893
6,497,141,166
IssuesEvent
2017-08-22 13:01:51
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Enter Key does not save Property values in Inspector
bug platform:osx topic:editor usability
**Operating system or device - Godot version:** MacOS 10.12.6 Godot 2.1.3.stable.official **Issue description:** <!-- What happened, and what was expected. --> When editing values in the Inspector, pressing the Enter key (on the number pad) does not save the edited value. Pressing the Enter key should save the new property value the same way as using the Return key. **Steps to reproduce:** Alter a property value in the Inspector and press the Enter key on the Number pad. Given that most properties are numeric, anyone with a full NumPad keyboard will encounter this issue almost immediately. **Link to minimal example project:** <!-- Optional but very welcome. You can drag and drop a zip archive to upload it. -->
True
Enter Key does not save Property values in Inspector - **Operating system or device - Godot version:** MacOS 10.12.6 Godot 2.1.3.stable.official **Issue description:** <!-- What happened, and what was expected. --> When editing values in the Inspector, pressing the Enter key (on the number pad) does not save the edited value. Pressing the Enter key should save the new property value the same way as using the Return key. **Steps to reproduce:** Alter a property value in the Inspector and press the Enter key on the Number pad. Given that most properties are numeric, anyone with a full NumPad keyboard will encounter this issue almost immediately. **Link to minimal example project:** <!-- Optional but very welcome. You can drag and drop a zip archive to upload it. -->
usab
enter key does not save property values in inspector operating system or device godot version macos godot stable official issue description when editing values in the inspector pressing the enter key on the number pad does not save the edited value pressing the enter key should save the new property value the same way as using the return key steps to reproduce alter a property value in the inspector and press the enter key on the number pad given that most properties are numeric anyone with a full numpad keyboard will encounter this issue almost immediately link to minimal example project
1
181,290
21,658,611,027
IssuesEvent
2022-05-06 16:34:35
samq-ghdemo/Forrester-Demo
https://api.github.com/repos/samq-ghdemo/Forrester-Demo
opened
CVE-2022-29167 (High) detected in hawk-3.1.3.tgz
security vulnerability
## CVE-2022-29167 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hawk-3.1.3.tgz</b></p></summary> <p>HTTP Hawk Authentication Scheme</p> <p>Library home page: <a href="https://registry.npmjs.org/hawk/-/hawk-3.1.3.tgz">https://registry.npmjs.org/hawk/-/hawk-3.1.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/hawk/package.json,/node_modules/npm/node_modules/request/node_modules/hawk/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - :x: **hawk-3.1.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/Forrester-Demo/commit/6dbbe934cae073a84faceb086571b79fdcfc079c">6dbbe934cae073a84faceb086571b79fdcfc079c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`. <p>Publish Date: 2022-05-05 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-29167>CVE-2022-29167</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq">https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq</a></p> <p>Release Date: 2022-05-05</p> <p>Fix Resolution: hawk - 9.0.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"hawk","packageVersion":"3.1.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;hawk:3.1.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"hawk - 9.0.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-29167","vulnerabilityDetails":"Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker\u0027s input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-29167","cvss3Severity":"high","cvss3Score":"7.4","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Changed","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2022-29167 (High) detected in hawk-3.1.3.tgz - ## CVE-2022-29167 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hawk-3.1.3.tgz</b></p></summary> <p>HTTP Hawk Authentication Scheme</p> <p>Library home page: <a href="https://registry.npmjs.org/hawk/-/hawk-3.1.3.tgz">https://registry.npmjs.org/hawk/-/hawk-3.1.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/hawk/package.json,/node_modules/npm/node_modules/request/node_modules/hawk/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - npm-3.10.10.tgz - request-2.75.0.tgz - :x: **hawk-3.1.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/Forrester-Demo/commit/6dbbe934cae073a84faceb086571b79fdcfc079c">6dbbe934cae073a84faceb086571b79fdcfc079c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`. <p>Publish Date: 2022-05-05 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-29167>CVE-2022-29167</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq">https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq</a></p> <p>Release Date: 2022-05-05</p> <p>Fix Resolution: hawk - 9.0.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"hawk","packageVersion":"3.1.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;hawk:3.1.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"hawk - 9.0.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-29167","vulnerabilityDetails":"Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker\u0027s input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-29167","cvss3Severity":"high","cvss3Score":"7.4","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Changed","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_usab
cve high detected in hawk tgz cve high severity vulnerability vulnerable library hawk tgz http hawk authentication scheme library home page a href path to dependency file package json path to vulnerable library node modules hawk package json node modules npm node modules request node modules hawk package json dependency hierarchy grunt npm install tgz root library npm tgz request tgz x hawk tgz vulnerable library found in head commit a href found in base branch master vulnerability details hawk is an http authentication scheme providing mechanisms for making authenticated http requests with partial cryptographic verification of the request and response covering the http method request uri host and optionally the request payload hawk used a regular expression to parse host http header hawk utils parsehost which was subject to regular expression dos attack meaning each added character in the attacker s input increases the computation time exponentially parsehost was patched in to use built in url class to parse hostname instead hawk authenticate accepts options argument if that contains host and port those would be used instead of a call to utils parsehost publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution hawk isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree grunt npm install npm request hawk isminimumfixversionavailable true minimumfixversion hawk isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails hawk is an http authentication scheme providing mechanisms for making authenticated http requests with partial cryptographic verification of the request and response covering the http method request uri host and optionally the request payload hawk used a regular expression to parse host http header hawk utils parsehost which was subject to regular expression dos attack meaning each added character in the attacker input increases the computation time exponentially parsehost was patched in to use built in url class to parse hostname instead hawk authenticate accepts options argument if that contains host and port those would be used instead of a call to utils parsehost vulnerabilityurl
0
649,891
21,329,622,504
IssuesEvent
2022-04-18 06:22:51
longhorn/longhorn
https://api.github.com/repos/longhorn/longhorn
closed
[BUG] longhorn-engine controller rebuilding crash
kind/bug area/engine severity/1 priority/1 backport-needed/1.2.5
## Describe the bug In a customer support bundle, the longhorn-engine controller is crashing because it attempts to access the first element in an array whose length is zero. https://github.com/longhorn/longhorn-engine/blob/cda02873ef0789a56fcca9ffcdbc5bea76f09018/pkg/controller/rebuild.go#L30 This code crashes: ``` head := rep.Chain[0] ``` The replica's gRPC method to get the chain of disk images looks like it is returning an empty array of disk images: https://github.com/longhorn/longhorn-engine/blob/cda02873ef0789a56fcca9ffcdbc5bea76f09018/pkg/replica/replica.go#L592 ## To Reproduce TBD ## Expected behavior The longhorn engine doesn't crash. ## Log or Support bundle ``` panic: runtime error: index out of range [0] with length 0 2022-04-02T13:06:48.724853291-04:00 2022-04-02T13:06:48.724857895-04:00 goroutine 230939 [running]: 2022-04-02T13:06:48.724862901-04:00 github.com/longhorn/longhorn-engine/pkg/controller.getReplicaDisksAndHead(0xc0000fa1e0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0) 2022-04-02T13:06:48.724865758-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rebuild.go:30 +0x565 2022-04-02T13:06:48.725259388-04:00 github.com/longhorn/longhorn-engine/pkg/controller.(*Controller).VerifyRebuildReplica(0xc0001d57a0, 0xc0000fa1e0, 0x16, [pvc-78ee6a8b-36e5-46e2-9986-15c5a519b3e3-e-e9b63647] 0x0, 0x0) 2022-04-02T13:06:48.725280480-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rebuild.go:94 +0x246 2022-04-02T13:06:48.725283601-04:00 github.com/longhorn/longhorn-engine/pkg/controller/rpc.(*ControllerServer).ReplicaVerifyRebuild(0xc0003a4078, 0x1091660, 0xc00045c6f0, 0xc00045c750, 0xc0003a4078, 0xc00045c6f0, 0xc00006aa20) 2022-04-02T13:06:48.725286256-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rpc/server.go:223 +0x48 2022-04-02T13:06:48.725288492-04:00 github.com/longhorn/longhorn-engine/proto/ptypes._ControllerService_ReplicaVerifyRebuild_Handler(0xe534a0, 0xc0003a4078, 0x1091660, 0xc00045c6f0, 0xc000522aa0, 0x0, 0x1091660, 0xc00045c6f0, 0xc0000fa1c0, 0x18) 2022-04-02T13:06:48.725291135-04:00 /go/src/github.com/longhorn/longhorn-engine/proto/ptypes/controller.pb.go:1673 +0x217 2022-04-02T13:06:48.725293798-04:00 google.golang.org/grpc.(*Server).processUnaryRPC(0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100, 0xc000516060, 0x1697f10, 0x0, 0x0, 0x0) 2022-04-02T13:06:48.725300522-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:998 +0x46a 2022-04-02T13:06:48.725303318-04:00 google.golang.org/grpc.(*Server).handleStream(0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100, 0x0) 2022-04-02T13:06:48.725305437-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:1278 +0xd3d 2022-04-02T13:06:48.725307525-04:00 google.golang.org/grpc.(*Server).serveStreams.func1.1(0xc0003a6020, 0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100) 2022-04-02T13:06:48.725309894-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:717 +0xa1 2022-04-02T13:06:48.725311790-04:00 created by google.golang.org/grpc.(*Server).serveStreams.func1 2022-04-02T13:06:48.725314990-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:715 +0xa1 ``` ## Environment - Longhorn version: 1.2.4 - Installation method (e.g. Rancher Catalog App/Helm/Kubectl): - Kubernetes distro (e.g. RKE/K3s/EKS/OpenShift) and version: - Number of management node in the cluster: - Number of worker node in the cluster: - Node config - OS type and version: - CPU per node: - Memory per node: - Disk type(e.g. SSD/NVMe): - Network bandwidth between the nodes: - Underlying Infrastructure (e.g. on AWS/GCE, EKS/GKE, VMWare/KVM, Baremetal): - Number of Longhorn volumes in the cluster: ## Additional context Add any other context about the problem here.
1.0
[BUG] longhorn-engine controller rebuilding crash - ## Describe the bug In a customer support bundle, the longhorn-engine controller is crashing because it attempts to access the first element in an array whose length is zero. https://github.com/longhorn/longhorn-engine/blob/cda02873ef0789a56fcca9ffcdbc5bea76f09018/pkg/controller/rebuild.go#L30 This code crashes: ``` head := rep.Chain[0] ``` The replica's gRPC method to get the chain of disk images looks like it is returning an empty array of disk images: https://github.com/longhorn/longhorn-engine/blob/cda02873ef0789a56fcca9ffcdbc5bea76f09018/pkg/replica/replica.go#L592 ## To Reproduce TBD ## Expected behavior The longhorn engine doesn't crash. ## Log or Support bundle ``` panic: runtime error: index out of range [0] with length 0 2022-04-02T13:06:48.724853291-04:00 2022-04-02T13:06:48.724857895-04:00 goroutine 230939 [running]: 2022-04-02T13:06:48.724862901-04:00 github.com/longhorn/longhorn-engine/pkg/controller.getReplicaDisksAndHead(0xc0000fa1e0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0) 2022-04-02T13:06:48.724865758-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rebuild.go:30 +0x565 2022-04-02T13:06:48.725259388-04:00 github.com/longhorn/longhorn-engine/pkg/controller.(*Controller).VerifyRebuildReplica(0xc0001d57a0, 0xc0000fa1e0, 0x16, [pvc-78ee6a8b-36e5-46e2-9986-15c5a519b3e3-e-e9b63647] 0x0, 0x0) 2022-04-02T13:06:48.725280480-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rebuild.go:94 +0x246 2022-04-02T13:06:48.725283601-04:00 github.com/longhorn/longhorn-engine/pkg/controller/rpc.(*ControllerServer).ReplicaVerifyRebuild(0xc0003a4078, 0x1091660, 0xc00045c6f0, 0xc00045c750, 0xc0003a4078, 0xc00045c6f0, 0xc00006aa20) 2022-04-02T13:06:48.725286256-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rpc/server.go:223 +0x48 2022-04-02T13:06:48.725288492-04:00 github.com/longhorn/longhorn-engine/proto/ptypes._ControllerService_ReplicaVerifyRebuild_Handler(0xe534a0, 0xc0003a4078, 0x1091660, 0xc00045c6f0, 0xc000522aa0, 0x0, 0x1091660, 0xc00045c6f0, 0xc0000fa1c0, 0x18) 2022-04-02T13:06:48.725291135-04:00 /go/src/github.com/longhorn/longhorn-engine/proto/ptypes/controller.pb.go:1673 +0x217 2022-04-02T13:06:48.725293798-04:00 google.golang.org/grpc.(*Server).processUnaryRPC(0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100, 0xc000516060, 0x1697f10, 0x0, 0x0, 0x0) 2022-04-02T13:06:48.725300522-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:998 +0x46a 2022-04-02T13:06:48.725303318-04:00 google.golang.org/grpc.(*Server).handleStream(0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100, 0x0) 2022-04-02T13:06:48.725305437-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:1278 +0xd3d 2022-04-02T13:06:48.725307525-04:00 google.golang.org/grpc.(*Server).serveStreams.func1.1(0xc0003a6020, 0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100) 2022-04-02T13:06:48.725309894-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:717 +0xa1 2022-04-02T13:06:48.725311790-04:00 created by google.golang.org/grpc.(*Server).serveStreams.func1 2022-04-02T13:06:48.725314990-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:715 +0xa1 ``` ## Environment - Longhorn version: 1.2.4 - Installation method (e.g. Rancher Catalog App/Helm/Kubectl): - Kubernetes distro (e.g. RKE/K3s/EKS/OpenShift) and version: - Number of management node in the cluster: - Number of worker node in the cluster: - Node config - OS type and version: - CPU per node: - Memory per node: - Disk type(e.g. SSD/NVMe): - Network bandwidth between the nodes: - Underlying Infrastructure (e.g. on AWS/GCE, EKS/GKE, VMWare/KVM, Baremetal): - Number of Longhorn volumes in the cluster: ## Additional context Add any other context about the problem here.
