Unnamed: 0 int64 3 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 7 112 | repo_url stringlengths 36 141 | action stringclasses 3 values | title stringlengths 2 742 | labels stringlengths 4 431 | body stringlengths 5 239k | index stringclasses 10 values | text_combine stringlengths 96 240k | label stringclasses 2 values | text stringlengths 96 200k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
19,064 | 13,536,130,742 | IssuesEvent | 2020-09-16 08:36:26 | topcoder-platform/qa-fun | https://api.github.com/repos/topcoder-platform/qa-fun | closed | font difference in profile settings | UX/Usability | **Steps to Reproduce:**
1. Log in to https://www.topcoder.com/
2. Select logged in user settings
3. Font highlighted in red in the attachment is different
**Expected Result:**
Font should be unique
**Actual Result:**
Font style not applied
[font difference in profile settings.docx](https://github.com/topcoder-platform/qa-fun/files/4579363/font.difference.in.profile.settings.docx)
**Device/OS/Browser Information:**
Windows 10/ Chrome
| True | font difference in profile settings - **Steps to Reproduce:**
1. Log in to https://www.topcoder.com/
2. Select logged in user settings
3. Font highlighted in red in the attachment is different
**Expected Result:**
Font should be unique
**Actual Result:**
Font style not applied
[font difference in profile settings.docx](https://github.com/topcoder-platform/qa-fun/files/4579363/font.difference.in.profile.settings.docx)
**Device/OS/Browser Information:**
Windows 10/ Chrome
| usab | font difference in profile settings steps to reproduce log in to select logged in user settings font highlighted in red in the attachment is different expected result font should be unique actual result font style not applied device os browser information windows chrome | 1 |
22,786 | 20,149,333,134 | IssuesEvent | 2022-02-09 10:47:00 | lgarron/first-world | https://api.github.com/repos/lgarron/first-world | closed | iMusic app doesn't support searching the iTunes store (when you have Apple Music?) | Reason: Usability Level: Medium Software: iTunes / Apple Music Workaround: Functionality Compromise | The iTunes store has a slightly different catalog than Apple Music. Nowadays, you can only search Apple Music.
There are a few reasons to search the iTunes Store directly — particularly, making sure you can get a non-DRM track.
Related to:
- #82
- #83 | True | iMusic app doesn't support searching the iTunes store (when you have Apple Music?) - The iTunes store has a slightly different catalog than Apple Music. Nowadays, you can only search Apple Music.
There are a few reasons to search the iTunes Store directly — particularly, making sure you can get a non-DRM track.
Related to:
- #82
- #83 | usab | imusic app doesn t support searching the itunes store when you have apple music the itunes store has a slightly different catalog than apple music nowadays you can only search apple music there are a few reasons to search the itunes store directly — particularly making sure you can get a non drm track related to | 1 |
76,289 | 7,524,060,128 | IssuesEvent | 2018-04-13 05:00:46 | openshift/origin | https://api.github.com/repos/openshift/origin | closed | Error removing intermediate container e12d4a603a4e: Driver devicemapper failed to remove root filesystem | component/containers kind/test-flake lifecycle/rotten priority/P2 |
```
21:06:10 2017-03-07T01:22:46.312469000Z Step 11 : RUN chmod og+rw /opt/app-root/src/db
21:06:10 2017-03-07T01:22:47.474152000Z ---> Running in e12d4a603a4e
21:06:10 2017-03-07T01:22:53.259513000Z ---> db3d88c69ee0
21:06:10
2017-03-07T01:22:53.281720000Z Error removing intermediate container e12d4a603a4e: Driver devicemapper failed to remove root filesystem e12d4a603a4e6f12b63addb0c4865978a408209056bf33237c5ff0ab03a5c520: failed to remove device 9f589f96cba60f5f888aa808e38553f3a541a9b9aaf96bd5a6f242212ac2fc65:Device is Busy
21:06:10 2017-03-07T01:22:53.282728000Z Step 12 : USER default
21:06:10 2017-03-07T01:22:54.921731000Z ---> Running in 2c69a204466c
21:06:10 2017-03-07T01:22:59.076777000Z ---> 6f72cff797ea
21:06:10 2017-03-07T01:22:59.077148000Z Error removing intermediate container e12d4a603a4e: No such container: e12d4a603a4e6f12b63addb0c4865978a408209056bf33237c5ff0ab03a5c520
21:06:10 2017-03-07T01:22:59.077502000Z Step 13 : ENV "OPENSHIFT_BUILD_NAME" "test-docker-1" "OPENSHIFT_BUILD_NAMESPACE" "extended-test-build-no-outputname-bb9n2-3dpb6"
```
https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_origin_future/885
@jwhonce this is the other way we've been seeing the device mapper error. It doesn't cause the actual docker build to fail, but it occurs during the docker build.
| 1.0 | Error removing intermediate container e12d4a603a4e: Driver devicemapper failed to remove root filesystem -
```
21:06:10 2017-03-07T01:22:46.312469000Z Step 11 : RUN chmod og+rw /opt/app-root/src/db
21:06:10 2017-03-07T01:22:47.474152000Z ---> Running in e12d4a603a4e
21:06:10 2017-03-07T01:22:53.259513000Z ---> db3d88c69ee0
21:06:10
2017-03-07T01:22:53.281720000Z Error removing intermediate container e12d4a603a4e: Driver devicemapper failed to remove root filesystem e12d4a603a4e6f12b63addb0c4865978a408209056bf33237c5ff0ab03a5c520: failed to remove device 9f589f96cba60f5f888aa808e38553f3a541a9b9aaf96bd5a6f242212ac2fc65:Device is Busy
21:06:10 2017-03-07T01:22:53.282728000Z Step 12 : USER default
21:06:10 2017-03-07T01:22:54.921731000Z ---> Running in 2c69a204466c
21:06:10 2017-03-07T01:22:59.076777000Z ---> 6f72cff797ea
21:06:10 2017-03-07T01:22:59.077148000Z Error removing intermediate container e12d4a603a4e: No such container: e12d4a603a4e6f12b63addb0c4865978a408209056bf33237c5ff0ab03a5c520
21:06:10 2017-03-07T01:22:59.077502000Z Step 13 : ENV "OPENSHIFT_BUILD_NAME" "test-docker-1" "OPENSHIFT_BUILD_NAMESPACE" "extended-test-build-no-outputname-bb9n2-3dpb6"
```
https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_origin_future/885
@jwhonce this is the other way we've been seeing the device mapper error. It doesn't cause the actual docker build to fail, but it occurs during the docker build.
| non_usab | error removing intermediate container driver devicemapper failed to remove root filesystem step run chmod og rw opt app root src db running in error removing intermediate container driver devicemapper failed to remove root filesystem failed to remove device device is busy step user default running in error removing intermediate container no such container step env openshift build name test docker openshift build namespace extended test build no outputname jwhonce this is the other way we ve been seeing the device mapper error it doesn t cause the actual docker build to fail but it occurs during the docker build | 0 |
1,333 | 2,796,097,507 | IssuesEvent | 2015-05-12 03:49:25 | Elgg/Elgg | https://api.github.com/repos/Elgg/Elgg | closed | Fully document the current Ajax API | dev usability docs | E.g. In ajax views I vaguely remember input is mapped into $vars, "guid" is auto-injected as the loaded "entity", and action responses have kind of special JSON auto-wrapping stuff with system_message(). AFAIK very little of this magical stuff is clearly documented.
At minimum it should be straightforward for a dev to create ajax views/actions that return JSON, and know what that JSON is going to look like. | True | Fully document the current Ajax API - E.g. In ajax views I vaguely remember input is mapped into $vars, "guid" is auto-injected as the loaded "entity", and action responses have kind of special JSON auto-wrapping stuff with system_message(). AFAIK very little of this magical stuff is clearly documented.
At minimum it should be straightforward for a dev to create ajax views/actions that return JSON, and know what that JSON is going to look like. | usab | fully document the current ajax api e g in ajax views i vaguely remember input is mapped into vars guid is auto injected as the loaded entity and action responses have kind of special json auto wrapping stuff with system message afaik very little of this magical stuff is clearly documented at minimum it should be straightforward for a dev to create ajax views actions that return json and know what that json is going to look like | 1 |
68,278 | 9,166,083,390 | IssuesEvent | 2019-03-02 00:31:00 | Azure/Azure-Functions | https://api.github.com/repos/Azure/Azure-Functions | closed | Document C# class library examples for all bindings | P1 documentation | The bindings articles have only documentation on CSX, not C# class libraries. All bindings and triggers should be documented in the C# article (https://docs.microsoft.com/en-us/azure/azure-functions/functions-dotnet-class-library), but these samples should be moved to "includes" and also included the the documentation for each binding/trigger. | 1.0 | Document C# class library examples for all bindings - The bindings articles have only documentation on CSX, not C# class libraries. All bindings and triggers should be documented in the C# article (https://docs.microsoft.com/en-us/azure/azure-functions/functions-dotnet-class-library), but these samples should be moved to "includes" and also included the the documentation for each binding/trigger. | non_usab | document c class library examples for all bindings the bindings articles have only documentation on csx not c class libraries all bindings and triggers should be documented in the c article but these samples should be moved to includes and also included the the documentation for each binding trigger | 0 |
126,263 | 10,416,301,805 | IssuesEvent | 2019-09-14 12:23:21 | OpenLiberty/guides-common | https://api.github.com/repos/OpenLiberty/guides-common | closed | Guide for MicroProfile Fault Tolerance with Istio Fault Tolerance | ID required SME reviewed dev content reviewed end-to-end tests completed final content reviewed new guide oc1 peer reviewed signed off user reviewed | This is from @Emily-Jiang:
I would like a guide to demonstrate the ecosystem of MicroProfile Fault Tolerance with Istio Fault Tolerance:
Scenario 1:
Use MP FT in dev with Retry
Use Istio Retry and switched off MicroProfile FT using the MP FT config.
Scenario 2:
Use MP FT fallback
Use Istio Fault Tolerance
When the backend dies and retry was exhausted, FT fallback was triggered. | 1.0 | Guide for MicroProfile Fault Tolerance with Istio Fault Tolerance - This is from @Emily-Jiang:
I would like a guide to demonstrate the ecosystem of MicroProfile Fault Tolerance with Istio Fault Tolerance:
Scenario 1:
Use MP FT in dev with Retry
Use Istio Retry and switched off MicroProfile FT using the MP FT config.
Scenario 2:
Use MP FT fallback
Use Istio Fault Tolerance
When the backend dies and retry was exhausted, FT fallback was triggered. | non_usab | guide for microprofile fault tolerance with istio fault tolerance this is from emily jiang i would like a guide to demonstrate the ecosystem of microprofile fault tolerance with istio fault tolerance scenario use mp ft in dev with retry use istio retry and switched off microprofile ft using the mp ft config scenario use mp ft fallback use istio fault tolerance when the backend dies and retry was exhausted ft fallback was triggered | 0 |
7,122 | 4,778,814,384 | IssuesEvent | 2016-10-27 20:29:13 | rabbitmq/rabbitmq-java-client | https://api.github.com/repos/rabbitmq/rabbitmq-java-client | opened | Enable automatic connection recovery by default | effort-low enhancement usability | Automatic connection recovery has been around for over 2 years in this client and some 5 years total (starting with the amqp gem in Ruby, then Bunny). With a round of fixes up to and in `3.6.6` we know that it works quite well in practice and what kind of bugs and tricky aspects we've discovered over the years. It's time to enable it by default and `4.0.0` is the right moment to do it. | True | Enable automatic connection recovery by default - Automatic connection recovery has been around for over 2 years in this client and some 5 years total (starting with the amqp gem in Ruby, then Bunny). With a round of fixes up to and in `3.6.6` we know that it works quite well in practice and what kind of bugs and tricky aspects we've discovered over the years. It's time to enable it by default and `4.0.0` is the right moment to do it. | usab | enable automatic connection recovery by default automatic connection recovery has been around for over years in this client and some years total starting with the amqp gem in ruby then bunny with a round of fixes up to and in we know that it works quite well in practice and what kind of bugs and tricky aspects we ve discovered over the years it s time to enable it by default and is the right moment to do it | 1 |
312,822 | 23,444,824,499 | IssuesEvent | 2022-08-15 18:29:31 | celestiaorg/celestia-core | https://api.github.com/repos/celestiaorg/celestia-core | opened | Document release process | C:documentation | ## Summary
This repo could benefit from a guide on how to cut a new release
## Problem Definition
Current release process is to ask @evan-forbes or @liamsi to cut a new release
## Proposal
Steps documented in a Markdown file (e.g. `README.md`) that describe the release process, who has permission to cut a release, and any non standard release steps. Something like:
1. Create a release in Github UI
1. Upgrade to the new celestia-core version in cosmos-sdk and celestia-app | 1.0 | Document release process - ## Summary
This repo could benefit from a guide on how to cut a new release
## Problem Definition
Current release process is to ask @evan-forbes or @liamsi to cut a new release
## Proposal
Steps documented in a Markdown file (e.g. `README.md`) that describe the release process, who has permission to cut a release, and any non standard release steps. Something like:
1. Create a release in Github UI
1. Upgrade to the new celestia-core version in cosmos-sdk and celestia-app | non_usab | document release process summary this repo could benefit from a guide on how to cut a new release problem definition current release process is to ask evan forbes or liamsi to cut a new release proposal steps documented in a markdown file e g readme md that describe the release process who has permission to cut a release and any non standard release steps something like create a release in github ui upgrade to the new celestia core version in cosmos sdk and celestia app | 0 |
252,031 | 27,225,927,547 | IssuesEvent | 2023-02-21 09:42:32 | uriel-naor/Test | https://api.github.com/repos/uriel-naor/Test | closed | tap-5.8.0.tgz: 25 vulnerabilities (highest severity is: 9.8) - autoclosed | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tap-5.8.0.tgz</b></p></summary>
<p></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p></details>
#### <img src='https://whitesource-resources.whitesourcesoftware.com/suggestedVersion.png' width=19 height=20> Mend has checked all newer package trees, and you are on the least vulnerable package!
#### Please note: There might be a version that explicitly solves one or more of the vulnerabilities listed below, but we do not recommend it. For more info about the optional fixes, check the section “Details” below.
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (tap version) | Fix PR available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2019-19919](https://www.mend.io/vulnerability-database/CVE-2019-19919) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [CVE-2018-1000620](https://www.mend.io/vulnerability-database/CVE-2018-1000620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | ❌ |
| [CVE-2018-3728](https://www.mend.io/vulnerability-database/CVE-2018-3728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | ❌ |
| [WS-2019-0333](https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0063](https://github.com/nodeca/js-yaml/pull/480) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.0 | js-yaml-3.6.1.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0064](https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.0 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [CVE-2019-20922](https://www.mend.io/vulnerability-database/CVE-2019-20922) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [CVE-2016-10540](https://www.mend.io/vulnerability-database/CVE-2016-10540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | ❌ |
| [CVE-2016-2515](https://www.mend.io/vulnerability-database/CVE-2016-2515) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | hawk-1.1.1.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0492](https://github.com/handlebars-lang/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0493](https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [CVE-2017-18077](https://www.mend.io/vulnerability-database/CVE-2017-18077) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | brace-expansion-1.1.4.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0318](https://github.com/wycats/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2018-0590](https://bugzilla.redhat.com/show_bug.cgi?id=1552148) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | diff-1.4.0.tgz | Transitive | N/A* | ❌ |
| [CVE-2017-16026](https://www.mend.io/vulnerability-database/CVE-2017-16026) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | request-2.42.0.tgz | Transitive | N/A* | ❌ |
| [CVE-2020-7598](https://www.mend.io/vulnerability-database/CVE-2020-7598) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.6 | detected in multiple dependencies | Transitive | N/A* | ❌ |
| [WS-2017-0266](https://github.com/joyent/node-http-signature/commit/78ab1da232f31f695f5c362d863593a143aa8b56) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | http-signature-0.10.1.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0103](https://github.com/wycats/handlebars.js/issues/1267#issue-187151586) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2021-0154](https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | glob-parent-2.0.0.tgz | Transitive | N/A* | ❌ |
| [CVE-2020-7608](https://www.mend.io/vulnerability-database/CVE-2020-7608) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | yargs-parser-2.4.0.tgz | Transitive | N/A* | ❌ |
| [CVE-2017-16028](https://www.mend.io/vulnerability-database/CVE-2017-16028) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | randomatic-1.1.5.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0332](https://github.com/wycats/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0331](https://github.com/wycats/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0032](https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | js-yaml-3.6.1.tgz | Transitive | N/A* | ❌ |
| [WS-2018-0076](https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | tunnel-agent-0.4.3.tgz | Transitive | N/A* | ❌ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-19919</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's __proto__ and __defineGetter__ properties, which may allow an attacker to execute arbitrary code through crafted payloads.
<p>Publish Date: 2019-12-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-19919>CVE-2019-19919</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1164">https://www.npmjs.com/advisories/1164</a></p>
<p>Release Date: 2019-12-20</p>
<p>Fix Resolution: 4.3.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-1000620</summary>
### Vulnerable Libraries - <b>cryptiles-0.2.2.tgz</b>, <b>cryptiles-2.0.5.tgz</b></p>
<p>
### <b>cryptiles-0.2.2.tgz</b></p>
<p>General purpose crypto utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-0.2.2.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-0.2.2.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/cryptiles/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- request-2.42.0.tgz
- hawk-1.1.1.tgz
- :x: **cryptiles-0.2.2.tgz** (Vulnerable Library)
### <b>cryptiles-2.0.5.tgz</b></p>
<p>General purpose crypto utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/coveralls/node_modules/cryptiles/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- coveralls-2.13.3.tgz
- request-2.79.0.tgz
- hawk-3.1.3.tgz
- :x: **cryptiles-2.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2.