non_usab
longhorn engine controller rebuilding crash describe the bug in a customer support bundle the longhorn engine controller is crashing because it attempts to access the first element in an array whose length is zero this code crashes head rep chain the replica s grpc method to get the chain of disk images looks like it is returning an empty array of disk images to reproduce tbd expected behavior the longhorn engine doesn t crash log or support bundle panic runtime error index out of range with length goroutine github com longhorn longhorn engine pkg controller getreplicadisksandhead go src github com longhorn longhorn engine pkg controller rebuild go github com longhorn longhorn engine pkg controller controller verifyrebuildreplica go src github com longhorn longhorn engine pkg controller rebuild go github com longhorn longhorn engine pkg controller rpc controllerserver replicaverifyrebuild go src github com longhorn longhorn engine pkg controller rpc server go github com longhorn longhorn engine proto ptypes controllerservice replicaverifyrebuild handler go src github com longhorn longhorn engine proto ptypes controller pb go google golang org grpc server processunaryrpc go src github com longhorn longhorn engine vendor google golang org grpc server go google golang org grpc server handlestream go src github com longhorn longhorn engine vendor google golang org grpc server go google golang org grpc server servestreams go src github com longhorn longhorn engine vendor google golang org grpc server go created by google golang org grpc server servestreams go src github com longhorn longhorn engine vendor google golang org grpc server go environment longhorn version installation method e g rancher catalog app helm kubectl kubernetes distro e g rke eks openshift and version number of management node in the cluster number of worker node in the cluster node config os type and version cpu per node memory per node disk type e g ssd nvme network bandwidth between the nodes underlying infrastructure e g on aws gce eks gke vmware kvm baremetal number of longhorn volumes in the cluster additional context add any other context about the problem here
0
744,148
25,931,179,351
IssuesEvent
2022-12-16 10:08:06
renovatebot/renovate
https://api.github.com/repos/renovatebot/renovate
closed
Use monospaced style for Boolean values, and references to Renovate config options
priority-4-low type:docs status:ready
### Describe the proposed change(s). https://github.com/renovatebot/renovate/blob/main/lib/config/options/index.ts has `description:` fields, that are also used to generate a part of the config option documentation. I want to use the monospaced style for things like: - [x] `true` or `false` Booleans - [x] References to Renovate concepts like `packageRules` - [x] References to filenames like `config.js` Let me know if you want one big PR, or smaller PRs to make this change. 😉
1.0
Use monospaced style for Boolean values, and references to Renovate config options - ### Describe the proposed change(s). https://github.com/renovatebot/renovate/blob/main/lib/config/options/index.ts has `description:` fields, that are also used to generate a part of the config option documentation. I want to use the monospaced style for things like: - [x] `true` or `false` Booleans - [x] References to Renovate concepts like `packageRules` - [x] References to filenames like `config.js` Let me know if you want one big PR, or smaller PRs to make this change. 😉
non_usab
use monospaced style for boolean values and references to renovate config options describe the proposed change s has description fields that are also used to generate a part of the config option documentation i want to use the monospaced style for things like true or false booleans references to renovate concepts like packagerules references to filenames like config js let me know if you want one big pr or smaller prs to make this change 😉
0
266,520
28,375,328,345
IssuesEvent
2023-04-12 20:21:17
JoshRMendDemo/SourceFileMatching-Demo
https://api.github.com/repos/JoshRMendDemo/SourceFileMatching-Demo
opened
sulinoswpa_supplicant-2.9: 3 vulnerabilities (highest severity is: 9.8)
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p></summary> <p> <p>Indipendent distro uses inary package system. Sulin is roolling donkey</p> <p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p> <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p> </p> </p></p> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b> </p> <p></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (sulinoswpa_supplicant version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-0516](https://www.mend.io/vulnerability-database/CVE-2021-0516) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | sulinoswpa_supplicant-2.9 | Direct | android-11.0.0_r38 | &#10060; | | [CVE-2021-27803](https://www.mend.io/vulnerability-database/CVE-2021-27803) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | sulinoswpa_supplicant-2.9 | Direct | wpa_supplicant - 2.6-12,2.9-2,2.7-2,2.9-2,2.9-2,2.9-2,2.9-2,2.6-12,2.7-2,2.9-2,2.7-2,2.9-2,2.6-12,2.9-2,2.9-2,2.7-2,2.6-12,2.9-2,2.7-2;wpa_supplicant-debugsource - 2.7-2,2.9-2,2.9-2;wpa_supplicant-debuginfo - 2.9-2,2.9-2,2.6-12,2.7-2 | &#10060; | | [CVE-2021-30004](https://www.mend.io/vulnerability-database/CVE-2021-30004) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | detected in multiple dependencies | Direct | wpa-supplicant - 2.9 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-0516</summary> ### Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p> <p> <p>Indipendent distro uses inary package system. Sulin is roolling donkey</p> <p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p> <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p> <p>Found in base branch: <b>main</b></p></p> </p></p> ### Vulnerable Source Files (1) <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b> </p> <p></p> </p> <p></p> ### Vulnerability Details <p> In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out of bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181660448 <p>Publish Date: 2021-06-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-0516>CVE-2021-0516</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://source.android.com/security/bulletin/2021-06-01">https://source.android.com/security/bulletin/2021-06-01</a></p> <p>Release Date: 2021-06-21</p> <p>Fix Resolution: android-11.0.0_r38</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-27803</summary> ### Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p> <p> <p>Indipendent distro uses inary package system. Sulin is roolling donkey</p> <p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p> <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p> <p>Found in base branch: <b>main</b></p></p> </p></p> ### Vulnerable Source Files (1) <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b> </p> <p></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. <p>Publish Date: 2021-02-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-27803>CVE-2021-27803</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">https://nvd.nist.gov/vuln/detail/CVE-2021-27803</a></p> <p>Release Date: 2021-02-26</p> <p>Fix Resolution: wpa_supplicant - 2.6-12,2.9-2,2.7-2,2.9-2,2.9-2,2.9-2,2.9-2,2.6-12,2.7-2,2.9-2,2.7-2,2.9-2,2.6-12,2.9-2,2.9-2,2.7-2,2.6-12,2.9-2,2.7-2;wpa_supplicant-debugsource - 2.7-2,2.9-2,2.9-2;wpa_supplicant-debuginfo - 2.9-2,2.9-2,2.6-12,2.7-2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-30004</summary> ### Vulnerable Libraries - <b>sulinoswpa_supplicant-2.9</b>, <b>sulinoswpa_supplicant-2.9</b></p> <p> </p> <p></p> ### Vulnerability Details <p> In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c. <p>Publish Date: 2021-04-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-30004>CVE-2021-30004</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30004">https://nvd.nist.gov/vuln/detail/CVE-2021-30004</a></p> <p>Release Date: 2021-04-02</p> <p>Fix Resolution: wpa-supplicant - 2.9</p> </p> <p></p> </details>
True
sulinoswpa_supplicant-2.9: 3 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p></summary> <p> <p>Indipendent distro uses inary package system. Sulin is roolling donkey</p> <p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p> <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p> </p> </p></p> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b> </p> <p></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (sulinoswpa_supplicant version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-0516](https://www.mend.io/vulnerability-database/CVE-2021-0516) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | sulinoswpa_supplicant-2.9 | Direct | android-11.0.0_r38 | &#10060; | | [CVE-2021-27803](https://www.mend.io/vulnerability-database/CVE-2021-27803) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | sulinoswpa_supplicant-2.9 | Direct | wpa_supplicant - 2.6-12,2.9-2,2.7-2,2.9-2,2.9-2,2.9-2,2.9-2,2.6-12,2.7-2,2.9-2,2.7-2,2.9-2,2.6-12,2.9-2,2.9-2,2.7-2,2.6-12,2.9-2,2.7-2;wpa_supplicant-debugsource - 2.7-2,2.9-2,2.9-2;wpa_supplicant-debuginfo - 2.9-2,2.9-2,2.6-12,2.7-2 | &#10060; | | [CVE-2021-30004](https://www.mend.io/vulnerability-database/CVE-2021-30004) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | detected in multiple dependencies | Direct | wpa-supplicant - 2.9 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-0516</summary> ### Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p> <p> <p>Indipendent distro uses inary package system. Sulin is roolling donkey</p> <p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p> <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p> <p>Found in base branch: <b>main</b></p></p> </p></p> ### Vulnerable Source Files (1) <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b> </p> <p></p> </p> <p></p> ### Vulnerability Details <p> In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out of bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181660448 <p>Publish Date: 2021-06-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-0516>CVE-2021-0516</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://source.android.com/security/bulletin/2021-06-01">https://source.android.com/security/bulletin/2021-06-01</a></p> <p>Release Date: 2021-06-21</p> <p>Fix Resolution: android-11.0.0_r38</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-27803</summary> ### Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p> <p> <p>Indipendent distro uses inary package system. Sulin is roolling donkey</p> <p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p> <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p> <p>Found in base branch: <b>main</b></p></p> </p></p> ### Vulnerable Source Files (1) <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b> </p> <p></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. <p>Publish Date: 2021-02-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-27803>CVE-2021-27803</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">https://nvd.nist.gov/vuln/detail/CVE-2021-27803</a></p> <p>Release Date: 2021-02-26</p> <p>Fix Resolution: wpa_supplicant - 2.6-12,2.9-2,2.7-2,2.9-2,2.9-2,2.9-2,2.9-2,2.6-12,2.7-2,2.9-2,2.7-2,2.9-2,2.6-12,2.9-2,2.9-2,2.7-2,2.6-12,2.9-2,2.7-2;wpa_supplicant-debugsource - 2.7-2,2.9-2,2.9-2;wpa_supplicant-debuginfo - 2.9-2,2.9-2,2.6-12,2.7-2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-30004</summary> ### Vulnerable Libraries - <b>sulinoswpa_supplicant-2.9</b>, <b>sulinoswpa_supplicant-2.9</b></p> <p> </p> <p></p> ### Vulnerability Details <p> In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c. <p>Publish Date: 2021-04-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-30004>CVE-2021-30004</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30004">https://nvd.nist.gov/vuln/detail/CVE-2021-30004</a></p> <p>Release Date: 2021-04-02</p> <p>Fix Resolution: wpa-supplicant - 2.9</p> </p> <p></p> </details>
non_usab
sulinoswpa supplicant vulnerabilities highest severity is vulnerable library sulinoswpa supplicant indipendent distro uses inary package system sulin is roolling donkey library home page a href found in head commit a href vulnerable source files vendor hostapd src pd c vulnerabilities cve severity cvss dependency type fixed in sulinoswpa supplicant version remediation available critical sulinoswpa supplicant direct android high sulinoswpa supplicant direct wpa supplicant wpa supplicant debugsource wpa supplicant debuginfo medium detected in multiple dependencies direct wpa supplicant details cve vulnerable library sulinoswpa supplicant indipendent distro uses inary package system sulin is roolling donkey library home page a href found in head commit a href found in base branch main vulnerable source files vendor hostapd src pd c vulnerability details in process prov disc req of pd c there is a possible out of bounds read and write due to a use after free this could lead to remote escalation of privilege with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android cve vulnerable library sulinoswpa supplicant indipendent distro uses inary package system sulin is roolling donkey library home page a href found in head commit a href found in base branch main vulnerable source files vendor hostapd src pd c vulnerability details a vulnerability was discovered in how pd c in wpa supplicant before processes wi fi direct provision discovery requests it could result in denial of service or other impact potentially execution of arbitrary code for an attacker within radio range publish date url a href cvss score details base score metrics exploitability metrics attack vector adjacent attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution wpa supplicant wpa supplicant debugsource wpa supplicant debuginfo cve vulnerable libraries sulinoswpa supplicant sulinoswpa supplicant vulnerability details in wpa supplicant and hostapd forging attacks may occur because algorithmidentifier parameters are mishandled in tls c and tls c publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution wpa supplicant
0
266,957
28,485,780,896
IssuesEvent
2023-04-18 07:46:29
Satheesh575555/openSSL_1.0.1g
https://api.github.com/repos/Satheesh575555/openSSL_1.0.1g
opened
CVE-2014-3507 (Medium) detected in opensslOpenSSL_1_0_1g
Mend: dependency security vulnerability
## CVE-2014-3507 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1g</b></p></summary> <p> <p>TLS/SSL and crypto library</p> <p>Library home page: <a href=https://github.com/openssl/openssl.git>https://github.com/openssl/openssl.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/openSSL_1.0.1g/commit/7a1521d6faa1c1b2bda3237d82c41b77511b2861">7a1521d6faa1c1b2bda3237d82c41b77511b2861</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/ssl/d1_both.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function. <p>Publish Date: 2014-08-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-3507>CVE-2014-3507</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">https://nvd.nist.gov/vuln/detail/CVE-2014-3507</a></p> <p>Release Date: 2014-08-13</p> <p>Fix Resolution: 0.9.8zb,1.0.0n,1.0.1i</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2014-3507 (Medium) detected in opensslOpenSSL_1_0_1g - ## CVE-2014-3507 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1g</b></p></summary> <p> <p>TLS/SSL and crypto library</p> <p>Library home page: <a href=https://github.com/openssl/openssl.git>https://github.com/openssl/openssl.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/openSSL_1.0.1g/commit/7a1521d6faa1c1b2bda3237d82c41b77511b2861">7a1521d6faa1c1b2bda3237d82c41b77511b2861</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/ssl/d1_both.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function. <p>Publish Date: 2014-08-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-3507>CVE-2014-3507</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">https://nvd.nist.gov/vuln/detail/CVE-2014-3507</a></p> <p>Release Date: 2014-08-13</p> <p>Fix Resolution: 0.9.8zb,1.0.0n,1.0.1i</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve medium detected in opensslopenssl cve medium severity vulnerability vulnerable library opensslopenssl tls ssl and crypto library library home page a href found in head commit a href found in base branch main vulnerable source files ssl both c vulnerability details memory leak in both c in the dtls implementation in openssl before before and before allows remote attackers to cause a denial of service memory consumption via zero length dtls fragments that trigger improper handling of the return value of a certain insert function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
69,270
9,285,294,697
IssuesEvent
2019-03-21 06:26:02
ontio/ontology-python-sdk
https://api.github.com/repos/ontio/ontology-python-sdk
closed
AttributeError: 'Oep4' object has no attribute 'set_contract_address'
Documentation
``` Traceback (most recent call last): File "get_name.py", line 8, in <module> oep4.set_contract_address(contract_address) AttributeError: 'Oep4' object has no attribute 'set_contract_address' ```
1.0
AttributeError: 'Oep4' object has no attribute 'set_contract_address' - ``` Traceback (most recent call last): File "get_name.py", line 8, in <module> oep4.set_contract_address(contract_address) AttributeError: 'Oep4' object has no attribute 'set_contract_address' ```
non_usab
attributeerror object has no attribute set contract address traceback most recent call last file get name py line in set contract address contract address attributeerror object has no attribute set contract address
0
66,438
8,924,477,412
IssuesEvent
2019-01-21 18:50:41
atom/node-keytar
https://api.github.com/repos/atom/node-keytar
closed
findPassword - incorrect documentation
documentation
From https://github.com/atom/node-keytar/blob/0e1757ae895f63ece9c8641e112b892cbdff34cf/README.md#findpasswordservice : > ### findPassword(service) > > Find a password for the `service` in the keychain. > >`service` - The string service name. > >Yields the string password, or `null` if an entry for the given service and account was not found. Which given account? This docs looks like a copy-paste error from the `getPassword` method. #36 questioned before why this function was needed, and although it has been closed, the question is still open - what is the purpose of `findPassword` ?
1.0
findPassword - incorrect documentation - From https://github.com/atom/node-keytar/blob/0e1757ae895f63ece9c8641e112b892cbdff34cf/README.md#findpasswordservice : > ### findPassword(service) > > Find a password for the `service` in the keychain. > >`service` - The string service name. > >Yields the string password, or `null` if an entry for the given service and account was not found. Which given account? This docs looks like a copy-paste error from the `getPassword` method. #36 questioned before why this function was needed, and although it has been closed, the question is still open - what is the purpose of `findPassword` ?
non_usab
findpassword incorrect documentation from findpassword service find a password for the service in the keychain service the string service name yields the string password or null if an entry for the given service and account was not found which given account this docs looks like a copy paste error from the getpassword method questioned before why this function was needed and although it has been closed the question is still open what is the purpose of findpassword
0
27,987
30,843,681,370
IssuesEvent
2023-08-02 12:26:44
microsoft/AdaptiveCards
https://api.github.com/repos/microsoft/AdaptiveCards
opened
[Adaptive Cards> OrderConfirmation.json]: Tooltip is not appearing for the 'More' option button.
Bug Area-Renderers Area-Accessibility A11yUsable HCL-E+D HCL-AdaptiveCards-Universal
### Target Platforms UWP ### SDK Version 1.2.2306.30005 ### Application Name Adaptive Cards ### Problem Description **Test Environment:** OS version: 23H2 (Build 25905.1000) Application: AdaptiveCardVisualizer Application Version: 1.2.2306.30005 **Repro Steps:** 1. Open the Adaptive Card Visualizer application. 2. Navigate to the 'OrderConfirmation.json' through tab key and activate it. 3. Navigate to 'More option' button through tab key. 4. Observe the issue. **Actual Result:** For the 'More option' button, proper tooltip is not appearing. Tooltip is appearing as a (...) more option icon. **Expected Result:** Tooltip should properly appear for the 'More' option button.Such as 'More option'. **User Impact:** Person with cognitive disability will not be able to understand the purpose of the button and will not be able to navigate or or interact with the content properly. “Have feedback to share on Bugs? Please help fill [Trusted Tester Bug Feedback (office.com)](https://nam06.safelinks.protection.outlook.com/?url=https://forms.office.com/pages/responsepage.aspx?id%3Dv4j5cvGGr0GRqy180BHbR5dUqGQgJ9lItv-jqY8F09lURVdYTENIRkY2UzlCR0NKV1E2VUE5OVpDVy4u&data=04%7c01%7cv-vaibgu%40microsoft.com%7c551850210d444be9b28308d9691e3dde%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c637656400980259288%7cUnknown%7cTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7c1000&sdata=TrcBaCyAPKg0WAQfdSZJP2i9pghMEDg59i2NeUUs5EQ%3D&reserved=0) “ ### Screenshots https://github.com/microsoft/AdaptiveCards/assets/104483005/f094e3ec-667b-4a2a-aba2-b384ade80162 ### Card JSON ```JSON NA ``` ### Sample Code Language _No response_ ### Sample Code _No response_
True
[Adaptive Cards> OrderConfirmation.json]: Tooltip is not appearing for the 'More' option button. - ### Target Platforms UWP ### SDK Version 1.2.2306.30005 ### Application Name Adaptive Cards ### Problem Description **Test Environment:** OS version: 23H2 (Build 25905.1000) Application: AdaptiveCardVisualizer Application Version: 1.2.2306.30005 **Repro Steps:** 1. Open the Adaptive Card Visualizer application. 2. Navigate to the 'OrderConfirmation.json' through tab key and activate it. 3. Navigate to 'More option' button through tab key. 4. Observe the issue. **Actual Result:** For the 'More option' button, proper tooltip is not appearing. Tooltip is appearing as a (...) more option icon. **Expected Result:** Tooltip should properly appear for the 'More' option button.Such as 'More option'. **User Impact:** Person with cognitive disability will not be able to understand the purpose of the button and will not be able to navigate or or interact with the content properly. “Have feedback to share on Bugs? Please help fill [Trusted Tester Bug Feedback (office.com)](https://nam06.safelinks.protection.outlook.com/?url=https://forms.office.com/pages/responsepage.aspx?id%3Dv4j5cvGGr0GRqy180BHbR5dUqGQgJ9lItv-jqY8F09lURVdYTENIRkY2UzlCR0NKV1E2VUE5OVpDVy4u&data=04%7c01%7cv-vaibgu%40microsoft.com%7c551850210d444be9b28308d9691e3dde%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c637656400980259288%7cUnknown%7cTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7c1000&sdata=TrcBaCyAPKg0WAQfdSZJP2i9pghMEDg59i2NeUUs5EQ%3D&reserved=0) “ ### Screenshots https://github.com/microsoft/AdaptiveCards/assets/104483005/f094e3ec-667b-4a2a-aba2-b384ade80162 ### Card JSON ```JSON NA ``` ### Sample Code Language _No response_ ### Sample Code _No response_
usab
tooltip is not appearing for the more option button target platforms uwp sdk version application name adaptive cards problem description test environment os version build application adaptivecardvisualizer application version repro steps open the adaptive card visualizer application navigate to the orderconfirmation json through tab key and activate it navigate to more option button through tab key observe the issue actual result for the more option button proper tooltip is not appearing tooltip is appearing as a more option icon expected result tooltip should properly appear for the more option button such as more option user impact person with cognitive disability will not be able to understand the purpose of the button and will not be able to navigate or or interact with the content properly “have feedback to share on bugs please help fill “ screenshots card json json na sample code language no response sample code no response
1
15,721
10,262,483,043
IssuesEvent
2019-08-22 12:26:28
microsoft/BotFramework-Emulator
https://api.github.com/repos/microsoft/BotFramework-Emulator
opened
[Usability-Settings] when we navigating to the scan mode “User ID “content is overlapping
A11yCT A11yLowImpact A11yMAS A11yUsable Accessibility Bug HCL-BotFrameworkEmulator Severity4
**Actual Result:** when we navigating to the scan mode “User ID “content is overlapping, and error message is reading twice like “Enter a User ID User ID” **Expected Result:** when we navigating to the scan mode “User ID “content should not overlap and error message should read as “Enter a User ID ” Note: Issue repro'ing with NVDA **Repro Steps:** Turn on the narrator 1.Open the Bot Framework V4 Emulator. 2.Navigate to Welcome tab screen and select it, screen gets opened 3.Navigate to the open bot and select it 4.Open bot dialog gets opened and connect to the open bot 5.Live chat screen gets appears 6.Navigate to the Edit ngrok settings and select it 7.Emulator screen gets opened 8.Navigate to the “User ID” element using scan mode (Down arrow key) 9. Observe the issue **User Impact:** Users who rely on AT will be affected if the screen reader users while navigating to the UI content ,the content is overlapping and reading the info twice users will misguide the info. **Test Environment:** OS Build: Version 1903(OS Build 18362.239) Browser: Edge Application: Bot Framework V4 Emulator Screen reader: Narrator [Usability_Setting.zip](https://github.com/microsoft/BotFramework-Emulator/files/3530094/Usability_Setting.zip)
True
[Usability-Settings] when we navigating to the scan mode “User ID “content is overlapping - **Actual Result:** when we navigating to the scan mode “User ID “content is overlapping, and error message is reading twice like “Enter a User ID User ID” **Expected Result:** when we navigating to the scan mode “User ID “content should not overlap and error message should read as “Enter a User ID ” Note: Issue repro'ing with NVDA **Repro Steps:** Turn on the narrator 1.Open the Bot Framework V4 Emulator. 2.Navigate to Welcome tab screen and select it, screen gets opened 3.Navigate to the open bot and select it 4.Open bot dialog gets opened and connect to the open bot 5.Live chat screen gets appears 6.Navigate to the Edit ngrok settings and select it 7.Emulator screen gets opened 8.Navigate to the “User ID” element using scan mode (Down arrow key) 9. Observe the issue **User Impact:** Users who rely on AT will be affected if the screen reader users while navigating to the UI content ,the content is overlapping and reading the info twice users will misguide the info. **Test Environment:** OS Build: Version 1903(OS Build 18362.239) Browser: Edge Application: Bot Framework V4 Emulator Screen reader: Narrator [Usability_Setting.zip](https://github.com/microsoft/BotFramework-Emulator/files/3530094/Usability_Setting.zip)
usab
when we navigating to the scan mode “user id “content is overlapping actual result when we navigating to the scan mode “user id “content is overlapping and error message is reading twice like “enter a user id user id” expected result when we navigating to the scan mode “user id “content should not overlap and error message should read as “enter a user id ” note issue repro ing with nvda repro steps turn on the narrator open the bot framework emulator navigate to welcome tab screen and select it screen gets opened navigate to the open bot and select it open bot dialog gets opened and connect to the open bot live chat screen gets appears navigate to the edit ngrok settings and select it emulator screen gets opened navigate to the “user id” element using scan mode down arrow key observe the issue user impact users who rely on at will be affected if the screen reader users while navigating to the ui content the content is overlapping and reading the info twice users will misguide the info test environment os build version os build browser edge application bot framework emulator screen reader narrator
1
2,905
3,244,197,026
IssuesEvent
2015-10-16 00:03:19
lionheart/openradar-mirror
https://api.github.com/repos/lionheart/openradar-mirror
closed
23116258: Xcode UI Testing: XCUI tests need to be able to access the application process
classification:ui/usability reproducible:always status:closed
#### Description Summary: XCUI tests are currently run in a completely separate process than the app under test, which makes a lot of sense in theory: You want to test the UI, so you only give the user access to the application proxy. In practice, this is a bit of a disaster, because you can’t mock anything out without having to set up a ton of stuff on the app side. I can’t tell my UI tests “Test what happens when the user tries to login with network connectivity” and “Test what happens when the user tries to login without network connectivity” because those things are being determined by the app itself, which I have no access to. Steps to Reproduce: 1. Write some UI tests. 2. Try to @testable import your app bundle, add a few things from your app bundle like string convenience methods 3. Get error about unsafe mutable accessors, scratch head 4. Google it, discover that because test is run in a separate process testable importing doesn’t work for UI tests. 5. Realize that this means you can’t set up any kind of helpful state like “Use a mock network connection” or “Let’s pretend the user tries to do x without a working internet connection” Expected Results: Be able to access the application process to update these types of objects within the main application at runtime. Actual Results: Any state must be set up using environment arguments in a build scheme, and coded into the application rather than set up in the test target. Regression: UI testing was just introduced, but it’s a “regression” from the standard XCTest suite which allows access to these things. Notes: This is a major dealbreaker for me in actually using XCUI testing because if I can’t mock state, then I’m testing not only UI but the exact state of the app at any time. Essentially, I don’t want my UI tests to fail because my device cabinet is in a part of the office with iffy wifi. - Product Version: Xcode 7.0.1 (7A1001) Created: 2015-10-14T22:01:29.206000 Originated: 2015-10-14T17:01:00 Open Radar Link: http://www.openradar.me/23116258
True
23116258: Xcode UI Testing: XCUI tests need to be able to access the application process - #### Description Summary: XCUI tests are currently run in a completely separate process than the app under test, which makes a lot of sense in theory: You want to test the UI, so you only give the user access to the application proxy. In practice, this is a bit of a disaster, because you can’t mock anything out without having to set up a ton of stuff on the app side. I can’t tell my UI tests “Test what happens when the user tries to login with network connectivity” and “Test what happens when the user tries to login without network connectivity” because those things are being determined by the app itself, which I have no access to. Steps to Reproduce: 1. Write some UI tests. 2. Try to @testable import your app bundle, add a few things from your app bundle like string convenience methods 3. Get error about unsafe mutable accessors, scratch head 4. Google it, discover that because test is run in a separate process testable importing doesn’t work for UI tests. 5. Realize that this means you can’t set up any kind of helpful state like “Use a mock network connection” or “Let’s pretend the user tries to do x without a working internet connection” Expected Results: Be able to access the application process to update these types of objects within the main application at runtime. Actual Results: Any state must be set up using environment arguments in a build scheme, and coded into the application rather than set up in the test target. Regression: UI testing was just introduced, but it’s a “regression” from the standard XCTest suite which allows access to these things. Notes: This is a major dealbreaker for me in actually using XCUI testing because if I can’t mock state, then I’m testing not only UI but the exact state of the app at any time. Essentially, I don’t want my UI tests to fail because my device cabinet is in a part of the office with iffy wifi. - Product Version: Xcode 7.0.1 (7A1001) Created: 2015-10-14T22:01:29.206000 Originated: 2015-10-14T17:01:00 Open Radar Link: http://www.openradar.me/23116258
usab
xcode ui testing xcui tests need to be able to access the application process description summary xcui tests are currently run in a completely separate process than the app under test which makes a lot of sense in theory you want to test the ui so you only give the user access to the application proxy in practice this is a bit of a disaster because you can’t mock anything out without having to set up a ton of stuff on the app side i can’t tell my ui tests “test what happens when the user tries to login with network connectivity” and “test what happens when the user tries to login without network connectivity” because those things are being determined by the app itself which i have no access to steps to reproduce write some ui tests try to testable import your app bundle add a few things from your app bundle like string convenience methods get error about unsafe mutable accessors scratch head google it discover that because test is run in a separate process testable importing doesn’t work for ui tests realize that this means you can’t set up any kind of helpful state like “use a mock network connection” or “let’s pretend the user tries to do x without a working internet connection” expected results be able to access the application process to update these types of objects within the main application at runtime actual results any state must be set up using environment arguments in a build scheme and coded into the application rather than set up in the test target regression ui testing was just introduced but it’s a “regression” from the standard xctest suite which allows access to these things notes this is a major dealbreaker for me in actually using xcui testing because if i can’t mock state then i’m testing not only ui but the exact state of the app at any time essentially i don’t want my ui tests to fail because my device cabinet is in a part of the office with iffy wifi product version xcode created originated open radar link
1
9,223
6,186,814,694
IssuesEvent
2017-07-04 04:42:20
Virtual-Labs/image-processing-iiith
https://api.github.com/repos/Virtual-Labs/image-processing-iiith
closed
QA_Image-Segmentation_Introduction_Spelling-mistakes
Category: Usability Developed By: VLEAD Open-edx-Issue Resolved Severity : S3
Defect Description : In the Introduction page of the Image Segmentation experiment in this lab, found spelling mistakes. Actual Result : In the Introduction page of the Image Segmentation experiment in this lab, found spelling mistakes. Refer to attachments. Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 Attachment: ![qa_oe_ip_i41](https://cloud.githubusercontent.com/assets/13479177/26094024/db337816-3a35-11e7-80fb-a2e8b153c2c3.png)
True
QA_Image-Segmentation_Introduction_Spelling-mistakes - Defect Description : In the Introduction page of the Image Segmentation experiment in this lab, found spelling mistakes. Actual Result : In the Introduction page of the Image Segmentation experiment in this lab, found spelling mistakes. Refer to attachments. Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 Attachment: ![qa_oe_ip_i41](https://cloud.githubusercontent.com/assets/13479177/26094024/db337816-3a35-11e7-80fb-a2e8b153c2c3.png)
usab
qa image segmentation introduction spelling mistakes defect description in the introduction page of the image segmentation experiment in this lab found spelling mistakes actual result in the introduction page of the image segmentation experiment in this lab found spelling mistakes refer to attachments environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor attachment
1
190,927
14,589,250,032
IssuesEvent
2020-12-19 01:06:30
kalexmills/github-vet-tests-dec2020
https://api.github.com/repos/kalexmills/github-vet-tests-dec2020
closed
terraform-providers/terraform-provider-oci: oci/datacatalog_catalog_test.go; 16 LoC
fresh small test
Found a possible issue in [terraform-providers/terraform-provider-oci](https://www.github.com/terraform-providers/terraform-provider-oci) at [oci/datacatalog_catalog_test.go](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/datacatalog_catalog_test.go#L291-L306) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > reference to catalogId is reassigned at line 295 [Click here to see the code in its original context.](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/datacatalog_catalog_test.go#L291-L306) <details> <summary>Click here to show the 16 line(s) of Go which triggered the analyzer.</summary> ```go for _, catalogId := range catalogIds { if ok := SweeperDefaultResourceId[catalogId]; !ok { deleteCatalogRequest := oci_datacatalog.DeleteCatalogRequest{} deleteCatalogRequest.CatalogId = &catalogId deleteCatalogRequest.RequestMetadata.RetryPolicy = getRetryPolicy(true, "datacatalog") _, error := dataCatalogClient.DeleteCatalog(context.Background(), deleteCatalogRequest) if error != nil { fmt.Printf("Error deleting Catalog %s %s, It is possible that the resource is already deleted. Please verify manually \n", catalogId, error) continue } waitTillCondition(testAccProvider, &catalogId, catalogSweepWaitCondition, time.Duration(3*time.Minute), catalogSweepResponseFetchOperation, "datacatalog", true) } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: 507acd0ed6517dbca2fbcfb8100874929c8fd8e1
1.0
terraform-providers/terraform-provider-oci: oci/datacatalog_catalog_test.go; 16 LoC - Found a possible issue in [terraform-providers/terraform-provider-oci](https://www.github.com/terraform-providers/terraform-provider-oci) at [oci/datacatalog_catalog_test.go](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/datacatalog_catalog_test.go#L291-L306) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > reference to catalogId is reassigned at line 295 [Click here to see the code in its original context.](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/datacatalog_catalog_test.go#L291-L306) <details> <summary>Click here to show the 16 line(s) of Go which triggered the analyzer.</summary> ```go for _, catalogId := range catalogIds { if ok := SweeperDefaultResourceId[catalogId]; !ok { deleteCatalogRequest := oci_datacatalog.DeleteCatalogRequest{} deleteCatalogRequest.CatalogId = &catalogId deleteCatalogRequest.RequestMetadata.RetryPolicy = getRetryPolicy(true, "datacatalog") _, error := dataCatalogClient.DeleteCatalog(context.Background(), deleteCatalogRequest) if error != nil { fmt.Printf("Error deleting Catalog %s %s, It is possible that the resource is already deleted. Please verify manually \n", catalogId, error) continue } waitTillCondition(testAccProvider, &catalogId, catalogSweepWaitCondition, time.Duration(3*time.Minute), catalogSweepResponseFetchOperation, "datacatalog", true) } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: 507acd0ed6517dbca2fbcfb8100874929c8fd8e1
non_usab
terraform providers terraform provider oci oci datacatalog catalog test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message reference to catalogid is reassigned at line click here to show the line s of go which triggered the analyzer go for catalogid range catalogids if ok sweeperdefaultresourceid ok deletecatalogrequest oci datacatalog deletecatalogrequest deletecatalogrequest catalogid catalogid deletecatalogrequest requestmetadata retrypolicy getretrypolicy true datacatalog error datacatalogclient deletecatalog context background deletecatalogrequest if error nil fmt printf error deleting catalog s s it is possible that the resource is already deleted please verify manually n catalogid error continue waittillcondition testaccprovider catalogid catalogsweepwaitcondition time duration time minute catalogsweepresponsefetchoperation datacatalog true leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id
0
25,481
25,255,808,742
IssuesEvent
2022-11-15 17:58:11
soflyy/oxygen-bugs-and-features
https://api.github.com/repos/soflyy/oxygen-bugs-and-features
closed
Copy & Paste Elements
enhancement feature implemented UI - UI/Usability
Posted on behalf of Michael: I would like the ability to copy and paste elements (it could be layouts, sections, or columnns or divs etc) between and across pages, templates, blocks and reusable parts. Saving them in a library, for use later would be useful too. Being forced to always save as a reusable part makes reusable parts an administrative nightmare for those who want to copy and paste a lot. But only want to save a few, since deleting them (even the editable ones) deletes all the pasted instances.
True
Copy & Paste Elements - Posted on behalf of Michael: I would like the ability to copy and paste elements (it could be layouts, sections, or columnns or divs etc) between and across pages, templates, blocks and reusable parts. Saving them in a library, for use later would be useful too. Being forced to always save as a reusable part makes reusable parts an administrative nightmare for those who want to copy and paste a lot. But only want to save a few, since deleting them (even the editable ones) deletes all the pasted instances.
usab
copy paste elements posted on behalf of michael i would like the ability to copy and paste elements it could be layouts sections or columnns or divs etc between and across pages templates blocks and reusable parts saving them in a library for use later would be useful too being forced to always save as a reusable part makes reusable parts an administrative nightmare for those who want to copy and paste a lot but only want to save a few since deleting them even the editable ones deletes all the pasted instances
1
624,553
19,701,216,936
IssuesEvent
2022-01-12 16:48:38
kubernetes/ingress-nginx
https://api.github.com/repos/kubernetes/ingress-nginx
closed
Release 1.1.1
kind/feature needs-triage needs-priority
Follow the documentation in /RELEASE.md to Release v1.1.1 /remove-kind bug /kind feature
1.0
Release 1.1.1 - Follow the documentation in /RELEASE.md to Release v1.1.1 /remove-kind bug /kind feature
non_usab
release follow the documentation in release md to release remove kind bug kind feature
0
95,650
3,954,711,183
IssuesEvent
2016-04-29 18:03:01
Automattic/mongoose
https://api.github.com/repos/Automattic/mongoose
closed
MongoDB error when adding the async cursor option to aggregate query
priority
When adding the `async` cursor option I get the following error: ``` MongoError: cursor object can't contain fields other than batchSize ``` The (simplified) query: ```Javascript var pipeline = [ { $lookup: { from: "interactions", localField: "_id", foreignField: "message_id", as: "interactions" }}, { $project: { id: "$_id", numberOfInteractions: { $size: "$interactions" } }}, { $match: { numberOfInteractions: { $eq: 0 } }} ]; var promise = Message .aggregate(pipeline) .allowDiskUse(true) .cursor({ batchSize: 2500, async: true }) .exec(); ``` If I make this modification the error goes away: ```diff diff --git a/lib/aggregate.js b/lib/aggregate.js index fd2c2fc..ad76bd6 100644 --- a/lib/aggregate.js +++ b/lib/aggregate.js @@ -499,6 +499,7 @@ Aggregate.prototype.exec = function(callback) { if (this.options && this.options.cursor) { if (this.options.cursor.async) { + delete this.options.cursor.async; return new Promise.ES6(function(resolve) { if (!_this._model.collection.buffer) { process.nextTick(function() { ``` My setup: ``` NodeJS 4.2.4 MongoDB version 3.2.5 Mongoose 4.4.13 ```
1.0
MongoDB error when adding the async cursor option to aggregate query - When adding the `async` cursor option I get the following error: ``` MongoError: cursor object can't contain fields other than batchSize ``` The (simplified) query: ```Javascript var pipeline = [ { $lookup: { from: "interactions", localField: "_id", foreignField: "message_id", as: "interactions" }}, { $project: { id: "$_id", numberOfInteractions: { $size: "$interactions" } }}, { $match: { numberOfInteractions: { $eq: 0 } }} ]; var promise = Message .aggregate(pipeline) .allowDiskUse(true) .cursor({ batchSize: 2500, async: true }) .exec(); ``` If I make this modification the error goes away: ```diff diff --git a/lib/aggregate.js b/lib/aggregate.js index fd2c2fc..ad76bd6 100644 --- a/lib/aggregate.js +++ b/lib/aggregate.js @@ -499,6 +499,7 @@ Aggregate.prototype.exec = function(callback) { if (this.options && this.options.cursor) { if (this.options.cursor.async) { + delete this.options.cursor.async; return new Promise.ES6(function(resolve) { if (!_this._model.collection.buffer) { process.nextTick(function() { ``` My setup: ``` NodeJS 4.2.4 MongoDB version 3.2.5 Mongoose 4.4.13 ```
non_usab
mongodb error when adding the async cursor option to aggregate query when adding the async cursor option i get the following error mongoerror cursor object can t contain fields other than batchsize the simplified query javascript var pipeline lookup from interactions localfield id foreignfield message id as interactions project id id numberofinteractions size interactions match numberofinteractions eq var promise message aggregate pipeline allowdiskuse true cursor batchsize async true exec if i make this modification the error goes away diff diff git a lib aggregate js b lib aggregate js index a lib aggregate js b lib aggregate js aggregate prototype exec function callback if this options this options cursor if this options cursor async delete this options cursor async return new promise function resolve if this model collection buffer process nexttick function my setup nodejs mongodb version mongoose
0
9,482
6,320,671,358
IssuesEvent
2017-07-25 02:40:23
upspin/upspin
https://api.github.com/repos/upspin/upspin
closed
doc: stress the importance of remembering secret seeds
usability
@awly [commented](https://github.com/upspin/upspin/issues/301#issuecomment-284032442) that: > Some users (myself included) will only backup their keys and will miss/forget to write down the secret seed. It's not stressed enough in the docs. We should perhaps be over-the-top in prompting users to write these strings down.
True
doc: stress the importance of remembering secret seeds - @awly [commented](https://github.com/upspin/upspin/issues/301#issuecomment-284032442) that: > Some users (myself included) will only backup their keys and will miss/forget to write down the secret seed. It's not stressed enough in the docs. We should perhaps be over-the-top in prompting users to write these strings down.
usab
doc stress the importance of remembering secret seeds awly that some users myself included will only backup their keys and will miss forget to write down the secret seed it s not stressed enough in the docs we should perhaps be over the top in prompting users to write these strings down
1
177,652
13,734,791,774
IssuesEvent
2020-10-05 09:12:35
prisma/prisma-engines
https://api.github.com/repos/prisma/prisma-engines
closed
Implement a `debugPanic` RPC in introspection engine
engines/introspection engine kind/feature team/engines topic: testing
Like in migrate engine :) It's a blocker for https://github.com/prisma/prisma/issues/3788
1.0
Implement a `debugPanic` RPC in introspection engine - Like in migrate engine :) It's a blocker for https://github.com/prisma/prisma/issues/3788
non_usab
implement a debugpanic rpc in introspection engine like in migrate engine it s a blocker for
0
19,610
14,333,155,162
IssuesEvent
2020-11-27 04:56:54
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
opened
ReplaceMerge Tree
usability
Hi Team, I have mysql db and i have port to CH by cron job with ReplcaeMerge Tree. if mysql row any column change with int/float same will be merge into same row in CH. incase change in string column mysql. IN CH same primary key duplicate row will create. Please any clue to solve this one issue.
True
ReplaceMerge Tree - Hi Team, I have mysql db and i have port to CH by cron job with ReplcaeMerge Tree. if mysql row any column change with int/float same will be merge into same row in CH. incase change in string column mysql. IN CH same primary key duplicate row will create. Please any clue to solve this one issue.
usab
replacemerge tree hi team i have mysql db and i have port to ch by cron job with replcaemerge tree if mysql row any column change with int float same will be merge into same row in ch incase change in string column mysql in ch same primary key duplicate row will create please any clue to solve this one issue
1
17,058
11,613,396,488
IssuesEvent
2020-02-26 10:39:10
virtualsatellite/VirtualSatellite4-Core
https://api.github.com/repos/virtualsatellite/VirtualSatellite4-Core
closed
Write developer manual
comfort/usability concept IDE quality wontfix
Same as the user manual, we need a developer manual. The manual should focus on using our Virtual Satellite 4 IDE to write your own concept. The manual does not cover general Virtual Satellite 4 development.