<p>Publish Date: 2018-07-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-1000620>CVE-2018-1000620</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620</a></p>
<p>Release Date: 2018-07-09</p>
<p>Fix Resolution: v4.1.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-3728</summary>
### Vulnerable Libraries - <b>hoek-0.9.1.tgz</b>, <b>hoek-2.16.3.tgz</b></p>
<p>
### <b>hoek-0.9.1.tgz</b></p>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz">https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- request-2.42.0.tgz
- hawk-1.1.1.tgz
- :x: **hoek-0.9.1.tgz** (Vulnerable Library)
### <b>hoek-2.16.3.tgz</b></p>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/coveralls/node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- coveralls-2.13.3.tgz
- request-2.79.0.tgz
- hawk-3.1.3.tgz
- :x: **hoek-2.16.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
<p>Publish Date: 2018-03-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-3728>CVE-2018-3728</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-3728">https://nvd.nist.gov/vuln/detail/CVE-2018-3728</a></p>
<p>Release Date: 2018-03-30</p>
<p>Fix Resolution: 4.2.1,5.0.3</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0333</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In handlebars, versions prior to v4.5.3 are vulnerable to prototype pollution. Using a malicious template it's possbile to add or modify properties to the Object prototype. This can also lead to DOS and RCE in certain conditions.
<p>Publish Date: 2019-11-18
<p>URL: <a href=https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08>WS-2019-0333</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1325">https://www.npmjs.com/advisories/1325</a></p>
<p>Release Date: 2019-11-18</p>
<p>Fix Resolution: handlebars - 4.5.3</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0063</summary>
### Vulnerable Library - <b>js-yaml-3.6.1.tgz</b></p>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **js-yaml-3.6.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
<p>Publish Date: 2019-04-05
<p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>8.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution: js-yaml - 3.13.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0064</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server.
<p>Publish Date: 2019-01-30
<p>URL: <a href=https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2>WS-2019-0064</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>8.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/755/versions">https://www.npmjs.com/advisories/755/versions</a></p>
<p>Release Date: 2019-04-30</p>
<p>Fix Resolution: 1.0.6-2,4.0.14,4.1.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20922</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
<p>Publish Date: 2020-09-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20922>CVE-2019-20922</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1300">https://www.npmjs.com/advisories/1300</a></p>
<p>Release Date: 2020-09-30</p>
<p>Fix Resolution: handlebars - 4.4.5</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-10540</summary>
### Vulnerable Libraries - <b>minimatch-2.0.10.tgz</b>, <b>minimatch-3.0.0.tgz</b></p>
<p>
### <b>minimatch-2.0.10.tgz</b></p>
<p>a glob matcher in javascript</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz">https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/fileset/node_modules/minimatch/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- fileset-0.2.1.tgz
- :x: **minimatch-2.0.10.tgz** (Vulnerable Library)
### <b>minimatch-3.0.0.tgz</b></p>
<p>a glob matcher in javascript</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.0.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/glob/node_modules/minimatch/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- glob-7.0.3.tgz
- :x: **minimatch-3.0.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript `RegExp` objects. The primary function, `minimatch(path, pattern)` in Minimatch 3.0.1 and earlier is vulnerable to ReDoS in the `pattern` parameter.
<p>Publish Date: 2018-05-31
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10540>CVE-2016-10540</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/118">https://nodesecurity.io/advisories/118</a></p>
<p>Release Date: 2016-06-20</p>
<p>Fix Resolution: Update to version 3.0.2 or later.</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-2515</summary>
### Vulnerable Library - <b>hawk-1.1.1.tgz</b></p>
<p>HTTP Hawk Authentication Scheme</p>
<p>Library home page: <a href="https://registry.npmjs.org/hawk/-/hawk-1.1.1.tgz">https://registry.npmjs.org/hawk/-/hawk-1.1.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/hawk/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- request-2.42.0.tgz
- :x: **hawk-1.1.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Hawk before 3.1.3 and 4.x before 4.1.1 allow remote attackers to cause a denial of service (CPU consumption or partial outage) via a long (1) header or (2) URI that is matched against an improper regular expression.
<p>Publish Date: 2016-04-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-2515>CVE-2016-2515</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2515">https://nvd.nist.gov/vuln/detail/CVE-2016-2515</a></p>
<p>Release Date: 2016-04-13</p>
<p>Fix Resolution: 3.1.3,4.1.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0492</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system.
<p>Publish Date: 2019-11-19
<p>URL: <a href=https://github.com/handlebars-lang/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7>WS-2019-0492</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p>
<p>Release Date: 2019-11-19</p>
<p>Fix Resolution: handlebars - 3.0.8,4.5.3</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0493</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
handlebars before 3.0.8 and 4.x before 4.5.2 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system.
<p>Publish Date: 2019-11-14
<p>URL: <a href=https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e>WS-2019-0493</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1316">https://www.npmjs.com/advisories/1316</a></p>
<p>Release Date: 2019-11-14</p>
<p>Fix Resolution: handlebars - 3.0.8,4.5.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-18077</summary>
### Vulnerable Library - <b>brace-expansion-1.1.4.tgz</b></p>
<p>Brace expansion as known from sh/bash</p>
<p>Library home page: <a href="https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.4.tgz">https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.4.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/fileset/node_modules/minimatch/node_modules/brace-expansion/package.json,/node_modules/nyc/node_modules/glob/node_modules/minimatch/node_modules/brace-expansion/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- fileset-0.2.1.tgz
- minimatch-2.0.10.tgz
- :x: **brace-expansion-1.1.4.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
index.js in brace-expansion before 1.1.7 is vulnerable to Regular Expression Denial of Service (ReDoS) attacks, as demonstrated by an expand argument containing many comma characters.
<p>Publish Date: 2018-01-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-18077>CVE-2017-18077</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18077">https://nvd.nist.gov/vuln/detail/CVE-2017-18077</a></p>
<p>Release Date: 2018-01-27</p>
<p>Fix Resolution: 1.1.7</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0318</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In "showdownjs/showdown", versions prior to v4.4.5 are vulnerable against Regular expression Denial of Service (ReDOS) once receiving specially-crafted templates.
<p>Publish Date: 2019-10-20
<p>URL: <a href=https://github.com/wycats/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b>WS-2019-0318</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1300">https://www.npmjs.com/advisories/1300</a></p>
<p>Release Date: 2019-10-20</p>
<p>Fix Resolution: handlebars - 4.4.5</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2018-0590</summary>
### Vulnerable Library - <b>diff-1.4.0.tgz</b></p>
<p>A javascript text diff implementation.</p>
<p>Library home page: <a href="https://registry.npmjs.org/diff/-/diff-1.4.0.tgz">https://registry.npmjs.org/diff/-/diff-1.4.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/diff/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- tap-mocha-reporter-0.0.27.tgz
- :x: **diff-1.4.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
<p>Publish Date: 2018-03-05
<p>URL: <a href=https://bugzilla.redhat.com/show_bug.cgi?id=1552148>WS-2018-0590</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>7.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2018-03-05</p>
<p>Fix Resolution: 3.5.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16026</summary>
### Vulnerable Library - <b>request-2.42.0.tgz</b></p>
<p>Simplified HTTP request client.</p>
<p>Library home page: <a href="https://registry.npmjs.org/request/-/request-2.42.0.tgz">https://registry.npmjs.org/request/-/request-2.42.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/request/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- :x: **request-2.42.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Request is an http client. If a request is made using ```multipart```, and the body type is a ```number```, then the specified number of non-zero memory is passed in the body. This affects Request >=2.2.6 <2.47.0 || >2.51.0 <=2.67.0.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16026>CVE-2017-16026</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.9</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-16026">https://nvd.nist.gov/vuln/detail/CVE-2017-16026</a></p>
<p>Release Date: 2018-06-04</p>
<p>Fix Resolution: 2.47.1,2.67.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7598</summary>
### Vulnerable Libraries - <b>minimist-1.2.0.tgz</b>, <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b></p>
<p>
### <b>minimist-1.2.0.tgz</b></p>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/coveralls/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- coveralls-2.13.3.tgz
- :x: **minimist-1.2.0.tgz** (Vulnerable Library)
### <b>minimist-0.0.8.tgz</b></p>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/mkdirp/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- mkdirp-0.5.1.tgz
- :x: **minimist-0.0.8.tgz** (Vulnerable Library)
### <b>minimist-0.0.10.tgz</b></p>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/node_modules/optimist/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- handlebars-4.0.5.tgz
- optimist-0.6.1.tgz
- :x: **minimist-0.0.10.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
<p>Publish Date: 2020-03-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7598>CVE-2020-7598</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.6</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7598">https://nvd.nist.gov/vuln/detail/CVE-2020-7598</a></p>
<p>Release Date: 2020-03-12</p>
<p>Fix Resolution: Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;org.webjars:npm - 5.0.0-1;Indianadavy.VueJsWebAPITemplate.CSharp - 1.0.1;NorDroN.AngularTemplate - 0.1.6;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 2.0.0;ApiExplorer.HelpPage - 1.0.0-alpha3;CoreVueWebTest - 3.0.101;dotnetng.template - 1.0.0.4;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;Fable.Template.Elmish.React - 0.1.6;BumperLane.Public.Api.Client - 0.23.35.214-prerelease;Yarn.MSBuild - 0.24.6,0.22.0;Bridge.AWS - 0.3.30.36;Nodejs.Redist.x64 - 7.7.3.1,10.3.0;tslint - 5.6.0,6.1.1;org.webjars.npm:bourbon-neat - 2.0.0-beta.2;GR.PageRender.Razor - 1.8.0;MIDIator.WebClient - 1.0.105;EntityFramework.LookupTables - 1.1.14.119;BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;org.webjars.npm:minimist - 1.2.4;minimist - 1.2.3,0.2.1;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Romano.Vue - 1.0.1;Yarnpkg.Yarn - 0.26.1;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;Chutzpah - 4.4.10;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;VueJS.NetCore - 1.1.1;Dianoga - 5.0.0-beta.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2017-0266</summary>
### Vulnerable Library - <b>http-signature-0.10.1.tgz</b></p>
<p>Reference implementation of Joyent's HTTP Signature scheme.</p>
<p>Library home page: <a href="https://registry.npmjs.org/http-signature/-/http-signature-0.10.1.tgz">https://registry.npmjs.org/http-signature/-/http-signature-0.10.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/http-signature/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- request-2.42.0.tgz
- :x: **http-signature-0.10.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Affected versions (before 1.0.0) of the http-signature package are vulnerable to Timing Attacks.
<p>Publish Date: 2015-01-22
<p>URL: <a href=https://github.com/joyent/node-http-signature/commit/78ab1da232f31f695f5c362d863593a143aa8b56>WS-2017-0266</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.5</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2017-01-31</p>
<p>Fix Resolution: 1.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0103</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Handlebars.js before 4.1.0 has Remote Code Execution (RCE)
<p>Publish Date: 2019-01-30
<p>URL: <a href=https://github.com/wycats/handlebars.js/issues/1267#issue-187151586>WS-2019-0103</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.5</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2019-05-30</p>
<p>Fix Resolution: 4.1.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2021-0154</summary>
### Vulnerable Library - <b>glob-parent-2.0.0.tgz</b></p>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/micromatch/node_modules/parse-glob/node_modules/glob-base/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- micromatch-2.3.8.tgz
- parse-glob-3.0.4.tgz
- glob-base-0.3.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Regular Expression Denial of Service (ReDoS) vulnerability was found in glob-parent before 5.1.2.
<p>Publish Date: 2021-01-27
<p>URL: <a href=https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366>WS-2021-0154</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-01-27</p>
<p>Fix Resolution: glob-parent - 5.1.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7608</summary>
### Vulnerable Library - <b>yargs-parser-2.4.0.tgz</b></p>
<p>the mighty option parser used by yargs</p>
<p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-2.4.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-2.4.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/yargs/node_modules/yargs-parser/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- yargs-4.7.1.tgz
- :x: **yargs-parser-2.4.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload.
<p>Publish Date: 2020-03-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7608>CVE-2020-7608</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608</a></p>
<p>Release Date: 2020-03-16</p>
<p>Fix Resolution: v18.1.1;13.1.2;15.0.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16028</summary>
### Vulnerable Library - <b>randomatic-1.1.5.tgz</b></p>
<p>Generate randomized strings of a specified length, fast. Only the length is necessary, but you can optionally generate patterns using any combination of numeric, alpha-numeric, alphabetical, special or custom characters.</p>
<p>Library home page: <a href="https://registry.npmjs.org/randomatic/-/randomatic-1.1.5.tgz">https://registry.npmjs.org/randomatic/-/randomatic-1.1.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/micromatch/node_modules/braces/node_modules/expand-range/node_modules/fill-range/node_modules/randomatic/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- micromatch-2.3.8.tgz
- braces-1.8.5.tgz
- expand-range-1.8.2.tgz
- fill-range-2.2.3.tgz
- :x: **randomatic-1.1.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
react-native-meteor-oauth is a library for Oauth2 login to a Meteor server in React Native. The oauth Random Token is generated using a non-cryptographically strong RNG (Math.random()).
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16028>CVE-2017-16028</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/157">https://nodesecurity.io/advisories/157</a></p>
<p>Release Date: 2017-04-14</p>
<p>Fix Resolution: Update to version 3.0.0 or later.</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0332</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Arbitrary Code Execution vulnerability found in handlebars before 4.5.3. Lookup helper fails to validate templates. Attack may submit templates that execute arbitrary JavaScript in the system.It is due to an incomplete fix for a WS-2019-0331.
<p>Publish Date: 2019-11-17
<p>URL: <a href=https://github.com/wycats/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7>WS-2019-0332</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p>
<p>Release Date: 2019-11-17</p>
<p>Fix Resolution: handlebars - 4.5.3</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0331</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Arbitrary Code Execution vulnerability found in handlebars before 4.5.2. Lookup helper fails to validate templates. Attack may submit templates that execute arbitrary JavaScript in the system.
<p>Publish Date: 2019-11-13
<p>URL: <a href=https://github.com/wycats/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e>WS-2019-0331</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1316">https://www.npmjs.com/advisories/1316</a></p>
<p>Release Date: 2019-11-13</p>
<p>Fix Resolution: handlebars - 4.5.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0032</summary>
### Vulnerable Library - <b>js-yaml-3.6.1.tgz</b></p>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **js-yaml-3.6.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.
<p>Publish Date: 2019-03-20
<p>URL: <a href=https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235>WS-2019-0032</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/788/versions">https://www.npmjs.com/advisories/788/versions</a></p>
<p>Release Date: 2019-03-20</p>
<p>Fix Resolution: js-yaml - 3.13.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2018-0076</summary>
### Vulnerable Library - <b>tunnel-agent-0.4.3.tgz</b></p>
<p>HTTP proxy tunneling agent. Formerly part of mikeal/request, now a standalone module.</p>
<p>Library home page: <a href="https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz">https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/tunnel-agent/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- request-2.42.0.tgz
- :x: **tunnel-agent-0.4.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Versions of tunnel-agent before 0.6.0 are vulnerable to memory exposure.
This is exploitable if user supplied input is provided to the auth value and is a number.
<p>Publish Date: 2017-03-05
<p>URL: <a href=https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0>WS-2018-0076</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/598">https://nodesecurity.io/advisories/598</a></p>
<p>Release Date: 2018-01-27</p>
<p>Fix Resolution: 0.6.0</p>
</p>
<p></p>
</details> | True | tap-5.8.0.tgz: 25 vulnerabilities (highest severity is: 9.8) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tap-5.8.0.tgz</b></p></summary>
<p></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p></details>
#### <img src='https://whitesource-resources.whitesourcesoftware.com/suggestedVersion.png' width=19 height=20> Mend has checked all newer package trees, and you are on the least vulnerable package!
#### Please note: There might be a version that explicitly solves one or more of the vulnerabilities listed below, but we do not recommend it. For more info about the optional fixes, check the section “Details” below.
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (tap version) | Fix PR available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2019-19919](https://www.mend.io/vulnerability-database/CVE-2019-19919) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [CVE-2018-1000620](https://www.mend.io/vulnerability-database/CVE-2018-1000620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | ❌ |
| [CVE-2018-3728](https://www.mend.io/vulnerability-database/CVE-2018-3728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | ❌ |
| [WS-2019-0333](https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0063](https://github.com/nodeca/js-yaml/pull/480) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.0 | js-yaml-3.6.1.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0064](https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.0 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [CVE-2019-20922](https://www.mend.io/vulnerability-database/CVE-2019-20922) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [CVE-2016-10540](https://www.mend.io/vulnerability-database/CVE-2016-10540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | ❌ |
| [CVE-2016-2515](https://www.mend.io/vulnerability-database/CVE-2016-2515) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | hawk-1.1.1.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0492](https://github.com/handlebars-lang/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0493](https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [CVE-2017-18077](https://www.mend.io/vulnerability-database/CVE-2017-18077) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | brace-expansion-1.1.4.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0318](https://github.com/wycats/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2018-0590](https://bugzilla.redhat.com/show_bug.cgi?id=1552148) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.0 | diff-1.4.0.tgz | Transitive | N/A* | ❌ |
| [CVE-2017-16026](https://www.mend.io/vulnerability-database/CVE-2017-16026) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | request-2.42.0.tgz | Transitive | N/A* | ❌ |
| [CVE-2020-7598](https://www.mend.io/vulnerability-database/CVE-2020-7598) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.6 | detected in multiple dependencies | Transitive | N/A* | ❌ |
| [WS-2017-0266](https://github.com/joyent/node-http-signature/commit/78ab1da232f31f695f5c362d863593a143aa8b56) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | http-signature-0.10.1.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0103](https://github.com/wycats/handlebars.js/issues/1267#issue-187151586) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2021-0154](https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | glob-parent-2.0.0.tgz | Transitive | N/A* | ❌ |
| [CVE-2020-7608](https://www.mend.io/vulnerability-database/CVE-2020-7608) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | yargs-parser-2.4.0.tgz | Transitive | N/A* | ❌ |
| [CVE-2017-16028](https://www.mend.io/vulnerability-database/CVE-2017-16028) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | randomatic-1.1.5.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0332](https://github.com/wycats/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0331](https://github.com/wycats/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | handlebars-4.0.5.tgz | Transitive | N/A* | ❌ |
| [WS-2019-0032](https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | js-yaml-3.6.1.tgz | Transitive | N/A* | ❌ |
| [WS-2018-0076](https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | tunnel-agent-0.4.3.tgz | Transitive | N/A* | ❌ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-19919</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's __proto__ and __defineGetter__ properties, which may allow an attacker to execute arbitrary code through crafted payloads.
<p>Publish Date: 2019-12-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-19919>CVE-2019-19919</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1164">https://www.npmjs.com/advisories/1164</a></p>
<p>Release Date: 2019-12-20</p>
<p>Fix Resolution: 4.3.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-1000620</summary>
### Vulnerable Libraries - <b>cryptiles-0.2.2.tgz</b>, <b>cryptiles-2.0.5.tgz</b></p>
<p>
### <b>cryptiles-0.2.2.tgz</b></p>
<p>General purpose crypto utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-0.2.2.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-0.2.2.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/cryptiles/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- request-2.42.0.tgz
- hawk-1.1.1.tgz
- :x: **cryptiles-0.2.2.tgz** (Vulnerable Library)
### <b>cryptiles-2.0.5.tgz</b></p>
<p>General purpose crypto utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/coveralls/node_modules/cryptiles/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- coveralls-2.13.3.tgz
- request-2.79.0.tgz
- hawk-3.1.3.tgz
- :x: **cryptiles-2.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2.
<p>Publish Date: 2018-07-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-1000620>CVE-2018-1000620</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620</a></p>
<p>Release Date: 2018-07-09</p>
<p>Fix Resolution: v4.1.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-3728</summary>
### Vulnerable Libraries - <b>hoek-0.9.1.tgz</b>, <b>hoek-2.16.3.tgz</b></p>
<p>
### <b>hoek-0.9.1.tgz</b></p>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz">https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- request-2.42.0.tgz
- hawk-1.1.1.tgz
- :x: **hoek-0.9.1.tgz** (Vulnerable Library)
### <b>hoek-2.16.3.tgz</b></p>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/coveralls/node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- coveralls-2.13.3.tgz
- request-2.79.0.tgz
- hawk-3.1.3.tgz
- :x: **hoek-2.16.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
<p>Publish Date: 2018-03-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-3728>CVE-2018-3728</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-3728">https://nvd.nist.gov/vuln/detail/CVE-2018-3728</a></p>
<p>Release Date: 2018-03-30</p>
<p>Fix Resolution: 4.2.1,5.0.3</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0333</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In handlebars, versions prior to v4.5.3 are vulnerable to prototype pollution. Using a malicious template it's possbile to add or modify properties to the Object prototype. This can also lead to DOS and RCE in certain conditions.
<p>Publish Date: 2019-11-18
<p>URL: <a href=https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08>WS-2019-0333</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1325">https://www.npmjs.com/advisories/1325</a></p>
<p>Release Date: 2019-11-18</p>
<p>Fix Resolution: handlebars - 4.5.3</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0063</summary>
### Vulnerable Library - <b>js-yaml-3.6.1.tgz</b></p>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **js-yaml-3.6.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
<p>Publish Date: 2019-04-05
<p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>8.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution: js-yaml - 3.13.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0064</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server.
<p>Publish Date: 2019-01-30
<p>URL: <a href=https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2>WS-2019-0064</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>8.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/755/versions">https://www.npmjs.com/advisories/755/versions</a></p>
<p>Release Date: 2019-04-30</p>
<p>Fix Resolution: 1.0.6-2,4.0.14,4.1.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20922</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
<p>Publish Date: 2020-09-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20922>CVE-2019-20922</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1300">https://www.npmjs.com/advisories/1300</a></p>
<p>Release Date: 2020-09-30</p>
<p>Fix Resolution: handlebars - 4.4.5</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-10540</summary>
### Vulnerable Libraries - <b>minimatch-2.0.10.tgz</b>, <b>minimatch-3.0.0.tgz</b></p>
<p>
### <b>minimatch-2.0.10.tgz</b></p>
<p>a glob matcher in javascript</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz">https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/fileset/node_modules/minimatch/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- fileset-0.2.1.tgz
- :x: **minimatch-2.0.10.tgz** (Vulnerable Library)
### <b>minimatch-3.0.0.tgz</b></p>
<p>a glob matcher in javascript</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.0.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/glob/node_modules/minimatch/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- glob-7.0.3.tgz
- :x: **minimatch-3.0.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript `RegExp` objects. The primary function, `minimatch(path, pattern)` in Minimatch 3.0.1 and earlier is vulnerable to ReDoS in the `pattern` parameter.
<p>Publish Date: 2018-05-31
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10540>CVE-2016-10540</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/118">https://nodesecurity.io/advisories/118</a></p>
<p>Release Date: 2016-06-20</p>
<p>Fix Resolution: Update to version 3.0.2 or later.</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-2515</summary>
### Vulnerable Library - <b>hawk-1.1.1.tgz</b></p>
<p>HTTP Hawk Authentication Scheme</p>
<p>Library home page: <a href="https://registry.npmjs.org/hawk/-/hawk-1.1.1.tgz">https://registry.npmjs.org/hawk/-/hawk-1.1.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/hawk/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- request-2.42.0.tgz
- :x: **hawk-1.1.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Hawk before 3.1.3 and 4.x before 4.1.1 allow remote attackers to cause a denial of service (CPU consumption or partial outage) via a long (1) header or (2) URI that is matched against an improper regular expression.
<p>Publish Date: 2016-04-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-2515>CVE-2016-2515</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2515">https://nvd.nist.gov/vuln/detail/CVE-2016-2515</a></p>
<p>Release Date: 2016-04-13</p>
<p>Fix Resolution: 3.1.3,4.1.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0492</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system.
<p>Publish Date: 2019-11-19
<p>URL: <a href=https://github.com/handlebars-lang/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7>WS-2019-0492</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p>
<p>Release Date: 2019-11-19</p>
<p>Fix Resolution: handlebars - 3.0.8,4.5.3</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0493</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
handlebars before 3.0.8 and 4.x before 4.5.2 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system.
<p>Publish Date: 2019-11-14
<p>URL: <a href=https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e>WS-2019-0493</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1316">https://www.npmjs.com/advisories/1316</a></p>
<p>Release Date: 2019-11-14</p>
<p>Fix Resolution: handlebars - 3.0.8,4.5.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-18077</summary>
### Vulnerable Library - <b>brace-expansion-1.1.4.tgz</b></p>
<p>Brace expansion as known from sh/bash</p>
<p>Library home page: <a href="https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.4.tgz">https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.4.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/fileset/node_modules/minimatch/node_modules/brace-expansion/package.json,/node_modules/nyc/node_modules/glob/node_modules/minimatch/node_modules/brace-expansion/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- fileset-0.2.1.tgz
- minimatch-2.0.10.tgz
- :x: **brace-expansion-1.1.4.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
index.js in brace-expansion before 1.1.7 is vulnerable to Regular Expression Denial of Service (ReDoS) attacks, as demonstrated by an expand argument containing many comma characters.
<p>Publish Date: 2018-01-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-18077>CVE-2017-18077</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18077">https://nvd.nist.gov/vuln/detail/CVE-2017-18077</a></p>
<p>Release Date: 2018-01-27</p>
<p>Fix Resolution: 1.1.7</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0318</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In "showdownjs/showdown", versions prior to v4.4.5 are vulnerable against Regular expression Denial of Service (ReDOS) once receiving specially-crafted templates.
<p>Publish Date: 2019-10-20
<p>URL: <a href=https://github.com/wycats/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b>WS-2019-0318</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1300">https://www.npmjs.com/advisories/1300</a></p>
<p>Release Date: 2019-10-20</p>
<p>Fix Resolution: handlebars - 4.4.5</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2018-0590</summary>
### Vulnerable Library - <b>diff-1.4.0.tgz</b></p>
<p>A javascript text diff implementation.</p>
<p>Library home page: <a href="https://registry.npmjs.org/diff/-/diff-1.4.0.tgz">https://registry.npmjs.org/diff/-/diff-1.4.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/diff/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- tap-mocha-reporter-0.0.27.tgz
- :x: **diff-1.4.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
<p>Publish Date: 2018-03-05
<p>URL: <a href=https://bugzilla.redhat.com/show_bug.cgi?id=1552148>WS-2018-0590</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>7.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2018-03-05</p>
<p>Fix Resolution: 3.5.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16026</summary>
### Vulnerable Library - <b>request-2.42.0.tgz</b></p>
<p>Simplified HTTP request client.</p>
<p>Library home page: <a href="https://registry.npmjs.org/request/-/request-2.42.0.tgz">https://registry.npmjs.org/request/-/request-2.42.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/request/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- :x: **request-2.42.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Request is an http client. If a request is made using ```multipart```, and the body type is a ```number```, then the specified number of non-zero memory is passed in the body. This affects Request >=2.2.6 <2.47.0 || >2.51.0 <=2.67.0.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16026>CVE-2017-16026</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.9</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-16026">https://nvd.nist.gov/vuln/detail/CVE-2017-16026</a></p>
<p>Release Date: 2018-06-04</p>
<p>Fix Resolution: 2.47.1,2.67.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7598</summary>
### Vulnerable Libraries - <b>minimist-1.2.0.tgz</b>, <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b></p>
<p>
### <b>minimist-1.2.0.tgz</b></p>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/coveralls/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- coveralls-2.13.3.tgz
- :x: **minimist-1.2.0.tgz** (Vulnerable Library)
### <b>minimist-0.0.8.tgz</b></p>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/mkdirp/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- mkdirp-0.5.1.tgz
- :x: **minimist-0.0.8.tgz** (Vulnerable Library)
### <b>minimist-0.0.10.tgz</b></p>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/node_modules/optimist/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- handlebars-4.0.5.tgz
- optimist-0.6.1.tgz
- :x: **minimist-0.0.10.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
<p>Publish Date: 2020-03-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7598>CVE-2020-7598</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.6</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7598">https://nvd.nist.gov/vuln/detail/CVE-2020-7598</a></p>
<p>Release Date: 2020-03-12</p>
<p>Fix Resolution: Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;org.webjars:npm - 5.0.0-1;Indianadavy.VueJsWebAPITemplate.CSharp - 1.0.1;NorDroN.AngularTemplate - 0.1.6;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 2.0.0;ApiExplorer.HelpPage - 1.0.0-alpha3;CoreVueWebTest - 3.0.101;dotnetng.template - 1.0.0.4;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;Fable.Template.Elmish.React - 0.1.6;BumperLane.Public.Api.Client - 0.23.35.214-prerelease;Yarn.MSBuild - 0.24.6,0.22.0;Bridge.AWS - 0.3.30.36;Nodejs.Redist.x64 - 7.7.3.1,10.3.0;tslint - 5.6.0,6.1.1;org.webjars.npm:bourbon-neat - 2.0.0-beta.2;GR.PageRender.Razor - 1.8.0;MIDIator.WebClient - 1.0.105;EntityFramework.LookupTables - 1.1.14.119;BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;org.webjars.npm:minimist - 1.2.4;minimist - 1.2.3,0.2.1;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Romano.Vue - 1.0.1;Yarnpkg.Yarn - 0.26.1;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;Chutzpah - 4.4.10;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;VueJS.NetCore - 1.1.1;Dianoga - 5.0.0-beta.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2017-0266</summary>
### Vulnerable Library - <b>http-signature-0.10.1.tgz</b></p>
<p>Reference implementation of Joyent's HTTP Signature scheme.</p>
<p>Library home page: <a href="https://registry.npmjs.org/http-signature/-/http-signature-0.10.1.tgz">https://registry.npmjs.org/http-signature/-/http-signature-0.10.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/http-signature/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- request-2.42.0.tgz
- :x: **http-signature-0.10.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Affected versions (before 1.0.0) of the http-signature package are vulnerable to Timing Attacks.
<p>Publish Date: 2015-01-22
<p>URL: <a href=https://github.com/joyent/node-http-signature/commit/78ab1da232f31f695f5c362d863593a143aa8b56>WS-2017-0266</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.5</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2017-01-31</p>
<p>Fix Resolution: 1.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0103</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Handlebars.js before 4.1.0 has Remote Code Execution (RCE)
<p>Publish Date: 2019-01-30
<p>URL: <a href=https://github.com/wycats/handlebars.js/issues/1267#issue-187151586>WS-2019-0103</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.5</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2019-05-30</p>
<p>Fix Resolution: 4.1.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2021-0154</summary>
### Vulnerable Library - <b>glob-parent-2.0.0.tgz</b></p>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/micromatch/node_modules/parse-glob/node_modules/glob-base/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- micromatch-2.3.8.tgz
- parse-glob-3.0.4.tgz
- glob-base-0.3.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Regular Expression Denial of Service (ReDoS) vulnerability was found in glob-parent before 5.1.2.
<p>Publish Date: 2021-01-27
<p>URL: <a href=https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366>WS-2021-0154</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-01-27</p>
<p>Fix Resolution: glob-parent - 5.1.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7608</summary>
### Vulnerable Library - <b>yargs-parser-2.4.0.tgz</b></p>
<p>the mighty option parser used by yargs</p>
<p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-2.4.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-2.4.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/yargs/node_modules/yargs-parser/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- yargs-4.7.1.tgz
- :x: **yargs-parser-2.4.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload.
<p>Publish Date: 2020-03-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7608>CVE-2020-7608</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608</a></p>
<p>Release Date: 2020-03-16</p>
<p>Fix Resolution: v18.1.1;13.1.2;15.0.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16028</summary>
### Vulnerable Library - <b>randomatic-1.1.5.tgz</b></p>
<p>Generate randomized strings of a specified length, fast. Only the length is necessary, but you can optionally generate patterns using any combination of numeric, alpha-numeric, alphabetical, special or custom characters.</p>
<p>Library home page: <a href="https://registry.npmjs.org/randomatic/-/randomatic-1.1.5.tgz">https://registry.npmjs.org/randomatic/-/randomatic-1.1.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/micromatch/node_modules/braces/node_modules/expand-range/node_modules/fill-range/node_modules/randomatic/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- micromatch-2.3.8.tgz
- braces-1.8.5.tgz
- expand-range-1.8.2.tgz
- fill-range-2.2.3.tgz
- :x: **randomatic-1.1.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
react-native-meteor-oauth is a library for Oauth2 login to a Meteor server in React Native. The oauth Random Token is generated using a non-cryptographically strong RNG (Math.random()).
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-16028>CVE-2017-16028</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/157">https://nodesecurity.io/advisories/157</a></p>
<p>Release Date: 2017-04-14</p>
<p>Fix Resolution: Update to version 3.0.0 or later.</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0332</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Arbitrary Code Execution vulnerability found in handlebars before 4.5.3. Lookup helper fails to validate templates. Attack may submit templates that execute arbitrary JavaScript in the system.It is due to an incomplete fix for a WS-2019-0331.
<p>Publish Date: 2019-11-17
<p>URL: <a href=https://github.com/wycats/handlebars.js/commit/198887808780bbef9dba67a8af68ece091d5baa7>WS-2019-0332</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p>
<p>Release Date: 2019-11-17</p>
<p>Fix Resolution: handlebars - 4.5.3</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0331</summary>
### Vulnerable Library - <b>handlebars-4.0.5.tgz</b></p>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.0.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **handlebars-4.0.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Arbitrary Code Execution vulnerability found in handlebars before 4.5.2. Lookup helper fails to validate templates. Attack may submit templates that execute arbitrary JavaScript in the system.
<p>Publish Date: 2019-11-13
<p>URL: <a href=https://github.com/wycats/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e>WS-2019-0331</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1316">https://www.npmjs.com/advisories/1316</a></p>
<p>Release Date: 2019-11-13</p>
<p>Fix Resolution: handlebars - 4.5.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0032</summary>
### Vulnerable Library - <b>js-yaml-3.6.1.tgz</b></p>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.6.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/istanbul/node_modules/js-yaml/package.json,/node_modules/coveralls/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- nyc-6.6.1.tgz
- istanbul-0.4.3.tgz
- :x: **js-yaml-3.6.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.
<p>Publish Date: 2019-03-20
<p>URL: <a href=https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235>WS-2019-0032</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/788/versions">https://www.npmjs.com/advisories/788/versions</a></p>
<p>Release Date: 2019-03-20</p>
<p>Fix Resolution: js-yaml - 3.13.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2018-0076</summary>
### Vulnerable Library - <b>tunnel-agent-0.4.3.tgz</b></p>
<p>HTTP proxy tunneling agent. Formerly part of mikeal/request, now a standalone module.</p>
<p>Library home page: <a href="https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz">https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/tunnel-agent/package.json</p>
<p>
Dependency Hierarchy:
- tap-5.8.0.tgz (Root Library)
- codecov.io-0.1.6.tgz
- request-2.42.0.tgz
- :x: **tunnel-agent-0.4.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uriel-naor/Test/commit/18864a785046519c7a79f1f7eae2eddf35cb5fbb">18864a785046519c7a79f1f7eae2eddf35cb5fbb</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Versions of tunnel-agent before 0.6.0 are vulnerable to memory exposure.