True
Write developer manual - Same as the user manual, we need a developer manual. The manual should focus on using our Virtual Satellite 4 IDE to write your own concept. The manual does not cover general Virtual Satellite 4 development.
usab
write developer manual same as the user manual we need a developer manual the manual should focus on using our virtual satellite ide to write your own concept the manual does not cover general virtual satellite development
1
19,862
14,672,760,253
IssuesEvent
2020-12-30 11:24:14
WordPress/gutenberg
https://api.github.com/repos/WordPress/gutenberg
closed
Sidebar doesn't appear when selecting a block inside a Reusable Block
Needs Dev [Feature] Reusable Blocks [Type] Bug
**Describe the bug** Before the update, when you select a block inside the reusable block, it's settings would show in the sidebar under the "Block" tab. Now the tab is empty. This issue isn't there is a block isn't reusable, but a regular block. **To reproduce** Steps to reproduce the behavior: 1. Create 2 group blocks with paragraphs in them 2. Make one block reusable. 3. Select block inside regular group and see the settings of the block in the sidebar. 4. Click "edit" on the reusable group. 5. Select the paragraph block 6. See empty sidebar on the right or reusable group settings (don't know on what this depends, but it's either way and isn't consistent). **Expected behavior** The inner block of the reusable block have settings on the right sidebar when selected **Screenshots** [block settings in a simple group](http://i.imgur.com/h8kaVu4.png) [block settings in a reusable group](http://i.imgur.com/W6zZtbY.png) [block settings in a reusable group v2](http://i.imgur.com/ne6tZlT.png) **Desktop (please complete the following information):** - OS: Ubuntu 18.04 - Browser: Chrome 78 - Version : WP 5.3
True
Sidebar doesn't appear when selecting a block inside a Reusable Block - **Describe the bug** Before the update, when you select a block inside the reusable block, it's settings would show in the sidebar under the "Block" tab. Now the tab is empty. This issue isn't there is a block isn't reusable, but a regular block. **To reproduce** Steps to reproduce the behavior: 1. Create 2 group blocks with paragraphs in them 2. Make one block reusable. 3. Select block inside regular group and see the settings of the block in the sidebar. 4. Click "edit" on the reusable group. 5. Select the paragraph block 6. See empty sidebar on the right or reusable group settings (don't know on what this depends, but it's either way and isn't consistent). **Expected behavior** The inner block of the reusable block have settings on the right sidebar when selected **Screenshots** [block settings in a simple group](http://i.imgur.com/h8kaVu4.png) [block settings in a reusable group](http://i.imgur.com/W6zZtbY.png) [block settings in a reusable group v2](http://i.imgur.com/ne6tZlT.png) **Desktop (please complete the following information):** - OS: Ubuntu 18.04 - Browser: Chrome 78 - Version : WP 5.3
usab
sidebar doesn t appear when selecting a block inside a reusable block describe the bug before the update when you select a block inside the reusable block it s settings would show in the sidebar under the block tab now the tab is empty this issue isn t there is a block isn t reusable but a regular block to reproduce steps to reproduce the behavior create group blocks with paragraphs in them make one block reusable select block inside regular group and see the settings of the block in the sidebar click edit on the reusable group select the paragraph block see empty sidebar on the right or reusable group settings don t know on what this depends but it s either way and isn t consistent expected behavior the inner block of the reusable block have settings on the right sidebar when selected screenshots desktop please complete the following information os ubuntu browser chrome version wp
1
202,873
7,055,877,940
IssuesEvent
2018-01-04 10:17:48
steemit/hivemind
https://api.github.com/repos/steemit/hivemind
closed
use is_valid flag for community posts
priority/med
Provides more flexibility in how we interpret data, and leaves possibilities open for UI and reports. It doesn't make sense to force-override the community field for comments, since they would not be accessible anyway. They should still be part of the tree, just flagged automatically. For root posts, it's not yet clear which is the ideal approach.
1.0
use is_valid flag for community posts - Provides more flexibility in how we interpret data, and leaves possibilities open for UI and reports. It doesn't make sense to force-override the community field for comments, since they would not be accessible anyway. They should still be part of the tree, just flagged automatically. For root posts, it's not yet clear which is the ideal approach.
non_usab
use is valid flag for community posts provides more flexibility in how we interpret data and leaves possibilities open for ui and reports it doesn t make sense to force override the community field for comments since they would not be accessible anyway they should still be part of the tree just flagged automatically for root posts it s not yet clear which is the ideal approach
0
63,971
26,564,225,312
IssuesEvent
2023-01-20 18:32:04
cityofaustin/atd-data-tech
https://api.github.com/repos/cityofaustin/atd-data-tech
closed
Finalize ATD submissions for APWA accreditation - Chapter 16 ROW Management (7 Practices)
Service: Data Science Project: APWA Accreditation
### Tasks for each Practice - [x] Do a final review of the Practice sheet and corresponding EVIDENCE folder using the checklist below - [x] Communicate final gaps / questions to the Lead - [x] Support Leads to ensure everything is finalized by **Jan 30th** to submit to PWD (but PWD said we can submit chapter by chapter if we don't have everything quite done by then) ### Final checklist for each Practice 1. Does the Agency Compliance statement match the Practice requirement (blue statement)? Is it specific, succinct, and easy to follow? (acronyms should be defined; vague, general statements are not good) 2. Are naming and formatting standards used? (evidence number, file names, wording, etc.) 3. Is each item of evidence listed in the Documentation/Directives table linked if possible? 4. Is there a PDF file saved for each item of evidence listed in the Documentation/Directives table? 5. Is each PDF file specific, highlighting or only including the info related to the specific Practice requirement? (entire manuals with lots of pages is not good - it should only include what's relevant; highlight exact sentences and/or headings when possible) 6. Are there any remaining comments / unanswered questions from the executive review guide? ### [Chapter 16 ROW Management (7 Practices)](https://cityofaustin.sharepoint.com/sites/ATD_APWA_Accreditation/Lists/ATD%20APWA%20Progress%20Tracker/AllItems.aspx?FilterField1=field%5F4&FilterValue1=16%20%2D%20ROW%20Management&FilterType1=Choice&viewid=db3efeaa%2D5db2%2D4df4%2D99cb%2Df1da454529cb) - [x] [16.01](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B1E8089AA-0B7D-459B-9322-77E041BBFBD9%7D&file=ATD%2016.1%20Permit%20Issuance.docx&action=default&mobileredirect=true) Permit Issuance - [x] [16.02](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B1758B879-B39C-45A8-B4C1-60200E05E847%7D&file=ATD%2016.2%20Permitting%20Responsibilitty.docx&action=default&mobileredirect=true) Permitting Responsibility - [x] [16.03](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B904701F1-5226-431F-8879-44C855A38C08%7D&file=ATD%2016.3%20Codes%20and%20Permits%20Information.docx&action=default&mobileredirect=true) Codes and Permits Information - [x] [16.04](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7BBA5726D4-41BD-41C7-9F61-17BB0B495312%7D&file=ATD%2016.4%20Permit%20Process.docx&action=default&mobileredirect=true) Permit Process - [x] [16.05](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B64B58B60-A6C5-4DCD-854F-82439359D517%7D&file=ATD%2016.5%20Permit%20Inspection.docx&action=default&mobileredirect=true) Permit Inspection - [x] [16.06](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B99E0AF59-6D0A-45A3-87CF-272234681437%7D&file=ATD%2016.6%20One-Call%20Center%20Coordination.docx&action=default&mobileredirect=true) One-Call Center Coordination - [x] [16.07](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7BD53A5157-A585-44CC-BBD8-68CECB4D73E4%7D&file=ATD%2016.7%20Utility%20Marking%20Guidelines%20and%20Color%20Code.docx&action=default&mobileredirect=true) Utility Marking Guidelines and Color Code
1.0
Finalize ATD submissions for APWA accreditation - Chapter 16 ROW Management (7 Practices) - ### Tasks for each Practice - [x] Do a final review of the Practice sheet and corresponding EVIDENCE folder using the checklist below - [x] Communicate final gaps / questions to the Lead - [x] Support Leads to ensure everything is finalized by **Jan 30th** to submit to PWD (but PWD said we can submit chapter by chapter if we don't have everything quite done by then) ### Final checklist for each Practice 1. Does the Agency Compliance statement match the Practice requirement (blue statement)? Is it specific, succinct, and easy to follow? (acronyms should be defined; vague, general statements are not good) 2. Are naming and formatting standards used? (evidence number, file names, wording, etc.) 3. Is each item of evidence listed in the Documentation/Directives table linked if possible? 4. Is there a PDF file saved for each item of evidence listed in the Documentation/Directives table? 5. Is each PDF file specific, highlighting or only including the info related to the specific Practice requirement? (entire manuals with lots of pages is not good - it should only include what's relevant; highlight exact sentences and/or headings when possible) 6. Are there any remaining comments / unanswered questions from the executive review guide? ### [Chapter 16 ROW Management (7 Practices)](https://cityofaustin.sharepoint.com/sites/ATD_APWA_Accreditation/Lists/ATD%20APWA%20Progress%20Tracker/AllItems.aspx?FilterField1=field%5F4&FilterValue1=16%20%2D%20ROW%20Management&FilterType1=Choice&viewid=db3efeaa%2D5db2%2D4df4%2D99cb%2Df1da454529cb) - [x] [16.01](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B1E8089AA-0B7D-459B-9322-77E041BBFBD9%7D&file=ATD%2016.1%20Permit%20Issuance.docx&action=default&mobileredirect=true) Permit Issuance - [x] [16.02](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B1758B879-B39C-45A8-B4C1-60200E05E847%7D&file=ATD%2016.2%20Permitting%20Responsibilitty.docx&action=default&mobileredirect=true) Permitting Responsibility - [x] [16.03](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B904701F1-5226-431F-8879-44C855A38C08%7D&file=ATD%2016.3%20Codes%20and%20Permits%20Information.docx&action=default&mobileredirect=true) Codes and Permits Information - [x] [16.04](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7BBA5726D4-41BD-41C7-9F61-17BB0B495312%7D&file=ATD%2016.4%20Permit%20Process.docx&action=default&mobileredirect=true) Permit Process - [x] [16.05](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B64B58B60-A6C5-4DCD-854F-82439359D517%7D&file=ATD%2016.5%20Permit%20Inspection.docx&action=default&mobileredirect=true) Permit Inspection - [x] [16.06](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B99E0AF59-6D0A-45A3-87CF-272234681437%7D&file=ATD%2016.6%20One-Call%20Center%20Coordination.docx&action=default&mobileredirect=true) One-Call Center Coordination - [x] [16.07](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7BD53A5157-A585-44CC-BBD8-68CECB4D73E4%7D&file=ATD%2016.7%20Utility%20Marking%20Guidelines%20and%20Color%20Code.docx&action=default&mobileredirect=true) Utility Marking Guidelines and Color Code
non_usab
finalize atd submissions for apwa accreditation chapter row management practices tasks for each practice do a final review of the practice sheet and corresponding evidence folder using the checklist below communicate final gaps questions to the lead support leads to ensure everything is finalized by jan to submit to pwd but pwd said we can submit chapter by chapter if we don t have everything quite done by then final checklist for each practice does the agency compliance statement match the practice requirement blue statement is it specific succinct and easy to follow acronyms should be defined vague general statements are not good are naming and formatting standards used evidence number file names wording etc is each item of evidence listed in the documentation directives table linked if possible is there a pdf file saved for each item of evidence listed in the documentation directives table is each pdf file specific highlighting or only including the info related to the specific practice requirement entire manuals with lots of pages is not good it should only include what s relevant highlight exact sentences and or headings when possible are there any remaining comments unanswered questions from the executive review guide permit issuance permitting responsibility codes and permits information permit process permit inspection one call center coordination utility marking guidelines and color code
0
17,994
12,473,669,416
IssuesEvent
2020-05-29 08:15:49
the-tale/the-tale
https://api.github.com/repos/the-tale/the-tale
closed
Управление данными пользователей (GDPR)
comp_general cont_community cont_usability est_medium type_story
Необходимо реализовать универсальный механизм обработки данных пользователей. Пользователь должен иметь возможность: - получить все данные о себе, которые есть в проекте - удалить все данные о себе, которые есть в проекте см. также gh-2311 и gh-737 Примерное описание архитектуры: https://tiendil.org/how-i-did-and-would-do-gdpr-support/
True
Управление данными пользователей (GDPR) - Необходимо реализовать универсальный механизм обработки данных пользователей. Пользователь должен иметь возможность: - получить все данные о себе, которые есть в проекте - удалить все данные о себе, которые есть в проекте см. также gh-2311 и gh-737 Примерное описание архитектуры: https://tiendil.org/how-i-did-and-would-do-gdpr-support/
usab
управление данными пользователей gdpr необходимо реализовать универсальный механизм обработки данных пользователей пользователь должен иметь возможность получить все данные о себе которые есть в проекте удалить все данные о себе которые есть в проекте см также gh и gh примерное описание архитектуры
1
20,478
15,587,861,090
IssuesEvent
2021-03-18 05:10:20
cpn-io/cpn-js
https://api.github.com/repos/cpn-io/cpn-js
reopened
Front-end: CTRL+Z, CTRL+Y for undo/redo
usability issue
Users expect that CTRL+Z triggers undo, CTRL+Y triggers redo. Suggested general solution: provide file/class that we (as developers) can use to set up key-bindings for various UI actions (not user-facing), this would allow us at TU/e to define key bindings for any UI action we would find relevant
True
Front-end: CTRL+Z, CTRL+Y for undo/redo - Users expect that CTRL+Z triggers undo, CTRL+Y triggers redo. Suggested general solution: provide file/class that we (as developers) can use to set up key-bindings for various UI actions (not user-facing), this would allow us at TU/e to define key bindings for any UI action we would find relevant
usab
front end ctrl z ctrl y for undo redo users expect that ctrl z triggers undo ctrl y triggers redo suggested general solution provide file class that we as developers can use to set up key bindings for various ui actions not user facing this would allow us at tu e to define key bindings for any ui action we would find relevant
1
5,673
5,872,510,527
IssuesEvent
2017-05-15 11:44:31
vmware/docker-volume-vsphere
https://api.github.com/repos/vmware/docker-volume-vsphere
closed
Add NFS client lib to vendor
component/ci-infrastructure component/guest-plugin kind/Feature P1
To mount NFS volumes we need an NFS library to get the mount protocol and NFS server mount done on the guest. This issue is to pull https://github.com/davecheney/nfs into the volume plugin repo.
1.0
Add NFS client lib to vendor - To mount NFS volumes we need an NFS library to get the mount protocol and NFS server mount done on the guest. This issue is to pull https://github.com/davecheney/nfs into the volume plugin repo.
non_usab
add nfs client lib to vendor to mount nfs volumes we need an nfs library to get the mount protocol and nfs server mount done on the guest this issue is to pull into the volume plugin repo
0
152,865
12,128,356,002
IssuesEvent
2020-04-22 20:21:22
expressjs/express
https://api.github.com/repos/expressjs/express
closed
remove acceptance tests
tests
kind of noisy imo. most of the tests should be integrated into express's tests somehow. we should just move them into a `expressjs/examples` repo or something.
1.0
remove acceptance tests - kind of noisy imo. most of the tests should be integrated into express's tests somehow. we should just move them into a `expressjs/examples` repo or something.
non_usab
remove acceptance tests kind of noisy imo most of the tests should be integrated into express s tests somehow we should just move them into a expressjs examples repo or something
0
395,310
27,065,083,853
IssuesEvent
2023-02-13 23:22:55
monetr/monetr
https://api.github.com/repos/monetr/monetr
closed
bug(docs): Help `Note` does not expand/hide properly.
bug documentation good first issue
https://monetr.app/help/ The `Note` section on this page is meant to contain the text below it. But the text is always shown and the note collapsable is doing nothing. Problem is here: https://github.com/monetr/monetr/blob/9470a34de4277b9126f7b637214d679acb9f534a/docs/help/index.md?plain=1#L8-L11 --- The text below the `??? note` should be part of the collapsable.
1.0
bug(docs): Help `Note` does not expand/hide properly. - https://monetr.app/help/ The `Note` section on this page is meant to contain the text below it. But the text is always shown and the note collapsable is doing nothing. Problem is here: https://github.com/monetr/monetr/blob/9470a34de4277b9126f7b637214d679acb9f534a/docs/help/index.md?plain=1#L8-L11 --- The text below the `??? note` should be part of the collapsable.
non_usab
bug docs help note does not expand hide properly the note section on this page is meant to contain the text below it but the text is always shown and the note collapsable is doing nothing problem is here the text below the note should be part of the collapsable
0
331,539
24,312,087,115
IssuesEvent
2022-09-30 00:07:53
cloudflare/cloudflare-docs
https://api.github.com/repos/cloudflare/cloudflare-docs
closed
Content-Security-Policy for Cloudflare Turnstile
documentation content:new
### Which Cloudflare product(s) does this pertain to? Bots ### Subject Matter Need CSP configuration manual for Cloudflare Turnstile ### Content Location https://github.com/cloudflare/cloudflare-docs/blob/production/content/turnstile/get-started/client-side-rendering.md ### Additional information Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross-Site Scripting (XSS) and data injection attacks. As of now I noticed Turnstile will load a script from `challenges.cloudflare.com` and embed an iframe pointing to the same domain, I wonder what other CSP rules I need to touch to ensure Turnstile operate properly.
1.0
Content-Security-Policy for Cloudflare Turnstile - ### Which Cloudflare product(s) does this pertain to? Bots ### Subject Matter Need CSP configuration manual for Cloudflare Turnstile ### Content Location https://github.com/cloudflare/cloudflare-docs/blob/production/content/turnstile/get-started/client-side-rendering.md ### Additional information Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross-Site Scripting (XSS) and data injection attacks. As of now I noticed Turnstile will load a script from `challenges.cloudflare.com` and embed an iframe pointing to the same domain, I wonder what other CSP rules I need to touch to ensure Turnstile operate properly.
non_usab
content security policy for cloudflare turnstile which cloudflare product s does this pertain to bots subject matter need csp configuration manual for cloudflare turnstile content location additional information content security policy csp is an added layer of security that helps to detect and mitigate certain types of attacks including cross site scripting xss and data injection attacks as of now i noticed turnstile will load a script from challenges cloudflare com and embed an iframe pointing to the same domain i wonder what other csp rules i need to touch to ensure turnstile operate properly
0
37,652
18,715,538,262
IssuesEvent
2021-11-03 03:45:32
AlgebraicJulia/Catlab.jl
https://api.github.com/repos/AlgebraicJulia/Catlab.jl
closed
Limits of free diagrams by conversion to free bipartite diagrams
performance
Limits of arbitrary diagrams in `FinSet` are currently evaluated by the naive product-then-filter algorithm, which is very inefficient. We should implement an alternative algorithm that reduces the free diagram to a free bipartite diagram having the same limit and then evaluate the latter using the specialized algorithms already implemented. It would also be interesting to investigate more efficient strategies for taking the limit of arbitrary diagrams, but the above will be the most expedient route to reasonably performant conjunctive data migrations (#532).