This is exploitable if user supplied input is provided to the auth value and is a number.
<p>Publish Date: 2017-03-05
<p>URL: <a href=https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0>WS-2018-0076</a></p>
</p>
<p></p>
### CVSS 2 Score Details (<b>5.0</b>)
<p>
Base Score Metrics not available</p>
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/598">https://nodesecurity.io/advisories/598</a></p>
<p>Release Date: 2018-01-27</p>
<p>Fix Resolution: 0.6.0</p>
</p>
<p></p>
</details> | non_usab | tap tgz vulnerabilities highest severity is autoclosed vulnerable library tap tgz path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules js yaml package json node modules coveralls node modules js yaml package json found in head commit a href mend has checked all newer package trees and you are on the least vulnerable package please note there might be a version that explicitly solves one or more of the vulnerabilities listed below but we do not recommend it for more info about the optional fixes check the section “details” below vulnerabilities cve severity cvss dependency type fixed in tap version fix pr available high handlebars tgz transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high handlebars tgz transitive n a high js yaml tgz transitive n a high handlebars tgz transitive n a high handlebars tgz transitive n a high detected in multiple dependencies transitive n a high hawk tgz transitive n a high handlebars tgz transitive n a high handlebars tgz transitive n a high brace expansion tgz transitive n a high handlebars tgz transitive n a high diff tgz transitive n a medium request tgz transitive n a medium detected in multiple dependencies transitive n a medium http signature tgz transitive n a medium handlebars tgz transitive n a medium glob parent tgz transitive n a medium yargs parser tgz transitive n a medium randomatic tgz transitive n a medium handlebars tgz transitive n a medium handlebars tgz transitive n a medium js yaml tgz transitive n a medium tunnel agent tgz transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the section details below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details versions of handlebars prior to are vulnerable to prototype pollution leading to remote code execution templates may alter an object s proto and definegetter properties which may allow an attacker to execute arbitrary code through crafted payloads publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable libraries cryptiles tgz cryptiles tgz cryptiles tgz general purpose crypto utilities library home page a href path to dependency file package json path to vulnerable library node modules cryptiles package json dependency hierarchy tap tgz root library codecov io tgz request tgz hawk tgz x cryptiles tgz vulnerable library cryptiles tgz general purpose crypto utilities library home page a href path to dependency file package json path to vulnerable library node modules coveralls node modules cryptiles package json dependency hierarchy tap tgz root library coveralls tgz request tgz hawk tgz x cryptiles tgz vulnerable library found in head commit a href found in base branch main vulnerability details eran hammer cryptiles version earlier contains a cwe insufficient entropy vulnerability in randomdigits method that can result in an attacker is more likely to be able to brute force something that was supposed to be random this attack appear to be exploitable via depends upon the calling application this vulnerability appears to have been fixed in publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable libraries hoek tgz hoek tgz hoek tgz general purpose node utilities library home page a href path to dependency file package json path to vulnerable library node modules hoek package json dependency hierarchy tap tgz root library codecov io tgz request tgz hawk tgz x hoek tgz vulnerable library hoek tgz general purpose node utilities library home page a href path to dependency file package json path to vulnerable library node modules coveralls node modules hoek package json dependency hierarchy tap tgz root library coveralls tgz request tgz hawk tgz x hoek tgz vulnerable library found in head commit a href found in base branch main vulnerability details hoek node module before and x before suffers from a modification of assumed immutable data maid vulnerability via merge and applytodefaults functions which allows a malicious user to modify the prototype of object via proto causing the addition or modification of an existing property that will exist on all objects publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details in handlebars versions prior to are vulnerable to prototype pollution using a malicious template it s possbile to add or modify properties to the object prototype this can also lead to dos and rce in certain conditions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars ws vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules js yaml package json node modules coveralls node modules js yaml package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x js yaml tgz vulnerable library found in head commit a href found in base branch main vulnerability details js yaml prior to are vulnerable to code injection the load function may execute arbitrary code injected through a malicious yaml file publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution js yaml ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details versions of handlebars prior to are vulnerable to prototype pollution templates may alter an objects prototype thus allowing an attacker to execute arbitrary code on the server publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution cve vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details handlebars before allows regular expression denial of service redos because of eager matching the parser may be forced into an endless loop while processing crafted templates this may allow attackers to exhaust system resources publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars cve vulnerable libraries minimatch tgz minimatch tgz minimatch tgz a glob matcher in javascript library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules fileset node modules minimatch package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz fileset tgz x minimatch tgz vulnerable library minimatch tgz a glob matcher in javascript library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules glob node modules minimatch package json dependency hierarchy tap tgz root library nyc tgz glob tgz x minimatch tgz vulnerable library found in head commit a href found in base branch main vulnerability details minimatch is a minimal matching utility that works by converting glob expressions into javascript regexp objects the primary function minimatch path pattern in minimatch and earlier is vulnerable to redos in the pattern parameter publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution update to version or later cve vulnerable library hawk tgz http hawk authentication scheme library home page a href path to dependency file package json path to vulnerable library node modules hawk package json dependency hierarchy tap tgz root library codecov io tgz request tgz x hawk tgz vulnerable library found in head commit a href found in base branch main vulnerability details hawk before and x before allow remote attackers to cause a denial of service cpu consumption or partial outage via a long header or uri that is matched against an improper regular expression publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details handlebars before and x before is vulnerable to arbitrary code execution the package s lookup helper fails to properly validate templates allowing attackers to submit templates that execute arbitrary javascript in the system publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details handlebars before and x before is vulnerable to arbitrary code execution the package s lookup helper fails to properly validate templates allowing attackers to submit templates that execute arbitrary javascript in the system publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars cve vulnerable library brace expansion tgz brace expansion as known from sh bash library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules fileset node modules minimatch node modules brace expansion package json node modules nyc node modules glob node modules minimatch node modules brace expansion package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz fileset tgz minimatch tgz x brace expansion tgz vulnerable library found in head commit a href found in base branch main vulnerability details index js in brace expansion before is vulnerable to regular expression denial of service redos attacks as demonstrated by an expand argument containing many comma characters publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details in showdownjs showdown versions prior to are vulnerable against regular expression denial of service redos once receiving specially crafted templates publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars ws vulnerable library diff tgz a javascript text diff implementation library home page a href path to dependency file package json path to vulnerable library node modules diff package json dependency hierarchy tap tgz root library tap mocha reporter tgz x diff tgz vulnerable library found in head commit a href found in base branch main vulnerability details a vulnerability was found in diff before the affected versions of this package are vulnerable to regular expression denial of service redos attacks publish date url a href cvss score details base score metrics not available suggested fix type upgrade version release date fix resolution cve vulnerable library request tgz simplified http request client library home page a href path to dependency file package json path to vulnerable library node modules request package json dependency hierarchy tap tgz root library codecov io tgz x request tgz vulnerable library found in head commit a href found in base branch main vulnerability details request is an http client if a request is made using multipart and the body type is a number then the specified number of non zero memory is passed in the body this affects request publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable libraries minimist tgz minimist tgz minimist tgz minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules coveralls node modules minimist package json dependency hierarchy tap tgz root library coveralls tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules mkdirp node modules minimist package json dependency hierarchy tap tgz root library nyc tgz mkdirp tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars node modules optimist node modules minimist package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz handlebars tgz optimist tgz x minimist tgz vulnerable library found in head commit a href found in base branch main vulnerability details minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution virteom tenant mobile bluetooth ios prerelease virteom public utilities prerelease org webjars npm indianadavy vuejswebapitemplate csharp nordron angulartemplate virteom tenant mobile framework prerelease virteom tenant mobile bluetooth android prerelease dotnet scaffold raml parser apiexplorer helppage corevuewebtest dotnetng template sitecoremaster truedynamicplaceholders virteom tenant mobile framework android prerelease fable template elmish react bumperlane public api client prerelease yarn msbuild bridge aws nodejs redist tslint org webjars npm bourbon neat beta gr pagerender razor midiator webclient entityframework lookuptables bumperlane public service contracts prerelease org webjars npm minimist minimist virteom tenant mobile bluetooth prerelease showingvault dotnet sdk prerelease romano vue yarnpkg yarn virteom tenant mobile framework uwp prerelease virteom tenant mobile framework ios prerelease chutzpah bumperlane public api clientmodule prerelease vuejs netcore dianoga beta ws vulnerable library http signature tgz reference implementation of joyent s http signature scheme library home page a href path to dependency file package json path to vulnerable library node modules http signature package json dependency hierarchy tap tgz root library codecov io tgz request tgz x http signature tgz vulnerable library found in head commit a href found in base branch main vulnerability details affected versions before of the http signature package are vulnerable to timing attacks publish date url a href cvss score details base score metrics not available suggested fix type upgrade version release date fix resolution ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details handlebars js before has remote code execution rce publish date url a href cvss score details base score metrics not available suggested fix type upgrade version release date fix resolution ws vulnerable library glob parent tgz strips glob magic from a string to provide the parent path library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules micromatch node modules parse glob node modules glob base node modules glob parent package json dependency hierarchy tap tgz root library nyc tgz micromatch tgz parse glob tgz glob base tgz x glob parent tgz vulnerable library found in head commit a href found in base branch main vulnerability details regular expression denial of service redos vulnerability was found in glob parent before publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version release date fix resolution glob parent cve vulnerable library yargs parser tgz the mighty option parser used by yargs library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules yargs node modules yargs parser package json dependency hierarchy tap tgz root library nyc tgz yargs tgz x yargs parser tgz vulnerable library found in head commit a href found in base branch main vulnerability details yargs parser could be tricked into adding or modifying properties of object prototype using a proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable library randomatic tgz generate randomized strings of a specified length fast only the length is necessary but you can optionally generate patterns using any combination of numeric alpha numeric alphabetical special or custom characters library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules micromatch node modules braces node modules expand range node modules fill range node modules randomatic package json dependency hierarchy tap tgz root library nyc tgz micromatch tgz braces tgz expand range tgz fill range tgz x randomatic tgz vulnerable library found in head commit a href found in base branch main vulnerability details react native meteor oauth is a library for login to a meteor server in react native the oauth random token is generated using a non cryptographically strong rng math random publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution update to version or later ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details arbitrary code execution vulnerability found in handlebars before lookup helper fails to validate templates attack may submit templates that execute arbitrary javascript in the system it is due to an incomplete fix for a ws publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution handlebars ws vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules handlebars package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x handlebars tgz vulnerable library found in head commit a href found in base branch main vulnerability details arbitrary code execution vulnerability found in handlebars before lookup helper fails to validate templates attack may submit templates that execute arbitrary javascript in the system publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution handlebars ws vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules istanbul node modules js yaml package json node modules coveralls node modules js yaml package json dependency hierarchy tap tgz root library nyc tgz istanbul tgz x js yaml tgz vulnerable library found in head commit a href found in base branch main vulnerability details versions js yaml prior to are vulnerable to denial of service by parsing a carefully crafted yaml file the node process stalls and may exhaust system resources leading to a denial of service publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution js yaml ws vulnerable library tunnel agent tgz http proxy tunneling agent formerly part of mikeal request now a standalone module library home page a href path to dependency file package json path to vulnerable library node modules tunnel agent package json dependency hierarchy tap tgz root library codecov io tgz request tgz x tunnel agent tgz vulnerable library found in head commit a href found in base branch main vulnerability details versions of tunnel agent before are vulnerable to memory exposure this is exploitable if user supplied input is provided to the auth value and is a number publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution | 0 |
202,772 | 15,300,247,052 | IssuesEvent | 2021-02-24 12:03:11 | fetchai/agents-aea | https://api.github.com/repos/fetchai/agents-aea | closed | Add remaining tests for Tac_Negotiation | bug test | **What**
Add the remaining tests for `tac_negotiation` skill.
Coverage for methods that reference `self.context.decision_maker_handler_context` is missing. This was due to the skill testing tool not being able to deal with it.
Add support for this in the skill testing tool and add coverage for these parts of tac_negotiation skill. Specifically the following four:
- `behaviour.py::GoodsRegisterAndSearchBehaviour::act::if not self.context.decision_maker_handler_context.goal_pursuit_readiness.is_ready`
- transactions.py::Transactions::ownership_state_after_locks
- strategy.py::Strategy::_generate_candidate_proposals
- strategy.py::Strategy::is_profitable_transaction | 1.0 | Add remaining tests for Tac_Negotiation - **What**
Add the remaining tests for `tac_negotiation` skill.
Coverage for methods that reference `self.context.decision_maker_handler_context` is missing. This was due to the skill testing tool not being able to deal with it.
Add support for this in the skill testing tool and add coverage for these parts of tac_negotiation skill. Specifically the following four:
- `behaviour.py::GoodsRegisterAndSearchBehaviour::act::if not self.context.decision_maker_handler_context.goal_pursuit_readiness.is_ready`
- transactions.py::Transactions::ownership_state_after_locks
- strategy.py::Strategy::_generate_candidate_proposals
- strategy.py::Strategy::is_profitable_transaction | non_usab | add remaining tests for tac negotiation what add the remaining tests for tac negotiation skill coverage for methods that reference self context decision maker handler context is missing this was due to the skill testing tool not being able to deal with it add support for this in the skill testing tool and add coverage for these parts of tac negotiation skill specifically the following four behaviour py goodsregisterandsearchbehaviour act if not self context decision maker handler context goal pursuit readiness is ready transactions py transactions ownership state after locks strategy py strategy generate candidate proposals strategy py strategy is profitable transaction | 0 |
6,256 | 4,203,418,286 | IssuesEvent | 2016-06-28 05:09:32 | Virtual-Labs/structural-dynamics-iiith | https://api.github.com/repos/Virtual-Labs/structural-dynamics-iiith | closed | QA_Free Vibration of Single Degree of Freedom System_Prerequisites_p1 | Category: Usability Developed by: VLEAD Release Number: Production Resolved Severity: S2 | Defect Description :
In the "Free Vibration of Single Degree of Freedom System" experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required.
Actual Result :
In the "Free Vibration of Single Degree of Freedom System" experiment, the minimum requirement to run the experiment is not displayed in the page.
Environment :
OS: Windows 7, Ubuntu-16.04,Centos-6
Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0
Bandwidth : 100Mbps
Hardware Configuration:8GBRAM
Processor:i5
Test Step Link:
https://github.com/Virtual-Labs/structural-dynamics-iiith/blob/master/test-cases/integration_test-cases/Free%20Vibration%20of%20Single%20Degree/Free%20Vibration%20of%20Single%20Degree_17_Prerequisites_p1.org
Attachment:

| True | QA_Free Vibration of Single Degree of Freedom System_Prerequisites_p1 - Defect Description :
In the "Free Vibration of Single Degree of Freedom System" experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required.
Actual Result :
In the "Free Vibration of Single Degree of Freedom System" experiment, the minimum requirement to run the experiment is not displayed in the page.
Environment :
OS: Windows 7, Ubuntu-16.04,Centos-6
Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0
Bandwidth : 100Mbps
Hardware Configuration:8GBRAM
Processor:i5
Test Step Link:
https://github.com/Virtual-Labs/structural-dynamics-iiith/blob/master/test-cases/integration_test-cases/Free%20Vibration%20of%20Single%20Degree/Free%20Vibration%20of%20Single%20Degree_17_Prerequisites_p1.org
Attachment:

| usab | qa free vibration of single degree of freedom system prerequisites defect description in the free vibration of single degree of freedom system experiment the minimum requirement to run the experiment is not displayed in the page instead a page or scrolling should appear providing information on minimum requirement to run this experiment information like bandwidth device resolution hardware configuration and software required actual result in the free vibration of single degree of freedom system experiment the minimum requirement to run the experiment is not displayed in the page environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor test step link attachment | 1 |
3,539 | 3,482,147,743 | IssuesEvent | 2015-12-29 21:07:29 | spiral/spiral | https://api.github.com/repos/spiral/spiral | closed | Create ?? polyfill for views or built an alternative syntax | improvement module usability | Or replace invocations of some short function like first($data, $value, $default) => automatically process using InvocationLocator and replace with valid statement (getSource + arguments, like in a past for i18n functions).
Other "functions" like that? I should probably fix runtimeVariable/evaluatorVariable like that as well - no regexp. | True | Create ?? polyfill for views or built an alternative syntax - Or replace invocations of some short function like first($data, $value, $default) => automatically process using InvocationLocator and replace with valid statement (getSource + arguments, like in a past for i18n functions).
Other "functions" like that? I should probably fix runtimeVariable/evaluatorVariable like that as well - no regexp. | usab | create polyfill for views or built an alternative syntax or replace invocations of some short function like first data value default automatically process using invocationlocator and replace with valid statement getsource arguments like in a past for functions other functions like that i should probably fix runtimevariable evaluatorvariable like that as well no regexp | 1 |
4,342 | 2,718,494,051 | IssuesEvent | 2015-04-12 11:04:40 | shokai/Android-GMapStars | https://api.github.com/repos/shokai/Android-GMapStars | closed | Circle CIでテストする | test | - [x] configure GitHub->Circle CI webhook
- [x] テストする
- [x] READMEにstatus badgeを表示する | 1.0 | Circle CIでテストする - - [x] configure GitHub->Circle CI webhook
- [x] テストする
- [x] READMEにstatus badgeを表示する | non_usab | circle ciでテストする configure github circle ci webhook テストする readmeにstatus badgeを表示する | 0 |
597,751 | 18,170,950,923 | IssuesEvent | 2021-09-27 19:58:44 | googleapis/repo-automation-bots | https://api.github.com/repos/googleapis/repo-automation-bots | closed | Owl Bot fails on corrupt lock file, but the lock file mostly seems ok | type: bug priority: p3 | Looking at this PR:
https://github.com/googleapis/nodejs-eventarc/pull/28
The Owl Bot status check fails with the message: `The OwlBot lock file on this repository is corrupt`:
https://github.com/googleapis/nodejs-eventarc/pull/28/checks?check_run_id=3694777305
At a glance, the lock file seems mostly ok, but I could be missing something:
https://github.com/googleapis/nodejs-eventarc/blob/main/.github/.OwlBot.lock.yaml
Flagging as a P1 since we can't ship/update the module at the moment.
| 1.0 | Owl Bot fails on corrupt lock file, but the lock file mostly seems ok - Looking at this PR:
https://github.com/googleapis/nodejs-eventarc/pull/28
The Owl Bot status check fails with the message: `The OwlBot lock file on this repository is corrupt`:
https://github.com/googleapis/nodejs-eventarc/pull/28/checks?check_run_id=3694777305
At a glance, the lock file seems mostly ok, but I could be missing something:
https://github.com/googleapis/nodejs-eventarc/blob/main/.github/.OwlBot.lock.yaml
Flagging as a P1 since we can't ship/update the module at the moment.
| non_usab | owl bot fails on corrupt lock file but the lock file mostly seems ok looking at this pr the owl bot status check fails with the message the owlbot lock file on this repository is corrupt at a glance the lock file seems mostly ok but i could be missing something flagging as a since we can t ship update the module at the moment | 0 |
229,854 | 17,580,392,085 | IssuesEvent | 2021-08-16 06:28:02 | lorezyra/Richie2.com | https://api.github.com/repos/lorezyra/Richie2.com | closed | For both CSS & JS, please use only letters for class,var,function names | documentation | In both the (S)CSS and JavaScript, please don't use a hyphen `-` or other non-alphabet letters. Please use [camelCase](https://www.crockford.com/code.html) characters.
Should be: `[A-Za-z]`
Ref: https://en.wikipedia.org/wiki/Naming_convention_(programming) | 1.0 | For both CSS & JS, please use only letters for class,var,function names - In both the (S)CSS and JavaScript, please don't use a hyphen `-` or other non-alphabet letters. Please use [camelCase](https://www.crockford.com/code.html) characters.
Should be: `[A-Za-z]`
Ref: https://en.wikipedia.org/wiki/Naming_convention_(programming) | non_usab | for both css js please use only letters for class var function names in both the s css and javascript please don t use a hyphen or other non alphabet letters please use characters should be ref | 0 |
17,711 | 12,267,853,971 | IssuesEvent | 2020-05-07 11:27:51 | ClickHouse/ClickHouse | https://api.github.com/repos/ClickHouse/ClickHouse | opened | Ambigious datetime in HTTP protocol | usability | HTTP protocol displays datetime values as ISO8601 format without offset.
For non-UTC values this leads to ambiguity:
```(sql)
select
toDateTime('2010-10-31 01:30:00', 'Europe/Moscow') + arrayJoin(range(7)) * 60 * 30 as val,
groupArray(cast(val as Int64)) as val_ts
group by val order by val
format TabSeparatedWithNamesAndTypes
```
```
val val_ts
DateTime(\'Europe/Moscow\') Array(Int64)
2010-10-31 01:30:00 [1288474200]
2010-10-31 02:00:00 [1288476000]
2010-10-31 02:30:00 [1288477800]
2010-10-31 02:00:00 [1288479600]
2010-10-31 02:30:00 [1288481400]
2010-10-31 03:00:00 [1288483200]
2010-10-31 03:30:00 [1288485000]
```
It would be more correct to either:
* Serialize datetime values for HTTP with the effective offset, e.g.: ```
DateTime(\'Europe/Moscow\') Array(Int64)
2010-10-31 02:30:00+04:00 [1288477800]
2010-10-31 02:30:00+03:00 [1288481400]
```
* Serialize datetime as the underlying integer values, e.g. ```
DateTime(\'Europe/Moscow\') Array(Int64)
1288477800 [1288477800]
1288481400 [1288481400]
```
and to configure the serialization over settings (HTTP query parameters).
| True | Ambigious datetime in HTTP protocol - HTTP protocol displays datetime values as ISO8601 format without offset.
For non-UTC values this leads to ambiguity:
```(sql)
select
toDateTime('2010-10-31 01:30:00', 'Europe/Moscow') + arrayJoin(range(7)) * 60 * 30 as val,
groupArray(cast(val as Int64)) as val_ts
group by val order by val
format TabSeparatedWithNamesAndTypes
```
```
val val_ts
DateTime(\'Europe/Moscow\') Array(Int64)
2010-10-31 01:30:00 [1288474200]
2010-10-31 02:00:00 [1288476000]
2010-10-31 02:30:00 [1288477800]
2010-10-31 02:00:00 [1288479600]
2010-10-31 02:30:00 [1288481400]
2010-10-31 03:00:00 [1288483200]
2010-10-31 03:30:00 [1288485000]
```
It would be more correct to either:
* Serialize datetime values for HTTP with the effective offset, e.g.: ```
DateTime(\'Europe/Moscow\') Array(Int64)
2010-10-31 02:30:00+04:00 [1288477800]
2010-10-31 02:30:00+03:00 [1288481400]
```
* Serialize datetime as the underlying integer values, e.g. ```
DateTime(\'Europe/Moscow\') Array(Int64)
1288477800 [1288477800]
1288481400 [1288481400]
```
and to configure the serialization over settings (HTTP query parameters).
| usab | ambigious datetime in http protocol http protocol displays datetime values as format without offset for non utc values this leads to ambiguity sql select todatetime europe moscow arrayjoin range as val grouparray cast val as as val ts group by val order by val format tabseparatedwithnamesandtypes val val ts datetime europe moscow array it would be more correct to either serialize datetime values for http with the effective offset e g datetime europe moscow array serialize datetime as the underlying integer values e g datetime europe moscow array and to configure the serialization over settings http query parameters | 1 |
2,404 | 3,830,641,148 | IssuesEvent | 2016-03-31 15:12:38 | symfony/symfony | https://api.github.com/repos/symfony/symfony | closed | remember_me authentication causes loss of entity associations? | Bug Security Status: Needs Review Unconfirmed | This is a weird one. I've tested this with both the client cookie and doctrine provider and the outcome is the same.
I've implemented "Remember Me" login functionality for our application.
I also have an AuthenticationListener implemented which updates the 'User' entity with a 'lastLogin' DateTime:
```php
public function onAuthenticationSuccess( AuthenticationEvent $event )
{
$user = $event->getAuthenticationToken()->getUser();
if( $user instanceof \Veromo\Bundle\CoreBundle\Entity\User )
{
$user->set( 'lastLogin', new \DateTime() );
$this->manager->flush();
}
}
```
My 'User' Entity is associated with a 'Contact' Entity with a OneToOne Relationship which is cascaded.
**NOW ...**
When this code executes on an interactive login (user physically enters username and password), all is well - everything goes off without a hitch.
When this code executes on a non-interactive login (user has selected 'Remember Me' has a valid cookie, etc ..), it all falls in a heap.
It appears that when the `flush` command executes, Doctrine has 'forgotten' about the relationship that exists between the 'User' Entity and the 'Contact' Entity and attempts to re-create them (opting for an INSERT rather than an UPDATE on `flush`):
>1. INFO - Matched route "adminimiser_home".
>2. DEBUG - Remember-me cookie detected.
>3. DEBUG - SELECT u0_.id AS id0, u0_.email AS email1, u0_.mobile AS mobile2, u0_.username AS username3, u0_.password AS password4, u0_.change_password AS change_password5, u0_.validated AS validated6, u0_.is_blocked AS is_blocked7, u0_.hash AS hash8, u0_.created AS created9, u0_.updated AS updated10, u0_.last_login AS last_login11, u0_.timezone AS timezone12, u0_.contact_id AS contact_id13 FROM `user` u0_ WHERE u0_.username = ? OR u0_.email = ?
>4. DEBUG - SELECT t0.id AS id3, t0.full_name AS full_name4, t0.created AS created5, t0.updated AS updated6, t0.account_id AS account_id7, t0.type, t1.abn AS abn8, t2.title AS title9, t2.first_name AS first_name10, t2.middle_name AS middle_name11, t2.last_name AS last_name12, t2.gender AS gender13 FROM contact t0 LEFT JOIN contact_business t1 ON t0.id = t1.id LEFT JOIN contact_person t2 ON t0.id = t2.id WHERE t0.id = ?
>5. INFO - Remember-me cookie accepted.
>6. DEBUG - "START TRANSACTION"
>7. DEBUG - INSERT INTO log (date_time, channel, level, ip_address, session_id, message, context) VALUES (?, ?, ?, ?, ?, ?, ?)
>8. DEBUG - "COMMIT"
>9. DEBUG - SELECT t0.id AS id1, t0.roles AS roles2, t0.is_active AS is_active3, t0.account_id AS account_id4, t0.user_id AS user_id5 FROM user_account t0 WHERE t0.user_id = ?
>10. DEBUG - "START TRANSACTION"
>11. DEBUG - INSERT INTO contact (full_name, created, updated, account_id, type) VALUES (?, ?, ?, ?, ?)
>12. DEBUG - INSERT INTO contact_person (id, title, first_name, middle_name, last_name, gender) VALUES (?, ?, ?, ?, ?, ?)
>13. DEBUG - INSERT INTO `user` (email, mobile, username, password, change_password, validated, is_blocked, hash, created, updated, last_login, timezone, contact_id) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)
>14. DEBUG - "ROLLBACK"
>15. CRITICAL - Uncaught PHP Exception Doctrine\DBAL\DBALException: "An exception occurred while executing 'INSERT INTO `user` (email, mobile, username, password, change_password, validated, is_blocked, hash, created, updated, last_login, timezone, contact_id) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)' with params ["testuser@blah", null, null, "1MKVMPQp5ODniTDDt2PlGIlMGR9C1ZlLzYo\/Y\/2LMneA4yU3lVJ1oA==", 0, 1, 0, "c590db7b8cac19accae613f2ead63da1", "2016-01-25 04:21:40", "2016-01-25 04:21:40", "2016-01-26 00:06:40", null, 18]: SQLSTATE[23000]: Integrity constraint violation: 1062 Duplicate entry 'testuser@blah' for key 'UNIQ_8D93D649E7927C74'" at /var/veromo/vendor/doctrine/dbal/lib/Doctrine/DBAL/DBALException.php line 91
As you can see - the AUTHENTICATION is fine ... there's no issue there.
I've tried everything - including re-associating the contact with the user before the `flush` - but it appears that **the association is lost after this point**. And again - only when the `RememberMeToken` comes into play.
| True | remember_me authentication causes loss of entity associations? - This is a weird one. I've tested this with both the client cookie and doctrine provider and the outcome is the same.
I've implemented "Remember Me" login functionality for our application.
I also have an AuthenticationListener implemented which updates the 'User' entity with a 'lastLogin' DateTime:
```php
public function onAuthenticationSuccess( AuthenticationEvent $event )
{
$user = $event->getAuthenticationToken()->getUser();
if( $user instanceof \Veromo\Bundle\CoreBundle\Entity\User )
{
$user->set( 'lastLogin', new \DateTime() );
$this->manager->flush();
}
}
```
My 'User' Entity is associated with a 'Contact' Entity with a OneToOne Relationship which is cascaded.
**NOW ...**
When this code executes on an interactive login (user physically enters username and password), all is well - everything goes off without a hitch.
When this code executes on a non-interactive login (user has selected 'Remember Me' has a valid cookie, etc ..), it all falls in a heap.
It appears that when the `flush` command executes, Doctrine has 'forgotten' about the relationship that exists between the 'User' Entity and the 'Contact' Entity and attempts to re-create them (opting for an INSERT rather than an UPDATE on `flush`):
>1. INFO - Matched route "adminimiser_home".
>2. DEBUG - Remember-me cookie detected.
>3. DEBUG - SELECT u0_.id AS id0, u0_.email AS email1, u0_.mobile AS mobile2, u0_.username AS username3, u0_.password AS password4, u0_.change_password AS change_password5, u0_.validated AS validated6, u0_.is_blocked AS is_blocked7, u0_.hash AS hash8, u0_.created AS created9, u0_.updated AS updated10, u0_.last_login AS last_login11, u0_.timezone AS timezone12, u0_.contact_id AS contact_id13 FROM `user` u0_ WHERE u0_.username = ? OR u0_.email = ?
>4. DEBUG - SELECT t0.id AS id3, t0.full_name AS full_name4, t0.created AS created5, t0.updated AS updated6, t0.account_id AS account_id7, t0.type, t1.abn AS abn8, t2.title AS title9, t2.first_name AS first_name10, t2.middle_name AS middle_name11, t2.last_name AS last_name12, t2.gender AS gender13 FROM contact t0 LEFT JOIN contact_business t1 ON t0.id = t1.id LEFT JOIN contact_person t2 ON t0.id = t2.id WHERE t0.id = ?
>5. INFO - Remember-me cookie accepted.
>6. DEBUG - "START TRANSACTION"
>7. DEBUG - INSERT INTO log (date_time, channel, level, ip_address, session_id, message, context) VALUES (?, ?, ?, ?, ?, ?, ?)
>8. DEBUG - "COMMIT"
>9. DEBUG - SELECT t0.id AS id1, t0.roles AS roles2, t0.is_active AS is_active3, t0.account_id AS account_id4, t0.user_id AS user_id5 FROM user_account t0 WHERE t0.user_id = ?
>10. DEBUG - "START TRANSACTION"
>11. DEBUG - INSERT INTO contact (full_name, created, updated, account_id, type) VALUES (?, ?, ?, ?, ?)
>12. DEBUG - INSERT INTO contact_person (id, title, first_name, middle_name, last_name, gender) VALUES (?, ?, ?, ?, ?, ?)
>13. DEBUG - INSERT INTO `user` (email, mobile, username, password, change_password, validated, is_blocked, hash, created, updated, last_login, timezone, contact_id) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)
>14. DEBUG - "ROLLBACK"
>15. CRITICAL - Uncaught PHP Exception Doctrine\DBAL\DBALException: "An exception occurred while executing 'INSERT INTO `user` (email, mobile, username, password, change_password, validated, is_blocked, hash, created, updated, last_login, timezone, contact_id) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)' with params ["testuser@blah", null, null, "1MKVMPQp5ODniTDDt2PlGIlMGR9C1ZlLzYo\/Y\/2LMneA4yU3lVJ1oA==", 0, 1, 0, "c590db7b8cac19accae613f2ead63da1", "2016-01-25 04:21:40", "2016-01-25 04:21:40", "2016-01-26 00:06:40", null, 18]: SQLSTATE[23000]: Integrity constraint violation: 1062 Duplicate entry 'testuser@blah' for key 'UNIQ_8D93D649E7927C74'" at /var/veromo/vendor/doctrine/dbal/lib/Doctrine/DBAL/DBALException.php line 91
As you can see - the AUTHENTICATION is fine ... there's no issue there.
I've tried everything - including re-associating the contact with the user before the `flush` - but it appears that **the association is lost after this point**. And again - only when the `RememberMeToken` comes into play.
| non_usab | remember me authentication causes loss of entity associations this is a weird one i ve tested this with both the client cookie and doctrine provider and the outcome is the same i ve implemented remember me login functionality for our application i also have an authenticationlistener implemented which updates the user entity with a lastlogin datetime php public function onauthenticationsuccess authenticationevent event user event getauthenticationtoken getuser if user instanceof veromo bundle corebundle entity user user set lastlogin new datetime this manager flush my user entity is associated with a contact entity with a onetoone relationship which is cascaded now when this code executes on an interactive login user physically enters username and password all is well everything goes off without a hitch when this code executes on a non interactive login user has selected remember me has a valid cookie etc it all falls in a heap it appears that when the flush command executes doctrine has forgotten about the relationship that exists between the user entity and the contact entity and attempts to re create them opting for an insert rather than an update on flush info matched route adminimiser home debug remember me cookie detected debug select id as email as mobile as username as password as change password as change validated as is blocked as is hash as created as updated as last login as last timezone as contact id as contact from user where username or email debug select id as full name as full created as updated as account id as account type abn as title as first name as first middle name as middle last name as last gender as from contact left join contact business on id id left join contact person on id id where id info remember me cookie accepted debug start transaction debug insert into log date time channel level ip address session id message context values debug commit debug select id as roles as is active as is account id as account user id as user from user account where user id debug start transaction debug insert into contact full name created updated account id type values debug insert into contact person id title first name middle name last name gender values debug insert into user email mobile username password change password validated is blocked hash created updated last login timezone contact id values debug rollback critical uncaught php exception doctrine dbal dbalexception an exception occurred while executing insert into user email mobile username password change password validated is blocked hash created updated last login timezone contact id values with params sqlstate integrity constraint violation duplicate entry testuser blah for key uniq at var veromo vendor doctrine dbal lib doctrine dbal dbalexception php line as you can see the authentication is fine there s no issue there i ve tried everything including re associating the contact with the user before the flush but it appears that the association is lost after this point and again only when the remembermetoken comes into play | 0 |
115,367 | 4,663,875,254 | IssuesEvent | 2016-10-05 10:50:40 | liquidvote/liquid-ios | https://api.github.com/repos/liquidvote/liquid-ios | closed | View #xx of type RCTView has a shadow set but cannot calculate shadow efficiently. | bug low priority | 
This is being caused by the buttons, because they have a transparent `backgroundColor` and a shadow. | 1.0 | View #xx of type RCTView has a shadow set but cannot calculate shadow efficiently. - 
This is being caused by the buttons, because they have a transparent `backgroundColor` and a shadow. | non_usab | view xx of type rctview has a shadow set but cannot calculate shadow efficiently this is being caused by the buttons because they have a transparent backgroundcolor and a shadow | 0 |
9,379 | 6,277,913,940 | IssuesEvent | 2017-07-18 13:22:00 | giantswarm/cli | https://api.github.com/repos/giantswarm/cli | closed | Alias `swarm rm` with `swarm delete` | 1 - status/later area/usability kind/feature | @JosephSalisbury wants to save time and headaches by using a common shortcut (muscle memory) :)
<!---
@huboard:{"order":514.0,"milestone_order":514,"custom_state":""}
-->
| True | Alias `swarm rm` with `swarm delete` - @JosephSalisbury wants to save time and headaches by using a common shortcut (muscle memory) :)
<!---
@huboard:{"order":514.0,"milestone_order":514,"custom_state":""}
-->
| usab | alias swarm rm with swarm delete josephsalisbury wants to save time and headaches by using a common shortcut muscle memory huboard order milestone order custom state | 1 |
361,298 | 10,706,969,239 | IssuesEvent | 2019-10-24 16:25:31 | carbon-design-system/carbon | https://api.github.com/repos/carbon-design-system/carbon | closed | AVT 3 - React Select issues with VoiceOver on macOS and iOS | Severity 1 🚨 package: react priority: high type: a11y ♿ | ## Environment
~macOS Mojave version 10.14.5~
~Chrome Version 75.0.3770.100 (Official Build) (64-bit)~
~Carbon v10 - React~
~Voice Over~
Also tested on
iOS 12.3.1 with Safari and Voice Over
## Detailed Description
For macOS:
Start VoiceOver
Navigate to the Select box, VO does not announce the text in the select box.