True
Limits of free diagrams by conversion to free bipartite diagrams - Limits of arbitrary diagrams in `FinSet` are currently evaluated by the naive product-then-filter algorithm, which is very inefficient. We should implement an alternative algorithm that reduces the free diagram to a free bipartite diagram having the same limit and then evaluate the latter using the specialized algorithms already implemented. It would also be interesting to investigate more efficient strategies for taking the limit of arbitrary diagrams, but the above will be the most expedient route to reasonably performant conjunctive data migrations (#532).
non_usab
limits of free diagrams by conversion to free bipartite diagrams limits of arbitrary diagrams in finset are currently evaluated by the naive product then filter algorithm which is very inefficient we should implement an alternative algorithm that reduces the free diagram to a free bipartite diagram having the same limit and then evaluate the latter using the specialized algorithms already implemented it would also be interesting to investigate more efficient strategies for taking the limit of arbitrary diagrams but the above will be the most expedient route to reasonably performant conjunctive data migrations
0
17,797
12,343,084,750
IssuesEvent
2020-05-15 02:51:30
gluster/glusterfs
https://api.github.com/repos/gluster/glusterfs
closed
RFE: Gluster Hot Spare
CB: disperse CB: glusterd FA: Usability & Supportability wontfix
In a Gluster arrangement of 12 drives in a 2 x (5+1) gives two layers of disks in a distributed dispersed array (similar to a JBOD of RAID5) 12 Bricks dddddp + dddddp d = data p = parity h = hotspare In this setup, allows for upto two disks to fail (as long as they aren't both in the same dispersed array. Now this is pretty standard glustering :D What I'd like to have is a "hot spare brick" somewhere in the gluster pool. So when a drive fails gluster can kick it out and use the "hot spare brick" to "rebuild" the gluster array automatically, without manual intervention. So you'd end up with 13 Bricks h dddddp + dddddp Then seeing an alert that a brick has failed we can pull that brick/node and replace with a new one which would become the new "Hot Spare"
True
RFE: Gluster Hot Spare - In a Gluster arrangement of 12 drives in a 2 x (5+1) gives two layers of disks in a distributed dispersed array (similar to a JBOD of RAID5) 12 Bricks dddddp + dddddp d = data p = parity h = hotspare In this setup, allows for upto two disks to fail (as long as they aren't both in the same dispersed array. Now this is pretty standard glustering :D What I'd like to have is a "hot spare brick" somewhere in the gluster pool. So when a drive fails gluster can kick it out and use the "hot spare brick" to "rebuild" the gluster array automatically, without manual intervention. So you'd end up with 13 Bricks h dddddp + dddddp Then seeing an alert that a brick has failed we can pull that brick/node and replace with a new one which would become the new "Hot Spare"
usab
rfe gluster hot spare in a gluster arrangement of drives in a x gives two layers of disks in a distributed dispersed array similar to a jbod of bricks dddddp dddddp d data p parity h hotspare in this setup allows for upto two disks to fail as long as they aren t both in the same dispersed array now this is pretty standard glustering d what i d like to have is a hot spare brick somewhere in the gluster pool so when a drive fails gluster can kick it out and use the hot spare brick to rebuild the gluster array automatically without manual intervention so you d end up with bricks h dddddp dddddp then seeing an alert that a brick has failed we can pull that brick node and replace with a new one which would become the new hot spare
1
350,214
31,863,074,961
IssuesEvent
2023-09-15 12:23:42
enonic/app-contentstudio
https://api.github.com/repos/enonic/app-contentstudio
closed
Add ui-tests for target path in notification message
Test
Update test to verify Locate target node in the grid after move #6764
1.0
Add ui-tests for target path in notification message - Update test to verify Locate target node in the grid after move #6764
non_usab
add ui tests for target path in notification message update test to verify locate target node in the grid after move
0
19,289
13,781,562,147
IssuesEvent
2020-10-08 16:20:50
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
opened
Dynamically reload TLS certificates
usability
**Describe the issue** We should be able to reload TLS certificates without restarting clickhouse. relates to #14106
True
Dynamically reload TLS certificates - **Describe the issue** We should be able to reload TLS certificates without restarting clickhouse. relates to #14106
usab
dynamically reload tls certificates describe the issue we should be able to reload tls certificates without restarting clickhouse relates to
1
266,663
23,252,526,920
IssuesEvent
2022-08-04 06:06:10
vanlyfe/capstone
https://api.github.com/repos/vanlyfe/capstone
closed
implement auth.test.js unit tests
Backend Create unit tests
DESCRIPTION As a backend developer, I want to have sufficient tests for my auth routes file so that I can ensure user dataflow is working well A/C - [ ] Test "POST /login" - [ ] Test "Existing user can login to their account" - [ ] Test "Throws unauthorized error when user provides wrong password" - [ ] Test "Throws bad request error when user doesn't provide password" - [ ] Test "Throws bad request error when user doesn't provide email" - [ ] Test "Throws unauthorized error when user provides wrong email" - [ ] Test "POST /register" - [ ] Test "User can create a new account" - [ ] Test "Throws bad request error when invalid credentials passed" - [ ] Test "GET /me" - [ ] Test "Authed user can access own profile" - [ ] Test "Throws unauthorized error when anonymous user tries to access user account" - [ ] Test "GET /:userId" - [ ] Test "User can fetch a user's profile details by user id" - [ ] Test "PUT "/:userId" - [ ] Test "Authed user can update their own profile" - [ ] Test "Throws forbidden error when authed user tries to update other user's profile" - [ ] Test "Throws unauthorized error when anonymous user tries to update a profile" - [ ] Test "DELETE "/:userId" - [ ] Test "Authed user can delete their own account" - [ ] Test "Throws forbidden error when authed user tries to delete other user's account" - [ ] Test "Throws unauthorized error when anonymous user tries to delete a account" DoD All test cases are defined and running them displays results in console
1.0
implement auth.test.js unit tests - DESCRIPTION As a backend developer, I want to have sufficient tests for my auth routes file so that I can ensure user dataflow is working well A/C - [ ] Test "POST /login" - [ ] Test "Existing user can login to their account" - [ ] Test "Throws unauthorized error when user provides wrong password" - [ ] Test "Throws bad request error when user doesn't provide password" - [ ] Test "Throws bad request error when user doesn't provide email" - [ ] Test "Throws unauthorized error when user provides wrong email" - [ ] Test "POST /register" - [ ] Test "User can create a new account" - [ ] Test "Throws bad request error when invalid credentials passed" - [ ] Test "GET /me" - [ ] Test "Authed user can access own profile" - [ ] Test "Throws unauthorized error when anonymous user tries to access user account" - [ ] Test "GET /:userId" - [ ] Test "User can fetch a user's profile details by user id" - [ ] Test "PUT "/:userId" - [ ] Test "Authed user can update their own profile" - [ ] Test "Throws forbidden error when authed user tries to update other user's profile" - [ ] Test "Throws unauthorized error when anonymous user tries to update a profile" - [ ] Test "DELETE "/:userId" - [ ] Test "Authed user can delete their own account" - [ ] Test "Throws forbidden error when authed user tries to delete other user's account" - [ ] Test "Throws unauthorized error when anonymous user tries to delete a account" DoD All test cases are defined and running them displays results in console
non_usab
implement auth test js unit tests description as a backend developer i want to have sufficient tests for my auth routes file so that i can ensure user dataflow is working well a c test post login test existing user can login to their account test throws unauthorized error when user provides wrong password test throws bad request error when user doesn t provide password test throws bad request error when user doesn t provide email test throws unauthorized error when user provides wrong email test post register test user can create a new account test throws bad request error when invalid credentials passed test get me test authed user can access own profile test throws unauthorized error when anonymous user tries to access user account test get userid test user can fetch a user s profile details by user id test put userid test authed user can update their own profile test throws forbidden error when authed user tries to update other user s profile test throws unauthorized error when anonymous user tries to update a profile test delete userid test authed user can delete their own account test throws forbidden error when authed user tries to delete other user s account test throws unauthorized error when anonymous user tries to delete a account dod all test cases are defined and running them displays results in console
0
24,264
23,575,790,989
IssuesEvent
2022-08-23 00:33:14
ZcashFoundation/zebra
https://api.github.com/repos/ZcashFoundation/zebra
closed
Zebra should follow OS directory conventions better
C-bug A-rust A-devops C-enhancement P-Low :snowflake: I-usability
**Is your feature request related to a problem? Please describe.** Zebra doesn't follow the config convention for any platform. Zebra doesn't follow the cache convention for macOS and Windows. **Describe the solution you'd like** - [ ] use `directories-next` to find application-specific paths - https://docs.rs/directories-next/2.0.0/directories_next/struct.ProjectDirs.html#method.cache_dir - [ ] use `ProjectDirs::cache_dir` for caches - [ ] use `ProjectDirs::config_dir` for configs - [ ] update any deployment scripts that provide custom configs - [ ] update the acceptance tests? - [ ] update the relevant documentation This is a breaking change for config and cache locations. **Describe alternatives you've considered** We could just not do this, and most people wouldn't notice. But some OSes (and automated tools) might do bad things with Zebra's configs or cache.
True
Zebra should follow OS directory conventions better - **Is your feature request related to a problem? Please describe.** Zebra doesn't follow the config convention for any platform. Zebra doesn't follow the cache convention for macOS and Windows. **Describe the solution you'd like** - [ ] use `directories-next` to find application-specific paths - https://docs.rs/directories-next/2.0.0/directories_next/struct.ProjectDirs.html#method.cache_dir - [ ] use `ProjectDirs::cache_dir` for caches - [ ] use `ProjectDirs::config_dir` for configs - [ ] update any deployment scripts that provide custom configs - [ ] update the acceptance tests? - [ ] update the relevant documentation This is a breaking change for config and cache locations. **Describe alternatives you've considered** We could just not do this, and most people wouldn't notice. But some OSes (and automated tools) might do bad things with Zebra's configs or cache.
usab
zebra should follow os directory conventions better is your feature request related to a problem please describe zebra doesn t follow the config convention for any platform zebra doesn t follow the cache convention for macos and windows describe the solution you d like use directories next to find application specific paths use projectdirs cache dir for caches use projectdirs config dir for configs update any deployment scripts that provide custom configs update the acceptance tests update the relevant documentation this is a breaking change for config and cache locations describe alternatives you ve considered we could just not do this and most people wouldn t notice but some oses and automated tools might do bad things with zebra s configs or cache
1
474
2,502,212,945
IssuesEvent
2015-01-09 05:21:45
fossology/fossology
https://api.github.com/repos/fossology/fossology
opened
Can not upload files when enable SELinux on Rhel/Fedora system
Component: Rank Component: Tester Priority: Normal Status: New Tracker: Bug
--- Author Name: **Dong Ma** Original Redmine Issue: 5007, http://www.fossology.org/issues/5007 Original Date: 2013/05/30 Original Assignee: Dong Ma --- If you enable SELinux on Rhel/Fedora system use: ``` setenforceforce 1 ``` Will get this error and the files can not be uploaded: Upload failed for file fossology-delagent-2.0.1-0.20120924190128.el6.i686.rpm: File upload failed. Error:126
1.0
Can not upload files when enable SELinux on Rhel/Fedora system - --- Author Name: **Dong Ma** Original Redmine Issue: 5007, http://www.fossology.org/issues/5007 Original Date: 2013/05/30 Original Assignee: Dong Ma --- If you enable SELinux on Rhel/Fedora system use: ``` setenforceforce 1 ``` Will get this error and the files can not be uploaded: Upload failed for file fossology-delagent-2.0.1-0.20120924190128.el6.i686.rpm: File upload failed. Error:126
non_usab
can not upload files when enable selinux on rhel fedora system author name dong ma original redmine issue original date original assignee dong ma if you enable selinux on rhel fedora system use setenforceforce will get this error and the files can not be uploaded upload failed for file fossology delagent rpm file upload failed error
0
4,991
3,898,973,921
IssuesEvent
2016-04-17 13:01:34
lionheart/openradar-mirror
https://api.github.com/repos/lionheart/openradar-mirror
opened
13949076: SLComposeViewController should optionally provide a UI for taking photos
classification:ui/usability reproducible:not applicable status:open
#### Description A reasonably common way to share things on Facebook is for the user to share a URL augmented with a photograph the user has taken. I would like SLComposeViewController to have a new property, BOOL allowsUserGeneratedPhoto. When this property is set to YES, and the SLComposeViewController is presented, there will be a new button on the SLComposeViewController that looks like a camera. Pressing this button will allow the user to take a photo or to choose one from their photo library. If they do this, the photo will be attached to that post. If a photo is attached in this manner, it should be previewed as a thumbnail in the SLComposeViewController, and there should be a way to remove it again (by tapping it maybe?). When the SLComposeViewController is posted, the image should be uploaded to Facebook, and the image[0][user_generated] API property should be set to true (so that Facebook knows that this is a user generated image). - Product Version: 6.1 Created: 2013-05-21T14:35:07.014898 Originated: 2013-05-21T15:34:00 Open Radar Link: http://www.openradar.me/13949076
True
13949076: SLComposeViewController should optionally provide a UI for taking photos - #### Description A reasonably common way to share things on Facebook is for the user to share a URL augmented with a photograph the user has taken. I would like SLComposeViewController to have a new property, BOOL allowsUserGeneratedPhoto. When this property is set to YES, and the SLComposeViewController is presented, there will be a new button on the SLComposeViewController that looks like a camera. Pressing this button will allow the user to take a photo or to choose one from their photo library. If they do this, the photo will be attached to that post. If a photo is attached in this manner, it should be previewed as a thumbnail in the SLComposeViewController, and there should be a way to remove it again (by tapping it maybe?). When the SLComposeViewController is posted, the image should be uploaded to Facebook, and the image[0][user_generated] API property should be set to true (so that Facebook knows that this is a user generated image). - Product Version: 6.1 Created: 2013-05-21T14:35:07.014898 Originated: 2013-05-21T15:34:00 Open Radar Link: http://www.openradar.me/13949076
usab
slcomposeviewcontroller should optionally provide a ui for taking photos description a reasonably common way to share things on facebook is for the user to share a url augmented with a photograph the user has taken i would like slcomposeviewcontroller to have a new property bool allowsusergeneratedphoto when this property is set to yes and the slcomposeviewcontroller is presented there will be a new button on the slcomposeviewcontroller that looks like a camera pressing this button will allow the user to take a photo or to choose one from their photo library if they do this the photo will be attached to that post if a photo is attached in this manner it should be previewed as a thumbnail in the slcomposeviewcontroller and there should be a way to remove it again by tapping it maybe when the slcomposeviewcontroller is posted the image should be uploaded to facebook and the image api property should be set to true so that facebook knows that this is a user generated image product version created originated open radar link
1
7,134
4,787,521,439
IssuesEvent
2016-10-30 02:06:28
s-rah/onionscan
https://api.github.com/repos/s-rah/onionscan
closed
Update README.md / Docs for Onionscan 0.2
usabilty
OnionScan 0.2 will add a large number of scans and features. These need to be documented somewhere - main features in the README and more detailed usage examples somewhere new (to be defined...maybe readthedocs or something)
True
Update README.md / Docs for Onionscan 0.2 - OnionScan 0.2 will add a large number of scans and features. These need to be documented somewhere - main features in the README and more detailed usage examples somewhere new (to be defined...maybe readthedocs or something)
usab
update readme md docs for onionscan onionscan will add a large number of scans and features these need to be documented somewhere main features in the readme and more detailed usage examples somewhere new to be defined maybe readthedocs or something
1
178,454
13,780,579,508
IssuesEvent
2020-10-08 15:05:32
rootzoll/raspiblitz
https://api.github.com/repos/rootzoll/raspiblitz
closed
error code: -28 error message: Loading block index...
final testing
I get this on every reboot and and I've seen a number of other people get this on 1.6. Seems like it is giving up to early or something, doesn't give enough time to let the block index load. ``` ***************************************** * The bitcoind service is not running. ***************************************** If you just started some config/setup, this might be OK. More Error Detail: error code: -28 error message: Loading block index... POSSIBLE OPTIONS: -> Use command 'repair' and then choose 'DELETE-INDEX' to try rebuilding transaction index. -> Use command 'repair' and then choose 'RESET-CHAIN' to try downloading new blockchain. -> Use command 'debug' for more log output you can use for getting support. -> Use command 'menu' to open main menu. -> Have you tried to turn it off and on again? Use command 'restart' bitcoin error: error code: -28 error message: Loading block index... ```
1.0
error code: -28 error message: Loading block index... - I get this on every reboot and and I've seen a number of other people get this on 1.6. Seems like it is giving up to early or something, doesn't give enough time to let the block index load. ``` ***************************************** * The bitcoind service is not running. ***************************************** If you just started some config/setup, this might be OK. More Error Detail: error code: -28 error message: Loading block index... POSSIBLE OPTIONS: -> Use command 'repair' and then choose 'DELETE-INDEX' to try rebuilding transaction index. -> Use command 'repair' and then choose 'RESET-CHAIN' to try downloading new blockchain. -> Use command 'debug' for more log output you can use for getting support. -> Use command 'menu' to open main menu. -> Have you tried to turn it off and on again? Use command 'restart' bitcoin error: error code: -28 error message: Loading block index... ```
non_usab
error code error message loading block index i get this on every reboot and and i ve seen a number of other people get this on seems like it is giving up to early or something doesn t give enough time to let the block index load the bitcoind service is not running if you just started some config setup this might be ok more error detail error code error message loading block index possible options use command repair and then choose delete index to try rebuilding transaction index use command repair and then choose reset chain to try downloading new blockchain use command debug for more log output you can use for getting support use command menu to open main menu have you tried to turn it off and on again use command restart bitcoin error error code error message loading block index
0
13,141
8,304,819,765
IssuesEvent
2018-09-21 23:05:49
proudcity/wp-proudcity
https://api.github.com/repos/proudcity/wp-proudcity
opened
Link accessibility review
accessibility frontend usability
Per "relying solely on color for links," we should review link styles, particularly the general ones in body text. Reviewing link accessibility and found this from 18F: >Links that only rely on color also fail this requirement. Links must be distinguished by more than just color (hue). Links can be distinguished by underlines, symbols, context (in a menu for example), or lightness. If the contrast between the surrounding text and a link is greater than 3:1 it is acceptable. Also note, the link text itself still needs to have a contrast ratio of 4.5:1 or greater with the background. More information about link color dependence. And W3C: https://www.w3.org/TR/2016/NOTE-WCAG20-TECHS-20161007/F73
True
Link accessibility review - Per "relying solely on color for links," we should review link styles, particularly the general ones in body text. Reviewing link accessibility and found this from 18F: >Links that only rely on color also fail this requirement. Links must be distinguished by more than just color (hue). Links can be distinguished by underlines, symbols, context (in a menu for example), or lightness. If the contrast between the surrounding text and a link is greater than 3:1 it is acceptable. Also note, the link text itself still needs to have a contrast ratio of 4.5:1 or greater with the background. More information about link color dependence. And W3C: https://www.w3.org/TR/2016/NOTE-WCAG20-TECHS-20161007/F73
usab
link accessibility review per relying solely on color for links we should review link styles particularly the general ones in body text reviewing link accessibility and found this from links that only rely on color also fail this requirement links must be distinguished by more than just color hue links can be distinguished by underlines symbols context in a menu for example or lightness if the contrast between the surrounding text and a link is greater than it is acceptable also note the link text itself still needs to have a contrast ratio of or greater with the background more information about link color dependence and
1
757,809
26,530,165,833
IssuesEvent
2023-01-19 11:52:41
EinStealth/EinStealth
https://api.github.com/repos/EinStealth/EinStealth
opened
UI elements側で計算の呼び出ししてる部分を直す
Mobile Priority: High
# 概要 2重LiveData問題で悩んでたけど、そもそもUI elementsで監視する必要ない。 ViewModelで計算とか判定とか呼び出しちゃって、その結果だけViewに通知すればいい。 そうすれば、Viewは何も考えず結果に応じてUIを変えるだけで良くなる # 関連するissue <!-- 関連するissueがあればここに書いてね --> <!-- ex. #{issue番号} --> # 参考 <!-- 参考資料などはここに書いてね --> # チェックリスト - [ ] 優先度tagを設定しましたか?
1.0
UI elements側で計算の呼び出ししてる部分を直す - # 概要 2重LiveData問題で悩んでたけど、そもそもUI elementsで監視する必要ない。 ViewModelで計算とか判定とか呼び出しちゃって、その結果だけViewに通知すればいい。 そうすれば、Viewは何も考えず結果に応じてUIを変えるだけで良くなる # 関連するissue <!-- 関連するissueがあればここに書いてね --> <!-- ex. #{issue番号} --> # 参考 <!-- 参考資料などはここに書いてね --> # チェックリスト - [ ] 優先度tagを設定しましたか?
non_usab
ui elements側で計算の呼び出ししてる部分を直す 概要 、そもそもui elementsで監視する必要ない。 viewmodelで計算とか判定とか呼び出しちゃって、その結果だけviewに通知すればいい。 そうすれば、viewは何も考えず結果に応じてuiを変えるだけで良くなる 関連するissue 参考 チェックリスト 優先度tagを設定しましたか?
0
234,887
25,897,947,766
IssuesEvent
2022-12-15 01:07:09
Trinadh465/linux-3.0.35
https://api.github.com/repos/Trinadh465/linux-3.0.35
opened
CVE-2013-2635 (Low) detected in linux-stable-rtv3.8.6
security vulnerability
## CVE-2013-2635 - Low Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Trinadh465/linux-3.0.35/commit/bc642faf5ff07c31ee8f8788b7523e6fa3638231">bc642faf5ff07c31ee8f8788b7523e6fa3638231</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/core/rtnetlink.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. <p>Publish Date: 2013-03-22 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-2635>CVE-2013-2635</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>2.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2013-2635">https://nvd.nist.gov/vuln/detail/CVE-2013-2635</a></p> <p>Release Date: 2013-03-22</p> <p>Fix Resolution: 3.8.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2013-2635 (Low) detected in linux-stable-rtv3.8.6 - ## CVE-2013-2635 - Low Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Trinadh465/linux-3.0.35/commit/bc642faf5ff07c31ee8f8788b7523e6fa3638231">bc642faf5ff07c31ee8f8788b7523e6fa3638231</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/core/rtnetlink.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. <p>Publish Date: 2013-03-22 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-2635>CVE-2013-2635</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>2.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2013-2635">https://nvd.nist.gov/vuln/detail/CVE-2013-2635</a></p> <p>Release Date: 2013-03-22</p> <p>Fix Resolution: 3.8.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve low detected in linux stable cve low severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files net core rtnetlink c vulnerability details the rtnl fill ifinfo function in net core rtnetlink c in the linux kernel before does not initialize a certain structure member which allows local users to obtain sensitive information from kernel stack memory via a crafted application publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
329,852
28,311,479,583
IssuesEvent
2023-04-10 15:47:37
brave/brave-browser
https://api.github.com/repos/brave/brave-browser
opened
Test failure: P3ARotationSchedulerTest.ConstellationRotation
QA/No release-notes/exclude ci-concern bot/type/test bot/arch/x64 bot/channel/nightly bot/platform/macos bot/branch/v1.52
Greetings human! Bad news. `P3ARotationSchedulerTest.ConstellationRotation` [failed on macos x64 nightly v1.52.31](https://ci.brave.com/job/brave-browser-build-macos-x64/6279/testReport/junit/(root)/P3ARotationSchedulerTest/test_unit___ConstellationRotation). <details> <summary>Stack trace</summary> ``` [ RUN ] P3ARotationSchedulerTest.ConstellationRotation ../../brave/components/p3a/rotation_scheduler_unittest.cc:69: Failure Expected equality of these values: constellation_rotation_count_ Which is: 1 0u Which is: 0 Stack trace: 0 brave_unit_tests 0x00000001046fd4f0 __rust_probestack + 16078288 [ FAILED ] P3ARotationSchedulerTest.ConstellationRotation (20 ms) [ FAILED ] P3ARotationSchedulerTest.ConstellationRotation ``` </details> <details> <summary>Previous issues</summary> * #29571 [Find all](https://github.com/brave/brave-browser/issues?q=type%3Aissue+label%3Abot%2Ftype%2Ftest+in%3Atitle+%22Test+failure%3A+P3ARotationSchedulerTest.ConstellationRotation%22) </details>
1.0
Test failure: P3ARotationSchedulerTest.ConstellationRotation - Greetings human! Bad news. `P3ARotationSchedulerTest.ConstellationRotation` [failed on macos x64 nightly v1.52.31](https://ci.brave.com/job/brave-browser-build-macos-x64/6279/testReport/junit/(root)/P3ARotationSchedulerTest/test_unit___ConstellationRotation). <details> <summary>Stack trace</summary> ``` [ RUN ] P3ARotationSchedulerTest.ConstellationRotation ../../brave/components/p3a/rotation_scheduler_unittest.cc:69: Failure Expected equality of these values: constellation_rotation_count_ Which is: 1 0u Which is: 0 Stack trace: 0 brave_unit_tests 0x00000001046fd4f0 __rust_probestack + 16078288 [ FAILED ] P3ARotationSchedulerTest.ConstellationRotation (20 ms) [ FAILED ] P3ARotationSchedulerTest.ConstellationRotation ``` </details> <details> <summary>Previous issues</summary> * #29571 [Find all](https://github.com/brave/brave-browser/issues?q=type%3Aissue+label%3Abot%2Ftype%2Ftest+in%3Atitle+%22Test+failure%3A+P3ARotationSchedulerTest.ConstellationRotation%22) </details>
non_usab
test failure constellationrotation greetings human bad news constellationrotation stack trace constellationrotation brave components rotation scheduler unittest cc failure expected equality of these values constellation rotation count which is which is stack trace brave unit tests rust probestack constellationrotation ms constellationrotation previous issues
0
308,508
9,440,137,667
IssuesEvent
2019-04-14 15:44:29
openfaas/faas
https://api.github.com/repos/openfaas/faas
closed
Proposal: Secrets Integration for OpenFaas with Vault
priority/middle proposal
HashiCorp Vault is an open source tool for managing and controlling access to tokens, passwords, certificates. Integrating OpenFaas with Vault would allow a generic backend which would enable the injection of secrets into OpenFaas. In addition to secrets Vault could be used to generate and and manage x.509 certificates for jobs again enabling transparant cross platform TLS. ## Expected Behaviour **Secrets:** When a user creates a new function in OpenFaaS they should be able to provide key/value pairs which would be encrypted and stored in Vault. When a job executes this data would be retrieved from Vault and injected into the job for it to use. **TLS:** When a job is created it would contact vault to obtain a x.509 certificate securing it with TLS. The gateway would then communicate with the service using TLS rather than plain HTTP. In addition to this the proxy could use mutual TLS with a client side certificate to ensure that the job it is talking to is intact the correct job to mitigate man in the middle attacks. ## Possible Solution The internals from consul template [https://github.com/hashicorp/consul-template](https://github.com/hashicorp/consul-template) could be embedded into the gateway to ensure that when a secret expires (all secrets have a TTL) or if the secret is updated it would be able to update the function. This would reduce the load on the Vault server and making a call every-time a function executes. Nomad and Kubernetes both have this capability when you integrate Vault and start a Job or Pod however by placing this integration into the proxy it gives agnosticism to the underlying scheduler and allows seamless integration with Swarm, Rancher, Mesos, etc. ## Context Having a central capability for secrets management and encryption functions allows functions to remain light and the author to concentrate on functionality not security. Enterprises already trust Vault and implementing it would allow them to leverage existing infrastructure. TLS can be complicated to set up and get right however leveraging Vaults CA capability allows easy creation and management for x.509 certificates.
1.0
Proposal: Secrets Integration for OpenFaas with Vault - HashiCorp Vault is an open source tool for managing and controlling access to tokens, passwords, certificates. Integrating OpenFaas with Vault would allow a generic backend which would enable the injection of secrets into OpenFaas. In addition to secrets Vault could be used to generate and and manage x.509 certificates for jobs again enabling transparant cross platform TLS. ## Expected Behaviour **Secrets:** When a user creates a new function in OpenFaaS they should be able to provide key/value pairs which would be encrypted and stored in Vault. When a job executes this data would be retrieved from Vault and injected into the job for it to use. **TLS:** When a job is created it would contact vault to obtain a x.509 certificate securing it with TLS. The gateway would then communicate with the service using TLS rather than plain HTTP. In addition to this the proxy could use mutual TLS with a client side certificate to ensure that the job it is talking to is intact the correct job to mitigate man in the middle attacks. ## Possible Solution The internals from consul template [https://github.com/hashicorp/consul-template](https://github.com/hashicorp/consul-template) could be embedded into the gateway to ensure that when a secret expires (all secrets have a TTL) or if the secret is updated it would be able to update the function. This would reduce the load on the Vault server and making a call every-time a function executes. Nomad and Kubernetes both have this capability when you integrate Vault and start a Job or Pod however by placing this integration into the proxy it gives agnosticism to the underlying scheduler and allows seamless integration with Swarm, Rancher, Mesos, etc. ## Context Having a central capability for secrets management and encryption functions allows functions to remain light and the author to concentrate on functionality not security. Enterprises already trust Vault and implementing it would allow them to leverage existing infrastructure. TLS can be complicated to set up and get right however leveraging Vaults CA capability allows easy creation and management for x.509 certificates.
non_usab
proposal secrets integration for openfaas with vault hashicorp vault is an open source tool for managing and controlling access to tokens passwords certificates integrating openfaas with vault would allow a generic backend which would enable the injection of secrets into openfaas in addition to secrets vault could be used to generate and and manage x certificates for jobs again enabling transparant cross platform tls expected behaviour secrets when a user creates a new function in openfaas they should be able to provide key value pairs which would be encrypted and stored in vault when a job executes this data would be retrieved from vault and injected into the job for it to use tls when a job is created it would contact vault to obtain a x certificate securing it with tls the gateway would then communicate with the service using tls rather than plain http in addition to this the proxy could use mutual tls with a client side certificate to ensure that the job it is talking to is intact the correct job to mitigate man in the middle attacks possible solution the internals from consul template could be embedded into the gateway to ensure that when a secret expires all secrets have a ttl or if the secret is updated it would be able to update the function this would reduce the load on the vault server and making a call every time a function executes nomad and kubernetes both have this capability when you integrate vault and start a job or pod however by placing this integration into the proxy it gives agnosticism to the underlying scheduler and allows seamless integration with swarm rancher mesos etc context having a central capability for secrets management and encryption functions allows functions to remain light and the author to concentrate on functionality not security enterprises already trust vault and implementing it would allow them to leverage existing infrastructure tls can be complicated to set up and get right however leveraging vaults ca capability allows easy creation and management for x certificates
0
12,934
8,198,376,715
IssuesEvent
2018-08-31 16:10:40
precice/precice
https://api.github.com/repos/precice/precice
closed
Improve error message for wrong use of writeBlockVectorData
bug usability
If data is (accidentally) defined as `data:scalar` in `precice-config.xml`, while inside the adapter `writeBlockVectorData` is used the following error message is returned: ``` ASSERTION FAILED Location: void precice::impl::SolverInterfaceImpl::writeBlockVectorData(int, int, int*, double*) File: src/precice/impl/SolverInterfaceImpl.cpp:1159 Rank: 0 Failed expression: offset+dim < valuesInternal.size() Argument 0: 1 Argument 1: 1 ``` Providing a correct `precice-config.xml` with `data:vector`, of course, works. A code example where this behaviour is reproduced can be found on the branch [reproducePythonAssertionFail](https://github.com/precice/precice/tree/reproducePythonAssertionFail), https://github.com/precice/precice/commit/6a8bb353fd6327d92ff66f4de106083d348900e0 in [/tools/solverdummies/python/assertionfail](https://github.com/precice/precice/tree/6a8bb353fd6327d92ff66f4de106083d348900e0/tools/solverdummies/python/assertionfail). Just use the same commands for running as for the original python solverdummy [see README.md](https://github.com/precice/precice/blob/6a8bb353fd6327d92ff66f4de106083d348900e0/tools/solverdummies/python/README.md) **side note:** if you use `data:vector` in `precice-config.xml`, while inside the adapter `writeBlockScalarData`, no assertion fail is returned. we should consider returning an error in this case, as well. # Progress - [x] only with python bindings or general issue? -> general issue - [ ] meaningful error if `data:scalar` in `precice-config.xml` and `writeBlockVectorData` in adapter - [ ] meaningful error if `data:vector` in `precice-config.xml` and `writeBlockScalarData` in adapter
True
Improve error message for wrong use of writeBlockVectorData - If data is (accidentally) defined as `data:scalar` in `precice-config.xml`, while inside the adapter `writeBlockVectorData` is used the following error message is returned: ``` ASSERTION FAILED Location: void precice::impl::SolverInterfaceImpl::writeBlockVectorData(int, int, int*, double*) File: src/precice/impl/SolverInterfaceImpl.cpp:1159 Rank: 0 Failed expression: offset+dim < valuesInternal.size() Argument 0: 1 Argument 1: 1 ``` Providing a correct `precice-config.xml` with `data:vector`, of course, works. A code example where this behaviour is reproduced can be found on the branch [reproducePythonAssertionFail](https://github.com/precice/precice/tree/reproducePythonAssertionFail), https://github.com/precice/precice/commit/6a8bb353fd6327d92ff66f4de106083d348900e0 in [/tools/solverdummies/python/assertionfail](https://github.com/precice/precice/tree/6a8bb353fd6327d92ff66f4de106083d348900e0/tools/solverdummies/python/assertionfail). Just use the same commands for running as for the original python solverdummy [see README.md](https://github.com/precice/precice/blob/6a8bb353fd6327d92ff66f4de106083d348900e0/tools/solverdummies/python/README.md) **side note:** if you use `data:vector` in `precice-config.xml`, while inside the adapter `writeBlockScalarData`, no assertion fail is returned. we should consider returning an error in this case, as well. # Progress - [x] only with python bindings or general issue? -> general issue - [ ] meaningful error if `data:scalar` in `precice-config.xml` and `writeBlockVectorData` in adapter - [ ] meaningful error if `data:vector` in `precice-config.xml` and `writeBlockScalarData` in adapter
usab
improve error message for wrong use of writeblockvectordata if data is accidentally defined as data scalar in precice config xml while inside the adapter writeblockvectordata is used the following error message is returned assertion failed location void precice impl solverinterfaceimpl writeblockvectordata int int int double file src precice impl solverinterfaceimpl cpp rank failed expression offset dim valuesinternal size argument argument providing a correct precice config xml with data vector of course works a code example where this behaviour is reproduced can be found on the branch in just use the same commands for running as for the original python solverdummy side note if you use data vector in precice config xml while inside the adapter writeblockscalardata no assertion fail is returned we should consider returning an error in this case as well progress only with python bindings or general issue general issue meaningful error if data scalar in precice config xml and writeblockvectordata in adapter meaningful error if data vector in precice config xml and writeblockscalardata in adapter
1
805,416
29,519,762,893
IssuesEvent
2023-06-04 23:04:04
cse110-sp23-group27/Fortune-Telling-Group-27
https://api.github.com/repos/cse110-sp23-group27/Fortune-Telling-Group-27
closed
Fix bug related to going back to home page, and tarot cards disappearing
bug Priority
# Describe the task: The tarot cards are not showing up again after the home page button is clicked. To be more specific, after going through the tarot card process once and the home page button is clicked, the shuffling animation does not play and the tarot cards do not show up. Also, after clicking the three tarot cards, they disappear. Not sure if that's a bug or if it's intended. # Possible implementations/steps to take: * Take a look at how the tarot cards are generated when clicked * See if the html elements of the cards are showing up or not when the shuffle card button is clicked again # Resources: # Possible people to ask/assign: @ejoa27
1.0
Fix bug related to going back to home page, and tarot cards disappearing - # Describe the task: The tarot cards are not showing up again after the home page button is clicked. To be more specific, after going through the tarot card process once and the home page button is clicked, the shuffling animation does not play and the tarot cards do not show up. Also, after clicking the three tarot cards, they disappear. Not sure if that's a bug or if it's intended. # Possible implementations/steps to take: * Take a look at how the tarot cards are generated when clicked * See if the html elements of the cards are showing up or not when the shuffle card button is clicked again # Resources: # Possible people to ask/assign: @ejoa27
non_usab
fix bug related to going back to home page and tarot cards disappearing describe the task the tarot cards are not showing up again after the home page button is clicked to be more specific after going through the tarot card process once and the home page button is clicked the shuffling animation does not play and the tarot cards do not show up also after clicking the three tarot cards they disappear not sure if that s a bug or if it s intended possible implementations steps to take take a look at how the tarot cards are generated when clicked see if the html elements of the cards are showing up or not when the shuffle card button is clicked again resources possible people to ask assign
0
5,274
3,917,002,231
IssuesEvent
2016-04-21 05:57:19
kolliSuman/issues
https://api.github.com/repos/kolliSuman/issues
closed
QA_Image Segmentation_Prerequisites_p1
Category: Usability Developed By: VLEAD Release Number: Production Severity: S2 Status: Open
Defect Description : In the "Image Segmentation" experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required Actual Result : In the "Image Segmentation" experiment, the minimum requirement to run the experiment is not displayed in the page Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 Test Step Link: https://github.com/Virtual-Labs/image-processing-iiith/blob/master/test-cases/integration_test-cases/Image%20Segmentation/Image%20Segmentation_21_Prerequisites_p1.org
True
QA_Image Segmentation_Prerequisites_p1 - Defect Description : In the "Image Segmentation" experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required Actual Result : In the "Image Segmentation" experiment, the minimum requirement to run the experiment is not displayed in the page Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 Test Step Link: https://github.com/Virtual-Labs/image-processing-iiith/blob/master/test-cases/integration_test-cases/Image%20Segmentation/Image%20Segmentation_21_Prerequisites_p1.org
usab
qa image segmentation prerequisites defect description in the image segmentation experiment the minimum requirement to run the experiment is not displayed in the page instead a page or scrolling should appear providing information on minimum requirement to run this experiment information like bandwidth device resolution hardware configuration and software required actual result in the image segmentation experiment the minimum requirement to run the experiment is not displayed in the page environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor test step link
1
27,382
28,264,135,143
IssuesEvent
2023-04-07 04:16:35
wazuh/wazuh
https://api.github.com/repos/wazuh/wazuh
opened
General active response optimization issues
module/active response feed/active response type/enhancement/usability
|Wazuh version|Component|Install type|Install method|Platform| |---|---|---|---|---| | 4.4.x | Wazuh component | Manager/Agent | Packages/Sources | OS version | ### Description Wazuh has several out of the box active responses for some operating systems it supports (Windows, Linux/Unix). This issue aims to track all defects, misbehavior and missing features of current active response scripts and optimize them in next Wazuh versions. ### Current AR scripts Wazuh has the following out-of-the-box active response scripts: **Windows** ``` PS C:\Program Files (x86)\ossec-agent\active-response\bin> ls Directory: C:\Program Files (x86)\ossec-agent\active-response\bin Mode LastWriteTime Length Name ---- ------------- ------ ---- -a---- 9/13/2022 4:35 PM 52312 netsh.exe -a---- 9/13/2022 4:35 PM 50776 restart-wazuh.exe -a---- 9/13/2022 4:35 PM 52312 route-null.exe ``` **Linux** ``` vagrant@Ubuntu:~$ sudo ls -l /var/ossec/active-response/bin total 248 -rwxr-x--- 1 root ossec 19504 Nov 12 2021 default-firewall-drop -rwxr-x--- 1 root ossec 16112 Nov 12 2021 disable-account -rwxr-x--- 1 root ossec 19504 Nov 12 2021 firewall-drop -rwxr-x--- 1 root ossec 20528 Nov 12 2021 firewalld-drop -rwxr-x--- 1 root ossec 17480 Nov 12 2021 host-deny -rwxr-x--- 1 root ossec 15376 Nov 12 2021 ip-customblock -rwxr-x--- 1 root ossec 16040 Nov 12 2021 ipfw -rwxr-x--- 1 root ossec 15352 Nov 12 2021 kaspersky -rwxr-x--- 1 root ossec 14434 Nov 12 2021 kaspersky.py -rwxr-x--- 1 root ossec 15984 Nov 12 2021 npf -rwxr-x--- 1 root ossec 16112 Nov 12 2021 pf -rwxr-x--- 1 root ossec 15352 Nov 12 2021 restart-wazuh -rwxr-x--- 1 root ossec 1038 Nov 12 2021 restart.sh -rwxr-x--- 1 root ossec 15368 Nov 12 2021 route-null -rwxr-x--- 1 root ossec 16256 Nov 12 2021 wazuh-slack ``` ### Linked issues The table below would hold all child issues linked to General active response optimization issues. |Issue #|title|Platform| |---|---|---| | #15520 | Show error message on the dashboard when firewalld-drop active response fails to run | Linux/Unix | | #15563 | Show error message on the dashboard when ipfw active response fails to run | Linux/Unix | | #15652 | Show error message on the dashboard when npf active response fails to run | Linux/Unix | | #15666 | pf active response fails to run and there is no error shown on the Wazuh dashboard | Linux/Unix | | #15668 | Show error message on the dashboard when host-deny active response fails to run | Linux/Unix | | #15687 | Show alert when route-null active response fails to run due to the absence of net-tools on Linux/Unix endpoints | Linux/Unix | | #15710 | Show error when kaspersky active response fails to run | Linux/Unix | | #15712 | kaspersky active response with --full_scan arguments deletes packages and system binaries | Linux/Unix | | #16460 | host-deny uses wrong address format when srcip is an IPv6 address | Linux/Unix | | #16514 | Active-response Kaspersky is not parsing extra_args correctly | Linux/Unix | | #16461 | Add required square brackets arround srcip if it looks like IPv6 | Linux/Unix | ### Expected changes The following changes are to be expected: All related documentation that uses these scripts will be updated. ### General notes Any comments and use cases that need to be accounted for in this issue should be added as a comment below.