Note: This works as expected in Windows 10 with Firefox.
For iOS:
Start VoiceOver
Swipe right to navigate to the select box. VoiceOver announces "Choose an option pop-up button selected." as expected.
Double tap to open the menu, VoiceOver announces, "Choose an option pop-up button selected." as expected.
Swipe right again and nothing happens.
Issue: Swipe right should navigate down the menu. In order to get focus on the list of options, the user must swipe left first before swiping right which is an unexpected behavior.
| 1.0 | AVT 3 - React Select issues with VoiceOver on macOS and iOS - ## Environment
~macOS Mojave version 10.14.5~
~Chrome Version 75.0.3770.100 (Official Build) (64-bit)~
~Carbon v10 - React~
~Voice Over~
Also tested on
iOS 12.3.1 with Safari and Voice Over
## Detailed Description
For macOS:
Start VoiceOver
Navigate to the Select box, VO does not announce the text in the select box.
Note: This works as expected in Windows 10 with Firefox.
For iOS:
Start VoiceOver
Swipe right to navigate to the select box. VoiceOver announces "Choose an option pop-up button selected." as expected.
Double tap to open the menu, VoiceOver announces, "Choose an option pop-up button selected." as expected.
Swipe right again and nothing happens.
Issue: Swipe right should navigate down the menu. In order to get focus on the list of options, the user must swipe left first before swiping right which is an unexpected behavior.
| non_usab | avt react select issues with voiceover on macos and ios environment macos mojave version chrome version official build bit carbon react voice over also tested on ios with safari and voice over detailed description for macos start voiceover navigate to the select box vo does not announce the text in the select box note this works as expected in windows with firefox for ios start voiceover swipe right to navigate to the select box voiceover announces choose an option pop up button selected as expected double tap to open the menu voiceover announces choose an option pop up button selected as expected swipe right again and nothing happens issue swipe right should navigate down the menu in order to get focus on the list of options the user must swipe left first before swiping right which is an unexpected behavior | 0 |
7 | 2,491,078,390 | IssuesEvent | 2015-01-03 00:16:13 | ewxrjk/rsbackup | https://api.github.com/repos/ewxrjk/rsbackup | closed | rsbackup should allow all valid DNS hostnames as host names | bug usability | I have a machine I'm backing up whose hostname happens to contain hyphens ("cam-vm-266"). I did the obvious thing and used the hostname as the 'HOST' part of the host stanza:
root@e104462:~# cat /etc/rsbackup/hosts.d/cam-vm-266
host cam-vm-266
hostname cam-vm-266.mydomain.com
volume root /
exclude /tmp/*
exclude /var/lib/schroot/mount/*
and rsbackup complains:
root@e104462:~# rsbackup --backup --dry-run
ERROR: /etc/rsbackup/hosts.d/cam-vm-266:1: invalid host name
Removing all the 'hyphens' from the "host" line placates it, but it would be nice if the allowed character sets lined up.
| True | rsbackup should allow all valid DNS hostnames as host names - I have a machine I'm backing up whose hostname happens to contain hyphens ("cam-vm-266"). I did the obvious thing and used the hostname as the 'HOST' part of the host stanza:
root@e104462:~# cat /etc/rsbackup/hosts.d/cam-vm-266
host cam-vm-266
hostname cam-vm-266.mydomain.com
volume root /
exclude /tmp/*
exclude /var/lib/schroot/mount/*
and rsbackup complains:
root@e104462:~# rsbackup --backup --dry-run
ERROR: /etc/rsbackup/hosts.d/cam-vm-266:1: invalid host name
Removing all the 'hyphens' from the "host" line placates it, but it would be nice if the allowed character sets lined up.
| usab | rsbackup should allow all valid dns hostnames as host names i have a machine i m backing up whose hostname happens to contain hyphens cam vm i did the obvious thing and used the hostname as the host part of the host stanza root cat etc rsbackup hosts d cam vm host cam vm hostname cam vm mydomain com volume root exclude tmp exclude var lib schroot mount and rsbackup complains root rsbackup backup dry run error etc rsbackup hosts d cam vm invalid host name removing all the hyphens from the host line placates it but it would be nice if the allowed character sets lined up | 1 |
6,566 | 4,346,747,661 | IssuesEvent | 2016-07-29 17:03:20 | bocoup/skillsbot | https://api.github.com/repos/bocoup/skillsbot | closed | Rename “find” command to “skill” and test | usability | (eg. “skill build workflows” to see all users’ interest/experience for that skill)
| True | Rename “find” command to “skill” and test - (eg. “skill build workflows” to see all users’ interest/experience for that skill)
| usab | rename “find” command to “skill” and test eg “skill build workflows” to see all users’ interest experience for that skill | 1 |
15,668 | 9,592,262,329 | IssuesEvent | 2019-05-09 08:30:13 | alpersonalwebsite/decoupled-cloud-mirror-sec | https://api.github.com/repos/alpersonalwebsite/decoupled-cloud-mirror-sec | opened | CVE-2019-10742 (Medium) detected in axios-0.18.0.tgz | security vulnerability | ## CVE-2019-10742 - Medium Severity Vulnerability
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axios-0.18.0.tgz</b></p></summary>
<p>Promise based HTTP client for the browser and node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/axios/-/axios-0.18.0.tgz">https://registry.npmjs.org/axios/-/axios-0.18.0.tgz</a></p>
<p>Path to dependency file: /decoupled-cloud-mirror-sec/package.json</p>
<p>Path to vulnerable library: /decoupled-cloud-mirror-sec/node_modules/axios/package.json</p>
<p>
Dependency Hierarchy:
- :x: **axios-0.18.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/alpersonalwebsite/decoupled-cloud-mirror-sec/commit/15a74b93b5e98c8c97ac16a395ea62fa211d2cd0">15a74b93b5e98c8c97ac16a395ea62fa211d2cd0</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Axios up to and including 0.18.0 allows attackers to cause a denial of service (application crash) by continuing to accepting content after maxContentLength is exceeded.
<p>Publish Date: 2019-05-07
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10742>CVE-2019-10742</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-10742 (Medium) detected in axios-0.18.0.tgz - ## CVE-2019-10742 - Medium Severity Vulnerability
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axios-0.18.0.tgz</b></p></summary>
<p>Promise based HTTP client for the browser and node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/axios/-/axios-0.18.0.tgz">https://registry.npmjs.org/axios/-/axios-0.18.0.tgz</a></p>
<p>Path to dependency file: /decoupled-cloud-mirror-sec/package.json</p>
<p>Path to vulnerable library: /decoupled-cloud-mirror-sec/node_modules/axios/package.json</p>
<p>
Dependency Hierarchy:
- :x: **axios-0.18.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/alpersonalwebsite/decoupled-cloud-mirror-sec/commit/15a74b93b5e98c8c97ac16a395ea62fa211d2cd0">15a74b93b5e98c8c97ac16a395ea62fa211d2cd0</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Axios up to and including 0.18.0 allows attackers to cause a denial of service (application crash) by continuing to accepting content after maxContentLength is exceeded.
<p>Publish Date: 2019-05-07
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10742>CVE-2019-10742</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_usab | cve medium detected in axios tgz cve medium severity vulnerability vulnerable library axios tgz promise based http client for the browser and node js library home page a href path to dependency file decoupled cloud mirror sec package json path to vulnerable library decoupled cloud mirror sec node modules axios package json dependency hierarchy x axios tgz vulnerable library found in head commit a href vulnerability details axios up to and including allows attackers to cause a denial of service application crash by continuing to accepting content after maxcontentlength is exceeded publish date url a href cvss score details base score metrics not available step up your open source security game with whitesource | 0 |
1,709 | 2,966,622,709 | IssuesEvent | 2015-07-12 02:41:11 | Elgg/Elgg | https://api.github.com/repos/Elgg/Elgg | opened | Replace tag-based Group search with "Search for groups" | usability | Why can't I search a name? Why would know tags on groups?
It should just use the regular search endpoint limited to group results. | True | Replace tag-based Group search with "Search for groups" - Why can't I search a name? Why would know tags on groups?
It should just use the regular search endpoint limited to group results. | usab | replace tag based group search with search for groups why can t i search a name why would know tags on groups it should just use the regular search endpoint limited to group results | 1 |
18,623 | 13,105,208,179 | IssuesEvent | 2020-08-04 11:45:44 | pragmatrix/tnt | https://api.github.com/repos/pragmatrix/tnt | opened | tnt translate does not support -l | bug usability | If `tnt translate` is run without any target languages, it suggests to use command line option `-l`, which is not supported.
```
$ tnt translate
No languages selected, use -l or --all to select one or more languages.
$ tnt translate -l de
ERROR(S):
Option 'l' is unknown.
--all Translate new strings of all languages.
--help Display this help screen.
--version Display version information.
value pos. 0 The language(s) to translate new strings to, use --all to
translate all languages.
```
| True | tnt translate does not support -l - If `tnt translate` is run without any target languages, it suggests to use command line option `-l`, which is not supported.
```
$ tnt translate
No languages selected, use -l or --all to select one or more languages.
$ tnt translate -l de
ERROR(S):
Option 'l' is unknown.
--all Translate new strings of all languages.
--help Display this help screen.
--version Display version information.
value pos. 0 The language(s) to translate new strings to, use --all to
translate all languages.
```
| usab | tnt translate does not support l if tnt translate is run without any target languages it suggests to use command line option l which is not supported tnt translate no languages selected use l or all to select one or more languages tnt translate l de error s option l is unknown all translate new strings of all languages help display this help screen version display version information value pos the language s to translate new strings to use all to translate all languages | 1 |
124,445 | 26,458,966,564 | IssuesEvent | 2023-01-16 16:02:27 | smartcontractkit/full-blockchain-solidity-course-js | https://api.github.com/repos/smartcontractkit/full-blockchain-solidity-course-js | closed | Course repo returning TypeError | code-bug | ### Lesson
Lesson 17
### Could you please leave a link to the timestamp in the video where this error occurs? (You can right click a video and "copy video URL at current time")
_No response_
### Operating System
Windows
### Describe the bug
Everything is in this discussion created after 4 requests for help in the discussions section of the course without 1 single response from the team or other devs
https://github.com/smartcontractkit/full-blockchain-solidity-course-js/discussions/4523#discussion-4761860 | 1.0 | Course repo returning TypeError - ### Lesson
Lesson 17
### Could you please leave a link to the timestamp in the video where this error occurs? (You can right click a video and "copy video URL at current time")
_No response_
### Operating System
Windows
### Describe the bug
Everything is in this discussion created after 4 requests for help in the discussions section of the course without 1 single response from the team or other devs
https://github.com/smartcontractkit/full-blockchain-solidity-course-js/discussions/4523#discussion-4761860 | non_usab | course repo returning typeerror lesson lesson could you please leave a link to the timestamp in the video where this error occurs you can right click a video and copy video url at current time no response operating system windows describe the bug everything is in this discussion created after requests for help in the discussions section of the course without single response from the team or other devs | 0 |
8,539 | 5,806,878,963 | IssuesEvent | 2017-05-04 05:20:00 | bwsw/cloudstack-ui | https://api.github.com/repos/bwsw/cloudstack-ui | closed | Customize calendar control to support two types of weeks Sunday - Saturday or Monday - Sunday | enhancement localization usability | Actually there are two types of them as specified in the title. We have to add to the settings the chooser which allows to switch the user between them. | True | Customize calendar control to support two types of weeks Sunday - Saturday or Monday - Sunday - Actually there are two types of them as specified in the title. We have to add to the settings the chooser which allows to switch the user between them. | usab | customize calendar control to support two types of weeks sunday saturday or monday sunday actually there are two types of them as specified in the title we have to add to the settings the chooser which allows to switch the user between them | 1 |
286,715 | 31,758,243,950 | IssuesEvent | 2023-09-12 01:35:47 | samq-wsdemo/intentionally-vulnerable-golang-project | https://api.github.com/repos/samq-wsdemo/intentionally-vulnerable-golang-project | reopened | CVE-2018-14042 (Medium) detected in github.com/gophish/gophish-v0.1.2 | Mend: dependency security vulnerability | ## CVE-2018-14042 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/gophish/gophish-v0.1.2</b></p></summary>
<p>Open-Source Phishing Toolkit</p>
<p>Library home page: <a href="https://proxy.golang.org/github.com/gophish/gophish/@v/v0.1.2.zip">https://proxy.golang.org/github.com/gophish/gophish/@v/v0.1.2.zip</a></p>
<p>
Dependency Hierarchy:
- :x: **github.com/gophish/gophish-v0.1.2** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-wsdemo/intentionally-vulnerable-golang-project/commit/fad3f37965fe63942d2c0f558471e8bd3166eb21">fad3f37965fe63942d2c0f558471e8bd3166eb21</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
<p>Publish Date: 2018-07-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-14042>CVE-2018-14042</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2018-07-13</p>
<p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0</p>
</p>
</details>
<p></p>
| True | CVE-2018-14042 (Medium) detected in github.com/gophish/gophish-v0.1.2 - ## CVE-2018-14042 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/gophish/gophish-v0.1.2</b></p></summary>
<p>Open-Source Phishing Toolkit</p>
<p>Library home page: <a href="https://proxy.golang.org/github.com/gophish/gophish/@v/v0.1.2.zip">https://proxy.golang.org/github.com/gophish/gophish/@v/v0.1.2.zip</a></p>
<p>
Dependency Hierarchy:
- :x: **github.com/gophish/gophish-v0.1.2** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-wsdemo/intentionally-vulnerable-golang-project/commit/fad3f37965fe63942d2c0f558471e8bd3166eb21">fad3f37965fe63942d2c0f558471e8bd3166eb21</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
<p>Publish Date: 2018-07-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-14042>CVE-2018-14042</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2018-07-13</p>
<p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0</p>
</p>
</details>
<p></p>
| non_usab | cve medium detected in github com gophish gophish cve medium severity vulnerability vulnerable library github com gophish gophish open source phishing toolkit library home page a href dependency hierarchy x github com gophish gophish vulnerable library found in head commit a href found in base branch master vulnerability details in bootstrap before xss is possible in the data container property of tooltip publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution org webjars npm bootstrap org webjars bootstrap | 0 |
8,638 | 5,893,222,061 | IssuesEvent | 2017-05-17 21:23:29 | coreos/bugs | https://api.github.com/repos/coreos/bugs | closed | "coreos-install" does not work on VMWare vSphere | area/usability component/other kind/question team/os | Hi all,
I use the VMWare OVA image installation for CoreOS :
https://stable.release.core-os.net/amd64-usr/current/coreos_production_vmware_ova.ova
When the VM is up (network and dns was configured well), I issued the command :
sudo coreos-install -d /dev/sda -C stable -c cloud_config.yml
then got the error Image URL unavailable, because "coreos-install" fetch the URL "https://stable.release.core-os.net/amd64-usr/1122.2.0/coreos_production_vmware_image.bin.bz2" but it's not available.
So how can fix this issue ?
Thanks
Best Regards,
| True | "coreos-install" does not work on VMWare vSphere - Hi all,
I use the VMWare OVA image installation for CoreOS :
https://stable.release.core-os.net/amd64-usr/current/coreos_production_vmware_ova.ova
When the VM is up (network and dns was configured well), I issued the command :
sudo coreos-install -d /dev/sda -C stable -c cloud_config.yml
then got the error Image URL unavailable, because "coreos-install" fetch the URL "https://stable.release.core-os.net/amd64-usr/1122.2.0/coreos_production_vmware_image.bin.bz2" but it's not available.
So how can fix this issue ?