True
General active response optimization issues - |Wazuh version|Component|Install type|Install method|Platform| |---|---|---|---|---| | 4.4.x | Wazuh component | Manager/Agent | Packages/Sources | OS version | ### Description Wazuh has several out of the box active responses for some operating systems it supports (Windows, Linux/Unix). This issue aims to track all defects, misbehavior and missing features of current active response scripts and optimize them in next Wazuh versions. ### Current AR scripts Wazuh has the following out-of-the-box active response scripts: **Windows** ``` PS C:\Program Files (x86)\ossec-agent\active-response\bin> ls Directory: C:\Program Files (x86)\ossec-agent\active-response\bin Mode LastWriteTime Length Name ---- ------------- ------ ---- -a---- 9/13/2022 4:35 PM 52312 netsh.exe -a---- 9/13/2022 4:35 PM 50776 restart-wazuh.exe -a---- 9/13/2022 4:35 PM 52312 route-null.exe ``` **Linux** ``` vagrant@Ubuntu:~$ sudo ls -l /var/ossec/active-response/bin total 248 -rwxr-x--- 1 root ossec 19504 Nov 12 2021 default-firewall-drop -rwxr-x--- 1 root ossec 16112 Nov 12 2021 disable-account -rwxr-x--- 1 root ossec 19504 Nov 12 2021 firewall-drop -rwxr-x--- 1 root ossec 20528 Nov 12 2021 firewalld-drop -rwxr-x--- 1 root ossec 17480 Nov 12 2021 host-deny -rwxr-x--- 1 root ossec 15376 Nov 12 2021 ip-customblock -rwxr-x--- 1 root ossec 16040 Nov 12 2021 ipfw -rwxr-x--- 1 root ossec 15352 Nov 12 2021 kaspersky -rwxr-x--- 1 root ossec 14434 Nov 12 2021 kaspersky.py -rwxr-x--- 1 root ossec 15984 Nov 12 2021 npf -rwxr-x--- 1 root ossec 16112 Nov 12 2021 pf -rwxr-x--- 1 root ossec 15352 Nov 12 2021 restart-wazuh -rwxr-x--- 1 root ossec 1038 Nov 12 2021 restart.sh -rwxr-x--- 1 root ossec 15368 Nov 12 2021 route-null -rwxr-x--- 1 root ossec 16256 Nov 12 2021 wazuh-slack ``` ### Linked issues The table below would hold all child issues linked to General active response optimization issues. |Issue #|title|Platform| |---|---|---| | #15520 | Show error message on the dashboard when firewalld-drop active response fails to run | Linux/Unix | | #15563 | Show error message on the dashboard when ipfw active response fails to run | Linux/Unix | | #15652 | Show error message on the dashboard when npf active response fails to run | Linux/Unix | | #15666 | pf active response fails to run and there is no error shown on the Wazuh dashboard | Linux/Unix | | #15668 | Show error message on the dashboard when host-deny active response fails to run | Linux/Unix | | #15687 | Show alert when route-null active response fails to run due to the absence of net-tools on Linux/Unix endpoints | Linux/Unix | | #15710 | Show error when kaspersky active response fails to run | Linux/Unix | | #15712 | kaspersky active response with --full_scan arguments deletes packages and system binaries | Linux/Unix | | #16460 | host-deny uses wrong address format when srcip is an IPv6 address | Linux/Unix | | #16514 | Active-response Kaspersky is not parsing extra_args correctly | Linux/Unix | | #16461 | Add required square brackets arround srcip if it looks like IPv6 | Linux/Unix | ### Expected changes The following changes are to be expected: All related documentation that uses these scripts will be updated. ### General notes Any comments and use cases that need to be accounted for in this issue should be added as a comment below.
usab
general active response optimization issues wazuh version component install type install method platform x wazuh component manager agent packages sources os version description wazuh has several out of the box active responses for some operating systems it supports windows linux unix this issue aims to track all defects misbehavior and missing features of current active response scripts and optimize them in next wazuh versions current ar scripts wazuh has the following out of the box active response scripts windows ps c program files ossec agent active response bin ls directory c program files ossec agent active response bin mode lastwritetime length name a pm netsh exe a pm restart wazuh exe a pm route null exe linux vagrant ubuntu sudo ls l var ossec active response bin total rwxr x root ossec nov default firewall drop rwxr x root ossec nov disable account rwxr x root ossec nov firewall drop rwxr x root ossec nov firewalld drop rwxr x root ossec nov host deny rwxr x root ossec nov ip customblock rwxr x root ossec nov ipfw rwxr x root ossec nov kaspersky rwxr x root ossec nov kaspersky py rwxr x root ossec nov npf rwxr x root ossec nov pf rwxr x root ossec nov restart wazuh rwxr x root ossec nov restart sh rwxr x root ossec nov route null rwxr x root ossec nov wazuh slack linked issues the table below would hold all child issues linked to general active response optimization issues issue title platform show error message on the dashboard when firewalld drop active response fails to run linux unix show error message on the dashboard when ipfw active response fails to run linux unix show error message on the dashboard when npf active response fails to run linux unix pf active response fails to run and there is no error shown on the wazuh dashboard linux unix show error message on the dashboard when host deny active response fails to run linux unix show alert when route null active response fails to run due to the absence of net tools on linux unix endpoints linux unix show error when kaspersky active response fails to run linux unix kaspersky active response with full scan arguments deletes packages and system binaries linux unix host deny uses wrong address format when srcip is an address linux unix active response kaspersky is not parsing extra args correctly linux unix add required square brackets arround srcip if it looks like linux unix expected changes the following changes are to be expected all related documentation that uses these scripts will be updated general notes any comments and use cases that need to be accounted for in this issue should be added as a comment below
1
9,464
6,307,789,139
IssuesEvent
2017-07-22 05:01:59
lionheart/openradar-mirror
https://api.github.com/repos/lionheart/openradar-mirror
opened
33469314: The storage description popups' arrows details overlap with their content
classification:ui/usability status:open
#### Description Summary: In the summary on the bottom of the window where it shows a chart for the device's internal storage usage, there are some popups that appear when you hover on any of the categories. Unfortunately it appears that the arrows used for these popups overlap with their actual text. See attached screenshot. Steps to Reproduce: 1. Connect an iOS device to iTunes. 2. Open the summary view for it. 3. Hover over a storage category on the bottom of the page. Expected Results: The arrow for the popup doesn't overlap with its content. Observed Results: The arrow overlaps. Version: iTunes 12.7.0.48 Notes: Regression from the last version of iTunes. Configuration: MacBook Pro (Retina, 13-inch, Early 2015) running macOS High Sierra 10.13 Beta (17A306f) - Product Version: iTunes 12.7.0.48 Created: 2017-07-22T04:52:28.975980 Originated: 2017-07-21T21:39:00 Open Radar Link: http://www.openradar.me/33469314
True
33469314: The storage description popups' arrows details overlap with their content - #### Description Summary: In the summary on the bottom of the window where it shows a chart for the device's internal storage usage, there are some popups that appear when you hover on any of the categories. Unfortunately it appears that the arrows used for these popups overlap with their actual text. See attached screenshot. Steps to Reproduce: 1. Connect an iOS device to iTunes. 2. Open the summary view for it. 3. Hover over a storage category on the bottom of the page. Expected Results: The arrow for the popup doesn't overlap with its content. Observed Results: The arrow overlaps. Version: iTunes 12.7.0.48 Notes: Regression from the last version of iTunes. Configuration: MacBook Pro (Retina, 13-inch, Early 2015) running macOS High Sierra 10.13 Beta (17A306f) - Product Version: iTunes 12.7.0.48 Created: 2017-07-22T04:52:28.975980 Originated: 2017-07-21T21:39:00 Open Radar Link: http://www.openradar.me/33469314
usab
the storage description popups arrows details overlap with their content description summary in the summary on the bottom of the window where it shows a chart for the device s internal storage usage there are some popups that appear when you hover on any of the categories unfortunately it appears that the arrows used for these popups overlap with their actual text see attached screenshot steps to reproduce connect an ios device to itunes open the summary view for it hover over a storage category on the bottom of the page expected results the arrow for the popup doesn t overlap with its content observed results the arrow overlaps version itunes notes regression from the last version of itunes configuration macbook pro retina inch early running macos high sierra beta product version itunes created originated open radar link
1
23,087
20,992,145,623
IssuesEvent
2022-03-29 10:15:04
HicServices/RDMP
https://api.github.com/repos/HicServices/RDMP
closed
Refactor Pipeline to support DialogArgs and be more userfriendly
enhancement usability
**Pipeline Screen** - [x] Change window title to the "task" value - [x] Remove burger menu - [ ] Reorder top bar to be: Project Name - Cohort Builder Query Name - Cohort Database Name - Cohort Name (not possible at present) - [x] Update Cohort Name icon in top bar to be person icon - [x] Remove "Task" (as this is now the window title) - [x] Update pipeline to say "Select..." if none is selected - [x] Add numbering to tasks (i.e. 1. Select Pipeline, 2. Execute Pipeline) - [ ] Once executed, show/enable "View Committed Cohort" button that highlights the Cohort in the tree (being developed in #981 )
True
Refactor Pipeline to support DialogArgs and be more userfriendly - **Pipeline Screen** - [x] Change window title to the "task" value - [x] Remove burger menu - [ ] Reorder top bar to be: Project Name - Cohort Builder Query Name - Cohort Database Name - Cohort Name (not possible at present) - [x] Update Cohort Name icon in top bar to be person icon - [x] Remove "Task" (as this is now the window title) - [x] Update pipeline to say "Select..." if none is selected - [x] Add numbering to tasks (i.e. 1. Select Pipeline, 2. Execute Pipeline) - [ ] Once executed, show/enable "View Committed Cohort" button that highlights the Cohort in the tree (being developed in #981 )
usab
refactor pipeline to support dialogargs and be more userfriendly pipeline screen change window title to the task value remove burger menu reorder top bar to be project name cohort builder query name cohort database name cohort name not possible at present update cohort name icon in top bar to be person icon remove task as this is now the window title update pipeline to say select if none is selected add numbering to tasks i e select pipeline execute pipeline once executed show enable view committed cohort button that highlights the cohort in the tree being developed in
1
6,194
4,174,944,130
IssuesEvent
2016-06-21 15:26:22
MISP/MISP
https://api.github.com/repos/MISP/MISP
closed
In search results - add icon to add proposal
usability visual
for events where the user does not have rights to edit attributes. What is happing now is that the icon is added for all the attributes including the ones where the user does not have rights to edit an attribute, which leads back to the index with a warning message "invalid attribute".
True
In search results - add icon to add proposal - for events where the user does not have rights to edit attributes. What is happing now is that the icon is added for all the attributes including the ones where the user does not have rights to edit an attribute, which leads back to the index with a warning message "invalid attribute".
usab
in search results add icon to add proposal for events where the user does not have rights to edit attributes what is happing now is that the icon is added for all the attributes including the ones where the user does not have rights to edit an attribute which leads back to the index with a warning message invalid attribute
1
218,222
24,351,850,409
IssuesEvent
2022-10-03 01:25:34
Vonage/vonage-java-code-snippets
https://api.github.com/repos/Vonage/vonage-java-code-snippets
opened
jackson-databind-2.13.3.jar: 2 vulnerabilities (highest severity is: 5.5)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2022-42004](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42004) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | jackson-databind-2.13.3.jar | Direct | com.fasterxml.jackson.core:jackson-databind:2.13.4 | &#9989; | | [CVE-2022-42003](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42003) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | jackson-databind-2.13.3.jar | Direct | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-42004</summary> ### Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.13.3.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization. <p>Publish Date: 2022-10-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42004>CVE-2022-42004</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.13.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-42003</summary> ### Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.13.3.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. <p>Publish Date: 2022-10-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42003>CVE-2022-42003</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
jackson-databind-2.13.3.jar: 2 vulnerabilities (highest severity is: 5.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2022-42004](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42004) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | jackson-databind-2.13.3.jar | Direct | com.fasterxml.jackson.core:jackson-databind:2.13.4 | &#9989; | | [CVE-2022-42003](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42003) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | jackson-databind-2.13.3.jar | Direct | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-42004</summary> ### Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.13.3.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization. <p>Publish Date: 2022-10-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42004>CVE-2022-42004</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.13.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-42003</summary> ### Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.13.3.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. <p>Publish Date: 2022-10-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42003>CVE-2022-42003</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_usab
jackson databind jar vulnerabilities highest severity is vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar les files com fasterxml jackson core jackson databind jackson databind jar vulnerabilities cve severity cvss dependency type fixed in remediation available medium jackson databind jar direct com fasterxml jackson core jackson databind medium jackson databind jar direct n a details cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar les files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in base branch master vulnerability details in fasterxml jackson databind before resource exhaustion can occur because of a lack of a check in beandeserializer deserializefromarray to prevent use of deeply nested arrays an application is vulnerable only with certain customized choices for deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar les files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in base branch master vulnerability details in fasterxml jackson databind before resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting when the unwrap single value arrays feature is enabled publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href rescue worker helmet automatic remediation is available for this issue
0
469,491
13,518,938,869
IssuesEvent
2020-09-15 00:32:48
grpc/grpc
https://api.github.com/repos/grpc/grpc
closed
Type Mismatch: Signed to Unsigned
disposition/requires reporter action disposition/stale kind/internal cleanup lang/core priority/P2
**Summary** The function in http2_settings.cc is declared to return an unsigned value, but on line 46 it returns a signed value.The function is declared to return an unsigned number but returns a signed value. ### What version of gRPC and what language are you using? 0.0.3 , IOS Swift ### What operating system (Linux, Windows,...) and version? MAC OS -10.15.3 ### What did you do? **Explanation** It is dangerous to rely on implicit casts between signed and unsigned numbers because the result can take on an unexpected value and violate weak assumptions made elsewhere in the program.
1.0
Type Mismatch: Signed to Unsigned - **Summary** The function in http2_settings.cc is declared to return an unsigned value, but on line 46 it returns a signed value.The function is declared to return an unsigned number but returns a signed value. ### What version of gRPC and what language are you using? 0.0.3 , IOS Swift ### What operating system (Linux, Windows,...) and version? MAC OS -10.15.3 ### What did you do? **Explanation** It is dangerous to rely on implicit casts between signed and unsigned numbers because the result can take on an unexpected value and violate weak assumptions made elsewhere in the program.
non_usab
type mismatch signed to unsigned summary the function in settings cc is declared to return an unsigned value but on line it returns a signed value the function is declared to return an unsigned number but returns a signed value what version of grpc and what language are you using ios swift what operating system linux windows and version mac os what did you do explanation it is dangerous to rely on implicit casts between signed and unsigned numbers because the result can take on an unexpected value and violate weak assumptions made elsewhere in the program
0
16,782
9,527,491,280
IssuesEvent
2019-04-29 04:18:16
tensorflow/tensorflow
https://api.github.com/repos/tensorflow/tensorflow
closed
There is still bug with function tf.keras.layers.Conv3DTranspose when its input shape is None
comp:keras stat:awaiting response type:bug/performance
<em>Please make sure that this is a bug. As per our [GitHub Policy](https://github.com/tensorflow/tensorflow/blob/master/ISSUES.md), we only address code/doc bugs, performance issues, feature requests and build/installation issues on GitHub. tag:bug_template</em> **System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04.2 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: - TensorFlow installed from (source or binary): source - TensorFlow version (use command below): 1.13.1 - Python version: 3.7 You can collect some of this information using our environment capture [script](https://github.com/tensorflow/tensorflow/tree/master/tools/tf_env_collect.sh) You can also obtain the TensorFlow version with python -c "import tensorflow as tf; print(tf.GIT_VERSION, tf.VERSION)" **Describe the current behavior** Hi, here's my code: input_img = keras.layers.Input( shape=( None, len(params2), len(params2), 1 ) ) # adapt this if using `channels_first` image data format conv1 = keras.layers.Conv3D(filters=32, kernel_size=(1, 3, 3), strides=(1, 1, 1), activation='selu', padding='same', data_format='channels_last', name='conv1')(input_img) conv2 = keras.layers.Conv3D(filters=64, kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv2')(conv1) conv3 = keras.layers.Conv3D(filters=128,kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv3')(conv2) conv4 = keras.layers.Conv3D(filters=256,kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv4')(conv3) convlstm1 = keras.layers.ConvLSTM2D(filters=32, return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm1')(conv1) convlstm2 = keras.layers.ConvLSTM2D(filters=64, return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm2')(conv2) convlstm3 = keras.layers.ConvLSTM2D(filters=128,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm3')(conv3) convlstm4 = keras.layers.ConvLSTM2D(filters=256,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm4')(conv4) deconv4 = keras.layers.Conv3DTranspose(filters=128, kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv4')(convlstm4) concat4 = keras.layers.Concatenate(axis=4, name='concat4')([convlstm3, deconv4]) deconv3 = keras.layers.Conv3DTranspose(filters=64 , kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv3')(concat4) concat3 = keras.layers.Concatenate(axis=4, name='concat3')([convlstm2, deconv3]) deconv2 = keras.layers.Conv3DTranspose(filters=32 , kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same' , data_format='channels_last', name='deconv2')(concat3) concat2 = keras.layers.Concatenate(axis=4, name='concat2')([convlstm1, deconv2]) deconv1 = keras.layers.Conv3DTranspose(filters=1 , kernel_size=(1, 3, 3), strides=(1, 1, 1), activation='selu', padding='same' , data_format='channels_last', name='deconv1')(concat2) autoencoder = keras.models.Model(input_img, deconv1) autoencoder.compile(optimizer='adadelta', loss='binary_crossentropy') autoencoder.summary() and here's the error message: TypeError Traceback (most recent call last) <ipython-input-150-83622ca7a77b> in <module> 28 return autoencoder 29 ---> 30 autoencoder1(1700) <ipython-input-150-83622ca7a77b> in autoencoder1(file_length) 14 convlstm4 = keras.layers.ConvLSTM2D(filters=256,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm4')(conv4) 15 ---> 16 deconv4 = keras.layers.Conv3DTranspose(filters=128, kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv4')(convlstm4) 17 concat4 = keras.layers.Concatenate(axis=4, name='concat4')([convlstm3, deconv4]) 18 deconv3 = keras.layers.Conv3DTranspose(filters=64 , kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv3')(concat4) ~/anaconda3/lib/python3.7/site-packages/tensorflow/python/keras/engine/base_layer.py in __call__(self, inputs, *args, **kwargs) 552 # In graph mode, failure to build the layer's graph 553 # implies a user-side bug. We don't catch exceptions. --> 554 outputs = self.call(inputs, *args, **kwargs) 555 else: 556 try: ~/anaconda3/lib/python3.7/site-packages/tensorflow/python/keras/layers/convolutional.py in call(self, inputs) 1138 else: 1139 outputs_4d = array_ops.reshape(outputs, [ -> 1140 outputs_shape[0], outputs_shape[1] * outputs_shape[2], 1141 outputs_shape[3], outputs_shape[4] 1142 ]) TypeError: unsupported operand type(s) for *: 'NoneType' and 'int' You just said that this problem was solved. But I'm really not sure why I still have this problem today on April 2019.
True
There is still bug with function tf.keras.layers.Conv3DTranspose when its input shape is None - <em>Please make sure that this is a bug. As per our [GitHub Policy](https://github.com/tensorflow/tensorflow/blob/master/ISSUES.md), we only address code/doc bugs, performance issues, feature requests and build/installation issues on GitHub. tag:bug_template</em> **System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04.2 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: - TensorFlow installed from (source or binary): source - TensorFlow version (use command below): 1.13.1 - Python version: 3.7 You can collect some of this information using our environment capture [script](https://github.com/tensorflow/tensorflow/tree/master/tools/tf_env_collect.sh) You can also obtain the TensorFlow version with python -c "import tensorflow as tf; print(tf.GIT_VERSION, tf.VERSION)" **Describe the current behavior** Hi, here's my code: input_img = keras.layers.Input( shape=( None, len(params2), len(params2), 1 ) ) # adapt this if using `channels_first` image data format conv1 = keras.layers.Conv3D(filters=32, kernel_size=(1, 3, 3), strides=(1, 1, 1), activation='selu', padding='same', data_format='channels_last', name='conv1')(input_img) conv2 = keras.layers.Conv3D(filters=64, kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv2')(conv1) conv3 = keras.layers.Conv3D(filters=128,kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv3')(conv2) conv4 = keras.layers.Conv3D(filters=256,kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv4')(conv3) convlstm1 = keras.layers.ConvLSTM2D(filters=32, return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm1')(conv1) convlstm2 = keras.layers.ConvLSTM2D(filters=64, return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm2')(conv2) convlstm3 = keras.layers.ConvLSTM2D(filters=128,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm3')(conv3) convlstm4 = keras.layers.ConvLSTM2D(filters=256,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm4')(conv4) deconv4 = keras.layers.Conv3DTranspose(filters=128, kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv4')(convlstm4) concat4 = keras.layers.Concatenate(axis=4, name='concat4')([convlstm3, deconv4]) deconv3 = keras.layers.Conv3DTranspose(filters=64 , kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv3')(concat4) concat3 = keras.layers.Concatenate(axis=4, name='concat3')([convlstm2, deconv3]) deconv2 = keras.layers.Conv3DTranspose(filters=32 , kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same' , data_format='channels_last', name='deconv2')(concat3) concat2 = keras.layers.Concatenate(axis=4, name='concat2')([convlstm1, deconv2]) deconv1 = keras.layers.Conv3DTranspose(filters=1 , kernel_size=(1, 3, 3), strides=(1, 1, 1), activation='selu', padding='same' , data_format='channels_last', name='deconv1')(concat2) autoencoder = keras.models.Model(input_img, deconv1) autoencoder.compile(optimizer='adadelta', loss='binary_crossentropy') autoencoder.summary() and here's the error message: TypeError Traceback (most recent call last) <ipython-input-150-83622ca7a77b> in <module> 28 return autoencoder 29 ---> 30 autoencoder1(1700) <ipython-input-150-83622ca7a77b> in autoencoder1(file_length) 14 convlstm4 = keras.layers.ConvLSTM2D(filters=256,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm4')(conv4) 15 ---> 16 deconv4 = keras.layers.Conv3DTranspose(filters=128, kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv4')(convlstm4) 17 concat4 = keras.layers.Concatenate(axis=4, name='concat4')([convlstm3, deconv4]) 18 deconv3 = keras.layers.Conv3DTranspose(filters=64 , kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv3')(concat4) ~/anaconda3/lib/python3.7/site-packages/tensorflow/python/keras/engine/base_layer.py in __call__(self, inputs, *args, **kwargs) 552 # In graph mode, failure to build the layer's graph 553 # implies a user-side bug. We don't catch exceptions. --> 554 outputs = self.call(inputs, *args, **kwargs) 555 else: 556 try: ~/anaconda3/lib/python3.7/site-packages/tensorflow/python/keras/layers/convolutional.py in call(self, inputs) 1138 else: 1139 outputs_4d = array_ops.reshape(outputs, [ -> 1140 outputs_shape[0], outputs_shape[1] * outputs_shape[2], 1141 outputs_shape[3], outputs_shape[4] 1142 ]) TypeError: unsupported operand type(s) for *: 'NoneType' and 'int' You just said that this problem was solved. But I'm really not sure why I still have this problem today on April 2019.
non_usab
there is still bug with function tf keras layers when its input shape is none please make sure that this is a bug as per our we only address code doc bugs performance issues feature requests and build installation issues on github tag bug template system information have i written custom code as opposed to using a stock example script provided in tensorflow os platform and distribution e g linux ubuntu linux ubuntu mobile device e g iphone pixel samsung galaxy if the issue happens on mobile device tensorflow installed from source or binary source tensorflow version use command below python version you can collect some of this information using our environment capture you can also obtain the tensorflow version with python c import tensorflow as tf print tf git version tf version describe the current behavior hi here s my code input img keras layers input shape none len len adapt this if using channels first image data format keras layers filters kernel size strides activation selu padding same data format channels last name input img keras layers filters kernel size strides activation selu padding same data format channels last name keras layers filters kernel size strides activation selu padding same data format channels last name keras layers filters kernel size strides activation selu padding same data format channels last name keras layers filters return sequences true kernel size strides activation selu padding same data format channels last name keras layers filters return sequences true kernel size strides activation selu padding same data format channels last name keras layers filters return sequences true kernel size strides activation selu padding same data format channels last name keras layers filters return sequences true kernel size strides activation selu padding same data format channels last name keras layers filters kernel size strides activation selu padding valid output padding data format channels last name keras layers concatenate axis name keras layers filters kernel size strides activation selu padding valid output padding data format channels last name keras layers concatenate axis name keras layers filters kernel size strides activation selu padding same data format channels last name keras layers concatenate axis name keras layers filters kernel size strides activation selu padding same data format channels last name autoencoder keras models model input img autoencoder compile optimizer adadelta loss binary crossentropy autoencoder summary and here s the error message typeerror traceback most recent call last in return autoencoder in file length keras layers filters return sequences true kernel size strides activation selu padding same data format channels last name keras layers filters kernel size strides activation selu padding valid output padding data format channels last name keras layers concatenate axis name keras layers filters kernel size strides activation selu padding valid output padding data format channels last name lib site packages tensorflow python keras engine base layer py in call self inputs args kwargs in graph mode failure to build the layer s graph implies a user side bug we don t catch exceptions outputs self call inputs args kwargs else try lib site packages tensorflow python keras layers convolutional py in call self inputs else outputs array ops reshape outputs outputs shape outputs shape outputs shape outputs shape outputs shape typeerror unsupported operand type s for nonetype and int you just said that this problem was solved but i m really not sure why i still have this problem today on april
0
210,009
7,182,199,192
IssuesEvent
2018-02-01 08:59:19
swarmcity/SwarmCitySite
https://api.github.com/repos/swarmcity/SwarmCitySite
closed
Delete password input
priority terminal
# Expected behavior On page choose-password the page doesnt remember the input after route change # Actual behavior. Currently the page remembers past input # Steps to reproduce the problem. Go through new-here flow # Operating system / hardware
1.0
Delete password input - # Expected behavior On page choose-password the page doesnt remember the input after route change # Actual behavior. Currently the page remembers past input # Steps to reproduce the problem. Go through new-here flow # Operating system / hardware
non_usab
delete password input expected behavior on page choose password the page doesnt remember the input after route change actual behavior currently the page remembers past input steps to reproduce the problem go through new here flow operating system hardware
0
7,700
5,144,935,711
IssuesEvent
2017-01-12 20:05:02
tgstation/tgstation
https://api.github.com/repos/tgstation/tgstation
closed
RCD has confusing text, as well
Bug Usability
That's some metal. Sheets made out of metal. They are a normal-sized item. There are 3 metal sheets in the stack. You insert 0 metal sheets into the RCD. The RCD now holds 136/160 matter-units. hmm
True
RCD has confusing text, as well - That's some metal. Sheets made out of metal. They are a normal-sized item. There are 3 metal sheets in the stack. You insert 0 metal sheets into the RCD. The RCD now holds 136/160 matter-units. hmm
usab
rcd has confusing text as well that s some metal sheets made out of metal they are a normal sized item there are metal sheets in the stack you insert metal sheets into the rcd the rcd now holds matter units hmm
1
25,727
25,779,412,985
IssuesEvent
2022-12-09 14:42:51
mageshravi/lyricfront-mobile-app
https://api.github.com/repos/mageshravi/lyricfront-mobile-app
closed
Search bar needs to be clicked twice
bug usability
Search bar needs to be clicked twice to bring up the keyboard. Keyboard should be brought up upon clicking the first time.
True
Search bar needs to be clicked twice - Search bar needs to be clicked twice to bring up the keyboard. Keyboard should be brought up upon clicking the first time.
usab
search bar needs to be clicked twice search bar needs to be clicked twice to bring up the keyboard keyboard should be brought up upon clicking the first time
1
20,154
15,081,601,853
IssuesEvent
2021-02-05 13:26:50
andrewfstratton/quando
https://api.github.com/repos/andrewfstratton/quando
closed
Add undo/redo to file select
enhancement usability
Note that (now) selecting the same file_name is ignored - i.e. changes nothing and doesn't add to the undo stack. Fixed as part of text change
True
Add undo/redo to file select - Note that (now) selecting the same file_name is ignored - i.e. changes nothing and doesn't add to the undo stack. Fixed as part of text change
usab
add undo redo to file select note that now selecting the same file name is ignored i e changes nothing and doesn t add to the undo stack fixed as part of text change
1
685,150
23,445,426,326
IssuesEvent
2022-08-15 19:06:04
johnjung/bmrcportal
https://api.github.com/repos/johnjung/bmrcportal
closed
Sorting order for Titles: depends on how they are entered
data priority-2
It could be useful to add an element to the encoded finding aids for a "filing" (sort) title. This is provided for in EAD, but is not uniformly used. End result is that A-Z sorts and listings are in many cases by first name or simply the beginning characters of the title data value and not according to guidelines for alphabetizing lists of materials.
1.0
Sorting order for Titles: depends on how they are entered - It could be useful to add an element to the encoded finding aids for a "filing" (sort) title. This is provided for in EAD, but is not uniformly used. End result is that A-Z sorts and listings are in many cases by first name or simply the beginning characters of the title data value and not according to guidelines for alphabetizing lists of materials.
non_usab
sorting order for titles depends on how they are entered it could be useful to add an element to the encoded finding aids for a filing sort title this is provided for in ead but is not uniformly used end result is that a z sorts and listings are in many cases by first name or simply the beginning characters of the title data value and not according to guidelines for alphabetizing lists of materials
0
3,180
3,365,997,022
IssuesEvent
2015-11-21 01:30:24
geneontology/amigo
https://api.github.com/repos/geneontology/amigo
closed
Put AmiGO failback at Berkeley into a more production-like footing
bug (B: affects usability)
Given the extended downtime on production, the berkeley servers need to be setup more like production. Also, we want to get golr.geneontology.org sorted out (here and in the unit tests) so we can test once again. - [X] get golr.geneontology.org CNAME to groovin, pass back to nakama - [X] fix internal linking on nakama couldn't get it to work on /static, but general linking should be fixed - [X] take down beta/labs warning, leave backup site warning up - [X] <strike>plan on how to get another index built</strike> it looks like stanford is almost there, so will punt - [X] fix displayed menu items
True
Put AmiGO failback at Berkeley into a more production-like footing - Given the extended downtime on production, the berkeley servers need to be setup more like production. Also, we want to get golr.geneontology.org sorted out (here and in the unit tests) so we can test once again. - [X] get golr.geneontology.org CNAME to groovin, pass back to nakama - [X] fix internal linking on nakama couldn't get it to work on /static, but general linking should be fixed - [X] take down beta/labs warning, leave backup site warning up - [X] <strike>plan on how to get another index built</strike> it looks like stanford is almost there, so will punt - [X] fix displayed menu items
usab
put amigo failback at berkeley into a more production like footing given the extended downtime on production the berkeley servers need to be setup more like production also we want to get golr geneontology org sorted out here and in the unit tests so we can test once again get golr geneontology org cname to groovin pass back to nakama fix internal linking on nakama couldn t get it to work on static but general linking should be fixed take down beta labs warning leave backup site warning up plan on how to get another index built it looks like stanford is almost there so will punt fix displayed menu items
1
492,263
14,199,352,828
IssuesEvent
2020-11-16 02:06:06
InfinityGhost/OpenTabletDriver
https://api.github.com/repos/InfinityGhost/OpenTabletDriver
opened
Analog Bindings
breaking daemon enhancement gui plugins priority:low
## Description <!-- List what you would like to see added or changed, --> <!-- Be descriptive and use images or video when possible. --> - Takes in a floating point value, executes a function with that value - Implements `IBinding` or reworks `IBinding` as a whole - Must support `PropertyAttribute` in the rework
1.0
Analog Bindings - ## Description <!-- List what you would like to see added or changed, --> <!-- Be descriptive and use images or video when possible. --> - Takes in a floating point value, executes a function with that value - Implements `IBinding` or reworks `IBinding` as a whole - Must support `PropertyAttribute` in the rework
non_usab
analog bindings description takes in a floating point value executes a function with that value implements ibinding or reworks ibinding as a whole must support propertyattribute in the rework
0
9,993
6,538,711,878
IssuesEvent
2017-09-01 07:53:11
p-org/PSharp
https://api.github.com/repos/p-org/PSharp
opened
Detecting non-determinism in tests
usability
This is probably a long-term issue. We should add the ability to detect non-determinism in tests, for instance, by noticing when we're unable to repro traces. Even better if we can help pinpoint the culprit.
True
Detecting non-determinism in tests - This is probably a long-term issue. We should add the ability to detect non-determinism in tests, for instance, by noticing when we're unable to repro traces. Even better if we can help pinpoint the culprit.
usab
detecting non determinism in tests this is probably a long term issue we should add the ability to detect non determinism in tests for instance by noticing when we re unable to repro traces even better if we can help pinpoint the culprit
1