Thanks
Best Regards,
| usab | coreos install does not work on vmware vsphere hi all i use the vmware ova image installation for coreos when the vm is up network and dns was configured well i issued the command sudo coreos install d dev sda c stable c cloud config yml then got the error image url unavailable because coreos install fetch the url but it s not available so how can fix this issue thanks best regards | 1 |
342,775 | 10,321,579,776 | IssuesEvent | 2019-08-31 03:27:54 | Azure/mmlspark | https://api.github.com/repos/Azure/mmlspark | closed | Probability values still incorrect when requesting raw and probability columns | LightGBM bug high priority | **Describe the bug**
There is a caching bug in the new native code which causes the probability values to be calculated as raw when requesting both columns to be computed.
**To Reproduce**
Print out the results of lightgbm model, see that the probabilities are invalid, eg not between 0 and 1
**Expected behavior**
Probabilities should correspond to output label and raw predictions transformed from log odds.
**Info (please complete the following information):**
- MMLSpark Version: v0.18.1
- Spark Version Any
- Spark Platform Any
```
Please post the stacktrace here if applicable
```
If the bug pertains to a specific feature please tag the appropriate [CODEOWNER](https://github.com/Azure/mmlspark/blob/master/CODEOWNERS) for better visibility
**Additional context**
See lightgbm PR here:
https://github.com/microsoft/LightGBM/pull/2356
a new maven dependency will need to be published once it is in.
See related issue, but fixed in correct way as long as user only asks for one column:
https://github.com/Azure/mmlspark/issues/568 | 1.0 | Probability values still incorrect when requesting raw and probability columns - **Describe the bug**
There is a caching bug in the new native code which causes the probability values to be calculated as raw when requesting both columns to be computed.
**To Reproduce**
Print out the results of lightgbm model, see that the probabilities are invalid, eg not between 0 and 1
**Expected behavior**
Probabilities should correspond to output label and raw predictions transformed from log odds.
**Info (please complete the following information):**
- MMLSpark Version: v0.18.1
- Spark Version Any
- Spark Platform Any
```
Please post the stacktrace here if applicable
```
If the bug pertains to a specific feature please tag the appropriate [CODEOWNER](https://github.com/Azure/mmlspark/blob/master/CODEOWNERS) for better visibility
**Additional context**
See lightgbm PR here:
https://github.com/microsoft/LightGBM/pull/2356
a new maven dependency will need to be published once it is in.
See related issue, but fixed in correct way as long as user only asks for one column:
https://github.com/Azure/mmlspark/issues/568 | non_usab | probability values still incorrect when requesting raw and probability columns describe the bug there is a caching bug in the new native code which causes the probability values to be calculated as raw when requesting both columns to be computed to reproduce print out the results of lightgbm model see that the probabilities are invalid eg not between and expected behavior probabilities should correspond to output label and raw predictions transformed from log odds info please complete the following information mmlspark version spark version any spark platform any please post the stacktrace here if applicable if the bug pertains to a specific feature please tag the appropriate for better visibility additional context see lightgbm pr here a new maven dependency will need to be published once it is in see related issue but fixed in correct way as long as user only asks for one column | 0 |
11,393 | 7,197,688,694 | IssuesEvent | 2018-02-05 10:02:06 | Yakindu/statecharts | https://api.github.com/repos/Yakindu/statecharts | closed | SCTUnit: Context menu operations are missing in the main menu | Comp-Graphical Editor Comp-UI is-Usability-Issue | In the SCTUnit editor, many operations are available in the context menu, e.g., to rename a test class. However, these operations are missing in the main menu. | True | SCTUnit: Context menu operations are missing in the main menu - In the SCTUnit editor, many operations are available in the context menu, e.g., to rename a test class. However, these operations are missing in the main menu. | usab | sctunit context menu operations are missing in the main menu in the sctunit editor many operations are available in the context menu e g to rename a test class however these operations are missing in the main menu | 1 |
13,646 | 8,632,097,915 | IssuesEvent | 2018-11-22 09:50:59 | godotengine/godot | https://api.github.com/repos/godotengine/godot | closed | Changing the tooltip delay in project settings affects the editor | bug topic:core topic:editor usability | **Operating system or device - Godot version:**
Windows 10 64bit - Godot 2.1.3 and Godot 3.0
**Issue description:**
Changing the tooltip delay in project settings will affect the editor's tooltips (after closing the project and reopening it). It should only affect the tooltips in-game.
**Steps to reproduce:**
Open any project, go to project settings and set tooltip delay to 0, then close the project and reopen it. Now all tooltips in the editor appear instantly.
| True | Changing the tooltip delay in project settings affects the editor - **Operating system or device - Godot version:**
Windows 10 64bit - Godot 2.1.3 and Godot 3.0
**Issue description:**
Changing the tooltip delay in project settings will affect the editor's tooltips (after closing the project and reopening it). It should only affect the tooltips in-game.
**Steps to reproduce:**
Open any project, go to project settings and set tooltip delay to 0, then close the project and reopen it. Now all tooltips in the editor appear instantly.
| usab | changing the tooltip delay in project settings affects the editor operating system or device godot version windows godot and godot issue description changing the tooltip delay in project settings will affect the editor s tooltips after closing the project and reopening it it should only affect the tooltips in game steps to reproduce open any project go to project settings and set tooltip delay to then close the project and reopen it now all tooltips in the editor appear instantly | 1 |
6,984 | 4,713,887,546 | IssuesEvent | 2016-10-14 21:41:05 | postmanlabs/postman-app-support | https://api.github.com/repos/postmanlabs/postman-app-support | closed | When viewing an authorization token, content overflows its panel. | pending-close Usability | <!--
Welcome to the Postman Issue tracker. Any feature requests / bug reports can be posted here.
Any security-related bugs should be reported directly to security@getpostman.com
Version/App Information:
-->
1. Postman Version: 4.4.2
2. App: Mac & Chrome
3. OS details: OS X 10.11.2
4. Is the Interceptor on and enabled in the app: No
5. Did you encounter this recently, or has this bug always been there: Always
6. Expected behaviour: Should be able to resize panel or to scroll.
7. Console logs:
8. Screenshots


I've encountered an issue when requesting an authorization token. If more information is received in the token than the panel is sized for then the overflow is simply hidden from view. See screenshots: I need to be able to copy the entirety ID Token to use it as a header, and double clicking the text doesn't highlight the entire block. In the Chrome App I am able to copy it because the overflow seems to flow over the top of the response panel rather than underneath, but this is still less than ideal.
Great app on the whole, makes testing my API a breeze thank you :)
<!--
Some guidelines:
1. Please file Newman-related issues at https://github.com/postmanlabs/newman/issues
2. If it’s a Cloud-related issue, or you want to include personal information like your username / collection names, mail us at help@getpostman.com
3. If it’s a question (anything along the lines of “How do I … in Postman”), the answer might lie in our documentation - http://getpostman.com/docs.
-->
| True | When viewing an authorization token, content overflows its panel. - <!--
Welcome to the Postman Issue tracker. Any feature requests / bug reports can be posted here.
Any security-related bugs should be reported directly to security@getpostman.com
Version/App Information:
-->
1. Postman Version: 4.4.2
2. App: Mac & Chrome
3. OS details: OS X 10.11.2
4. Is the Interceptor on and enabled in the app: No
5. Did you encounter this recently, or has this bug always been there: Always
6. Expected behaviour: Should be able to resize panel or to scroll.
7. Console logs:
8. Screenshots


I've encountered an issue when requesting an authorization token. If more information is received in the token than the panel is sized for then the overflow is simply hidden from view. See screenshots: I need to be able to copy the entirety ID Token to use it as a header, and double clicking the text doesn't highlight the entire block. In the Chrome App I am able to copy it because the overflow seems to flow over the top of the response panel rather than underneath, but this is still less than ideal.
Great app on the whole, makes testing my API a breeze thank you :)
<!--
Some guidelines:
1. Please file Newman-related issues at https://github.com/postmanlabs/newman/issues
2. If it’s a Cloud-related issue, or you want to include personal information like your username / collection names, mail us at help@getpostman.com
3. If it’s a question (anything along the lines of “How do I … in Postman”), the answer might lie in our documentation - http://getpostman.com/docs.
-->
| usab | when viewing an authorization token content overflows its panel welcome to the postman issue tracker any feature requests bug reports can be posted here any security related bugs should be reported directly to security getpostman com version app information postman version app mac chrome os details os x is the interceptor on and enabled in the app no did you encounter this recently or has this bug always been there always expected behaviour should be able to resize panel or to scroll console logs screenshots i ve encountered an issue when requesting an authorization token if more information is received in the token than the panel is sized for then the overflow is simply hidden from view see screenshots i need to be able to copy the entirety id token to use it as a header and double clicking the text doesn t highlight the entire block in the chrome app i am able to copy it because the overflow seems to flow over the top of the response panel rather than underneath but this is still less than ideal great app on the whole makes testing my api a breeze thank you some guidelines please file newman related issues at if it’s a cloud related issue or you want to include personal information like your username collection names mail us at help getpostman com if it’s a question anything along the lines of “how do i … in postman” the answer might lie in our documentation | 1 |
275,073 | 23,892,941,783 | IssuesEvent | 2022-09-08 12:53:52 | ctc-oss/omega-edit | https://api.github.com/repos/ctc-oss/omega-edit | closed | TypeScript client test to manage RPC server | enhancement testing CI client javascript | For reference, `server_test.cpp` can optionally startup the C++ RPC server when it starts up, then shutdown the server when it's done. Currently the TS client relies on the server to already be up and listening when it comes up. This issue is to enhance the TS client so that it can manage the lifetime of the RPC server (bringing it up and down as appropriate on a configurable port or Unix domain socket). Ideally the choice of RPC server (e.g., the C++ reference server or the Scala production server) should also be configurable. This Enhancement will streamline integrations and CI testing. | 1.0 | TypeScript client test to manage RPC server - For reference, `server_test.cpp` can optionally startup the C++ RPC server when it starts up, then shutdown the server when it's done. Currently the TS client relies on the server to already be up and listening when it comes up. This issue is to enhance the TS client so that it can manage the lifetime of the RPC server (bringing it up and down as appropriate on a configurable port or Unix domain socket). Ideally the choice of RPC server (e.g., the C++ reference server or the Scala production server) should also be configurable. This Enhancement will streamline integrations and CI testing. | non_usab | typescript client test to manage rpc server for reference server test cpp can optionally startup the c rpc server when it starts up then shutdown the server when it s done currently the ts client relies on the server to already be up and listening when it comes up this issue is to enhance the ts client so that it can manage the lifetime of the rpc server bringing it up and down as appropriate on a configurable port or unix domain socket ideally the choice of rpc server e g the c reference server or the scala production server should also be configurable this enhancement will streamline integrations and ci testing | 0 |
17,747 | 12,304,052,036 | IssuesEvent | 2020-05-11 19:48:11 | ONRR/nrrd | https://api.github.com/repos/ONRR/nrrd | closed | Split out the + icon for adding nationwide and Native American cards into two buttons | Explore Data P2: High enhancement usability | Something like this. Users haven't been noticing the plus sign and don't know to go there to get the nationwide card. We should make this change both up on the map and down below in the search area.
 | True | Split out the + icon for adding nationwide and Native American cards into two buttons - Something like this. Users haven't been noticing the plus sign and don't know to go there to get the nationwide card. We should make this change both up on the map and down below in the search area.
 | usab | split out the icon for adding nationwide and native american cards into two buttons something like this users haven t been noticing the plus sign and don t know to go there to get the nationwide card we should make this change both up on the map and down below in the search area | 1 |
127,220 | 27,008,045,776 | IssuesEvent | 2023-02-10 13:19:15 | vadimcn/vscode-lldb | https://api.github.com/repos/vadimcn/vscode-lldb | closed | vs-code URL does not open debugging session if URL is opened from inside VSCode | cause:VSCode | OS: macOS, remotely connected to Ubuntu 22.04
VSCode version: Version: 1.70.2; Commit: e4503b30fc78200f846c62cf8091b76ff5547662; Date: 2022-08-16T05:36:37.829Z
CodeLLDB version: v1.7.4
Compiler: not relevant
Debuggee: not relevant
**Context**
I want to use vscode-URLs to directly drop into a debugging session. My script can be found at https://gist.github.com/vogelsgesang/d803377b8b143164961e08e58f5186c0
**Expected behavior**
When cmd-clicking this link from inside VSCode, I would expect to be dropped into the debugging session
<img width="1287" alt="Screenshot 2022-08-22 at 10 25 59" src="https://user-images.githubusercontent.com/6820896/185875277-3f40bd9a-ccdc-4ac5-8a66-d7a07bd137c9.png">
**Actual behavior**
Instead, the link gets opened in VS Code's search bar
<img width="904" alt="Screenshot 2022-08-22 at 10 27 17" src="https://user-images.githubusercontent.com/6820896/185875587-cd4839e3-cf70-45ef-a3c4-977a237847c6.png">
**Additional information**
I am sure the link itself is fine, because when I copy it from the console and paste it into Chrome's address bar, then VSCode opens my debugging session as expected. | 1.0 | vs-code URL does not open debugging session if URL is opened from inside VSCode - OS: macOS, remotely connected to Ubuntu 22.04
VSCode version: Version: 1.70.2; Commit: e4503b30fc78200f846c62cf8091b76ff5547662; Date: 2022-08-16T05:36:37.829Z
CodeLLDB version: v1.7.4
Compiler: not relevant
Debuggee: not relevant
**Context**
I want to use vscode-URLs to directly drop into a debugging session. My script can be found at https://gist.github.com/vogelsgesang/d803377b8b143164961e08e58f5186c0
**Expected behavior**
When cmd-clicking this link from inside VSCode, I would expect to be dropped into the debugging session
<img width="1287" alt="Screenshot 2022-08-22 at 10 25 59" src="https://user-images.githubusercontent.com/6820896/185875277-3f40bd9a-ccdc-4ac5-8a66-d7a07bd137c9.png">
**Actual behavior**
Instead, the link gets opened in VS Code's search bar
<img width="904" alt="Screenshot 2022-08-22 at 10 27 17" src="https://user-images.githubusercontent.com/6820896/185875587-cd4839e3-cf70-45ef-a3c4-977a237847c6.png">
**Additional information**
I am sure the link itself is fine, because when I copy it from the console and paste it into Chrome's address bar, then VSCode opens my debugging session as expected. | non_usab | vs code url does not open debugging session if url is opened from inside vscode os macos remotely connected to ubuntu vscode version version commit date codelldb version compiler not relevant debuggee not relevant context i want to use vscode urls to directly drop into a debugging session my script can be found at expected behavior when cmd clicking this link from inside vscode i would expect to be dropped into the debugging session img width alt screenshot at src actual behavior instead the link gets opened in vs code s search bar img width alt screenshot at src additional information i am sure the link itself is fine because when i copy it from the console and paste it into chrome s address bar then vscode opens my debugging session as expected | 0 |
11,484 | 7,261,046,093 | IssuesEvent | 2018-02-18 16:52:54 | spyder-ide/spyder | https://api.github.com/repos/spyder-ide/spyder | closed | Switch to internal console on the first error | 1 star component:Main Window tag:Ux-usability type:Enhancement | _From [techtonik@gmail.com](https://code.google.com/u/techtonik@gmail.com/) on 2011-12-29T12:42:47Z_
When there is an internal error in Spyder on startup or at run-time, the errors may easily pass unnoticed. What is the expected output? What do you see instead? It would be helpful if Spyder:
1. Automatically brought "Internal Console" to the foreground if there were any errors during startup
2. Make "Internal Console" active (or show a flag) when a new error arises at run-time
_Original issue: http://code.google.com/p/spyderlib/issues/detail?id=899_
| True | Switch to internal console on the first error - _From [techtonik@gmail.com](https://code.google.com/u/techtonik@gmail.com/) on 2011-12-29T12:42:47Z_
When there is an internal error in Spyder on startup or at run-time, the errors may easily pass unnoticed. What is the expected output? What do you see instead? It would be helpful if Spyder:
1. Automatically brought "Internal Console" to the foreground if there were any errors during startup
2. Make "Internal Console" active (or show a flag) when a new error arises at run-time
_Original issue: http://code.google.com/p/spyderlib/issues/detail?id=899_
| usab | switch to internal console on the first error from on when there is an internal error in spyder on startup or at run time the errors may easily pass unnoticed what is the expected output what do you see instead it would be helpful if spyder automatically brought internal console to the foreground if there were any errors during startup make internal console active or show a flag when a new error arises at run time original issue | 1 |
6,002 | 4,111,551,489 | IssuesEvent | 2016-06-07 06:49:59 | Virtual-Labs/image-processing-iiith | https://api.github.com/repos/Virtual-Labs/image-processing-iiith | closed | QA_Point Operations_Usability_smk | Category: Usability Developed By: VLEAD Differed Release Number: 1.0 Severity: S2 | Defect Description :
In the landing page/home page of "Point Operations" experiment, the name of the experiment is not present in the screen instead the experiment name should be displayed on the screen at the top of the header options
Actual Result :
In the landing page/home page of "Point Operations" experiment, the name of the experiment is not present in the screen
Environment :
OS: Windows 7, Ubuntu-16.04,Centos-6
Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0
Bandwidth : 100Mbps
Hardware Configuration:8GBRAM ,
Processor:i5
Test Step Link:
https://github.com/Virtual-Labs/image-processing-iiith/blob/master/test-cases/integration_test-cases/Point%20Operations/Point%20Operations_01_Usability_smk.org
Attachment:

| True | QA_Point Operations_Usability_smk - Defect Description :
In the landing page/home page of "Point Operations" experiment, the name of the experiment is not present in the screen instead the experiment name should be displayed on the screen at the top of the header options
Actual Result :
In the landing page/home page of "Point Operations" experiment, the name of the experiment is not present in the screen
Environment :
OS: Windows 7, Ubuntu-16.04,Centos-6
Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0
Bandwidth : 100Mbps
Hardware Configuration:8GBRAM ,
Processor:i5
Test Step Link:
https://github.com/Virtual-Labs/image-processing-iiith/blob/master/test-cases/integration_test-cases/Point%20Operations/Point%20Operations_01_Usability_smk.org
Attachment:

| usab | qa point operations usability smk defect description in the landing page home page of point operations experiment the name of the experiment is not present in the screen instead the experiment name should be displayed on the screen at the top of the header options actual result in the landing page home page of point operations experiment the name of the experiment is not present in the screen environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor test step link attachment | 1 |
9,893 | 6,497,141,166 | IssuesEvent | 2017-08-22 13:01:51 | godotengine/godot | https://api.github.com/repos/godotengine/godot | closed | Enter Key does not save Property values in Inspector | bug platform:osx topic:editor usability | **Operating system or device - Godot version:**
MacOS 10.12.6
Godot 2.1.3.stable.official
**Issue description:**
<!-- What happened, and what was expected. -->
When editing values in the Inspector, pressing the Enter key (on the number pad) does not save the edited value.
Pressing the Enter key should save the new property value the same way as using the Return key.
**Steps to reproduce:**
Alter a property value in the Inspector and press the Enter key on the Number pad.
Given that most properties are numeric, anyone with a full NumPad keyboard will encounter this issue almost immediately.
**Link to minimal example project:**
<!-- Optional but very welcome. You can drag and drop a zip archive to upload it. -->
| True | Enter Key does not save Property values in Inspector - **Operating system or device - Godot version:**
MacOS 10.12.6
Godot 2.1.3.stable.official
**Issue description:**
<!-- What happened, and what was expected. -->
When editing values in the Inspector, pressing the Enter key (on the number pad) does not save the edited value.
Pressing the Enter key should save the new property value the same way as using the Return key.
**Steps to reproduce:**
Alter a property value in the Inspector and press the Enter key on the Number pad.
Given that most properties are numeric, anyone with a full NumPad keyboard will encounter this issue almost immediately.
**Link to minimal example project:**
<!-- Optional but very welcome. You can drag and drop a zip archive to upload it. -->
| usab | enter key does not save property values in inspector operating system or device godot version macos godot stable official issue description when editing values in the inspector pressing the enter key on the number pad does not save the edited value pressing the enter key should save the new property value the same way as using the return key steps to reproduce alter a property value in the inspector and press the enter key on the number pad given that most properties are numeric anyone with a full numpad keyboard will encounter this issue almost immediately link to minimal example project | 1 |
181,290 | 21,658,611,027 | IssuesEvent | 2022-05-06 16:34:35 | samq-ghdemo/Forrester-Demo | https://api.github.com/repos/samq-ghdemo/Forrester-Demo | opened | CVE-2022-29167 (High) detected in hawk-3.1.3.tgz | security vulnerability | ## CVE-2022-29167 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hawk-3.1.3.tgz</b></p></summary>
<p>HTTP Hawk Authentication Scheme</p>
<p>Library home page: <a href="https://registry.npmjs.org/hawk/-/hawk-3.1.3.tgz">https://registry.npmjs.org/hawk/-/hawk-3.1.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/hawk/package.json,/node_modules/npm/node_modules/request/node_modules/hawk/package.json</p>
<p>
Dependency Hierarchy:
- grunt-npm-install-0.3.1.tgz (Root Library)
- npm-3.10.10.tgz
- request-2.75.0.tgz
- :x: **hawk-3.1.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/Forrester-Demo/commit/6dbbe934cae073a84faceb086571b79fdcfc079c">6dbbe934cae073a84faceb086571b79fdcfc079c</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.
<p>Publish Date: 2022-05-05
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-29167>CVE-2022-29167</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq">https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq</a></p>
<p>Release Date: 2022-05-05</p>
<p>Fix Resolution: hawk - 9.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"hawk","packageVersion":"3.1.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;hawk:3.1.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"hawk - 9.0.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-29167","vulnerabilityDetails":"Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker\u0027s input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-29167","cvss3Severity":"high","cvss3Score":"7.4","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Changed","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2022-29167 (High) detected in hawk-3.1.3.tgz - ## CVE-2022-29167 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hawk-3.1.3.tgz</b></p></summary>
<p>HTTP Hawk Authentication Scheme</p>
<p>Library home page: <a href="https://registry.npmjs.org/hawk/-/hawk-3.1.3.tgz">https://registry.npmjs.org/hawk/-/hawk-3.1.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/hawk/package.json,/node_modules/npm/node_modules/request/node_modules/hawk/package.json</p>
<p>
Dependency Hierarchy:
- grunt-npm-install-0.3.1.tgz (Root Library)
- npm-3.10.10.tgz
- request-2.75.0.tgz
- :x: **hawk-3.1.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/Forrester-Demo/commit/6dbbe934cae073a84faceb086571b79fdcfc079c">6dbbe934cae073a84faceb086571b79fdcfc079c</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.
<p>Publish Date: 2022-05-05
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-29167>CVE-2022-29167</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq">https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq</a></p>
<p>Release Date: 2022-05-05</p>
<p>Fix Resolution: hawk - 9.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"hawk","packageVersion":"3.1.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;hawk:3.1.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"hawk - 9.0.1","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2022-29167","vulnerabilityDetails":"Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker\u0027s input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-29167","cvss3Severity":"high","cvss3Score":"7.4","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Changed","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_usab | cve high detected in hawk tgz cve high severity vulnerability vulnerable library hawk tgz http hawk authentication scheme library home page a href path to dependency file package json path to vulnerable library node modules hawk package json node modules npm node modules request node modules hawk package json dependency hierarchy grunt npm install tgz root library npm tgz request tgz x hawk tgz vulnerable library found in head commit a href found in base branch master vulnerability details hawk is an http authentication scheme providing mechanisms for making authenticated http requests with partial cryptographic verification of the request and response covering the http method request uri host and optionally the request payload hawk used a regular expression to parse host http header hawk utils parsehost which was subject to regular expression dos attack meaning each added character in the attacker s input increases the computation time exponentially parsehost was patched in to use built in url class to parse hostname instead hawk authenticate accepts options argument if that contains host and port those would be used instead of a call to utils parsehost publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution hawk isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree grunt npm install npm request hawk isminimumfixversionavailable true minimumfixversion hawk isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails hawk is an http authentication scheme providing mechanisms for making authenticated http requests with partial cryptographic verification of the request and response covering the http method request uri host and optionally the request payload hawk used a regular expression to parse host http header hawk utils parsehost which was subject to regular expression dos attack meaning each added character in the attacker input increases the computation time exponentially parsehost was patched in to use built in url class to parse hostname instead hawk authenticate accepts options argument if that contains host and port those would be used instead of a call to utils parsehost vulnerabilityurl | 0 |
649,891 | 21,329,622,504 | IssuesEvent | 2022-04-18 06:22:51 | longhorn/longhorn | https://api.github.com/repos/longhorn/longhorn | closed | [BUG] longhorn-engine controller rebuilding crash | kind/bug area/engine severity/1 priority/1 backport-needed/1.2.5 | ## Describe the bug
In a customer support bundle, the longhorn-engine controller is crashing because it attempts to access the first element in an array whose length is zero.
https://github.com/longhorn/longhorn-engine/blob/cda02873ef0789a56fcca9ffcdbc5bea76f09018/pkg/controller/rebuild.go#L30
This code crashes:
```
head := rep.Chain[0]
```
The replica's gRPC method to get the chain of disk images looks like it is returning an empty array of disk images:
https://github.com/longhorn/longhorn-engine/blob/cda02873ef0789a56fcca9ffcdbc5bea76f09018/pkg/replica/replica.go#L592
## To Reproduce
TBD
## Expected behavior
The longhorn engine doesn't crash.
## Log or Support bundle
```
panic: runtime error: index out of range [0] with length 0
2022-04-02T13:06:48.724853291-04:00
2022-04-02T13:06:48.724857895-04:00 goroutine 230939 [running]:
2022-04-02T13:06:48.724862901-04:00 github.com/longhorn/longhorn-engine/pkg/controller.getReplicaDisksAndHead(0xc0000fa1e0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0)
2022-04-02T13:06:48.724865758-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rebuild.go:30 +0x565
2022-04-02T13:06:48.725259388-04:00 github.com/longhorn/longhorn-engine/pkg/controller.(*Controller).VerifyRebuildReplica(0xc0001d57a0, 0xc0000fa1e0, 0x16, [pvc-78ee6a8b-36e5-46e2-9986-15c5a519b3e3-e-e9b63647] 0x0, 0x0)
2022-04-02T13:06:48.725280480-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rebuild.go:94 +0x246
2022-04-02T13:06:48.725283601-04:00 github.com/longhorn/longhorn-engine/pkg/controller/rpc.(*ControllerServer).ReplicaVerifyRebuild(0xc0003a4078, 0x1091660, 0xc00045c6f0, 0xc00045c750, 0xc0003a4078, 0xc00045c6f0, 0xc00006aa20)
2022-04-02T13:06:48.725286256-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rpc/server.go:223 +0x48
2022-04-02T13:06:48.725288492-04:00 github.com/longhorn/longhorn-engine/proto/ptypes._ControllerService_ReplicaVerifyRebuild_Handler(0xe534a0, 0xc0003a4078, 0x1091660, 0xc00045c6f0, 0xc000522aa0, 0x0, 0x1091660, 0xc00045c6f0, 0xc0000fa1c0, 0x18)
2022-04-02T13:06:48.725291135-04:00 /go/src/github.com/longhorn/longhorn-engine/proto/ptypes/controller.pb.go:1673 +0x217
2022-04-02T13:06:48.725293798-04:00 google.golang.org/grpc.(*Server).processUnaryRPC(0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100, 0xc000516060, 0x1697f10, 0x0, 0x0, 0x0)
2022-04-02T13:06:48.725300522-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:998 +0x46a
2022-04-02T13:06:48.725303318-04:00 google.golang.org/grpc.(*Server).handleStream(0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100, 0x0)
2022-04-02T13:06:48.725305437-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:1278 +0xd3d
2022-04-02T13:06:48.725307525-04:00 google.golang.org/grpc.(*Server).serveStreams.func1.1(0xc0003a6020, 0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100)
2022-04-02T13:06:48.725309894-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:717 +0xa1
2022-04-02T13:06:48.725311790-04:00 created by google.golang.org/grpc.(*Server).serveStreams.func1
2022-04-02T13:06:48.725314990-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:715 +0xa1
```
## Environment
- Longhorn version: 1.2.4
- Installation method (e.g. Rancher Catalog App/Helm/Kubectl):
- Kubernetes distro (e.g. RKE/K3s/EKS/OpenShift) and version:
- Number of management node in the cluster:
- Number of worker node in the cluster:
- Node config
- OS type and version:
- CPU per node:
- Memory per node:
- Disk type(e.g. SSD/NVMe):
- Network bandwidth between the nodes:
- Underlying Infrastructure (e.g. on AWS/GCE, EKS/GKE, VMWare/KVM, Baremetal):
- Number of Longhorn volumes in the cluster:
## Additional context
Add any other context about the problem here.
| 1.0 | [BUG] longhorn-engine controller rebuilding crash - ## Describe the bug
In a customer support bundle, the longhorn-engine controller is crashing because it attempts to access the first element in an array whose length is zero.
https://github.com/longhorn/longhorn-engine/blob/cda02873ef0789a56fcca9ffcdbc5bea76f09018/pkg/controller/rebuild.go#L30
This code crashes:
```
head := rep.Chain[0]
```
The replica's gRPC method to get the chain of disk images looks like it is returning an empty array of disk images:
https://github.com/longhorn/longhorn-engine/blob/cda02873ef0789a56fcca9ffcdbc5bea76f09018/pkg/replica/replica.go#L592
## To Reproduce
TBD
## Expected behavior
The longhorn engine doesn't crash.
## Log or Support bundle
```
panic: runtime error: index out of range [0] with length 0
2022-04-02T13:06:48.724853291-04:00
2022-04-02T13:06:48.724857895-04:00 goroutine 230939 [running]:
2022-04-02T13:06:48.724862901-04:00 github.com/longhorn/longhorn-engine/pkg/controller.getReplicaDisksAndHead(0xc0000fa1e0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0)
2022-04-02T13:06:48.724865758-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rebuild.go:30 +0x565
2022-04-02T13:06:48.725259388-04:00 github.com/longhorn/longhorn-engine/pkg/controller.(*Controller).VerifyRebuildReplica(0xc0001d57a0, 0xc0000fa1e0, 0x16, [pvc-78ee6a8b-36e5-46e2-9986-15c5a519b3e3-e-e9b63647] 0x0, 0x0)
2022-04-02T13:06:48.725280480-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rebuild.go:94 +0x246
2022-04-02T13:06:48.725283601-04:00 github.com/longhorn/longhorn-engine/pkg/controller/rpc.(*ControllerServer).ReplicaVerifyRebuild(0xc0003a4078, 0x1091660, 0xc00045c6f0, 0xc00045c750, 0xc0003a4078, 0xc00045c6f0, 0xc00006aa20)
2022-04-02T13:06:48.725286256-04:00 /go/src/github.com/longhorn/longhorn-engine/pkg/controller/rpc/server.go:223 +0x48
2022-04-02T13:06:48.725288492-04:00 github.com/longhorn/longhorn-engine/proto/ptypes._ControllerService_ReplicaVerifyRebuild_Handler(0xe534a0, 0xc0003a4078, 0x1091660, 0xc00045c6f0, 0xc000522aa0, 0x0, 0x1091660, 0xc00045c6f0, 0xc0000fa1c0, 0x18)
2022-04-02T13:06:48.725291135-04:00 /go/src/github.com/longhorn/longhorn-engine/proto/ptypes/controller.pb.go:1673 +0x217
2022-04-02T13:06:48.725293798-04:00 google.golang.org/grpc.(*Server).processUnaryRPC(0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100, 0xc000516060, 0x1697f10, 0x0, 0x0, 0x0)
2022-04-02T13:06:48.725300522-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:998 +0x46a
2022-04-02T13:06:48.725303318-04:00 google.golang.org/grpc.(*Server).handleStream(0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100, 0x0)
2022-04-02T13:06:48.725305437-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:1278 +0xd3d
2022-04-02T13:06:48.725307525-04:00 google.golang.org/grpc.(*Server).serveStreams.func1.1(0xc0003a6020, 0xc00044c000, 0x1099200, 0xc000366000, 0xc00031c100)
2022-04-02T13:06:48.725309894-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:717 +0xa1
2022-04-02T13:06:48.725311790-04:00 created by google.golang.org/grpc.(*Server).serveStreams.func1
2022-04-02T13:06:48.725314990-04:00 /go/src/github.com/longhorn/longhorn-engine/vendor/google.golang.org/grpc/server.go:715 +0xa1
```
## Environment
- Longhorn version: 1.2.4
- Installation method (e.g. Rancher Catalog App/Helm/Kubectl):
- Kubernetes distro (e.g. RKE/K3s/EKS/OpenShift) and version:
- Number of management node in the cluster:
- Number of worker node in the cluster:
- Node config
- OS type and version:
- CPU per node:
- Memory per node:
- Disk type(e.g. SSD/NVMe):
- Network bandwidth between the nodes:
- Underlying Infrastructure (e.g. on AWS/GCE, EKS/GKE, VMWare/KVM, Baremetal):
- Number of Longhorn volumes in the cluster:
## Additional context
Add any other context about the problem here.
| non_usab | longhorn engine controller rebuilding crash describe the bug in a customer support bundle the longhorn engine controller is crashing because it attempts to access the first element in an array whose length is zero this code crashes head rep chain the replica s grpc method to get the chain of disk images looks like it is returning an empty array of disk images to reproduce tbd expected behavior the longhorn engine doesn t crash log or support bundle panic runtime error index out of range with length goroutine github com longhorn longhorn engine pkg controller getreplicadisksandhead go src github com longhorn longhorn engine pkg controller rebuild go github com longhorn longhorn engine pkg controller controller verifyrebuildreplica go src github com longhorn longhorn engine pkg controller rebuild go github com longhorn longhorn engine pkg controller rpc controllerserver replicaverifyrebuild go src github com longhorn longhorn engine pkg controller rpc server go github com longhorn longhorn engine proto ptypes controllerservice replicaverifyrebuild handler go src github com longhorn longhorn engine proto ptypes controller pb go google golang org grpc server processunaryrpc go src github com longhorn longhorn engine vendor google golang org grpc server go google golang org grpc server handlestream go src github com longhorn longhorn engine vendor google golang org grpc server go google golang org grpc server servestreams go src github com longhorn longhorn engine vendor google golang org grpc server go created by google golang org grpc server servestreams go src github com longhorn longhorn engine vendor google golang org grpc server go environment longhorn version installation method e g rancher catalog app helm kubectl kubernetes distro e g rke eks openshift and version number of management node in the cluster number of worker node in the cluster node config os type and version cpu per node memory per node disk type e g ssd nvme network bandwidth between the nodes underlying infrastructure e g on aws gce eks gke vmware kvm baremetal number of longhorn volumes in the cluster additional context add any other context about the problem here | 0 |
744,148 | 25,931,179,351 | IssuesEvent | 2022-12-16 10:08:06 | renovatebot/renovate | https://api.github.com/repos/renovatebot/renovate | closed | Use monospaced style for Boolean values, and references to Renovate config options | priority-4-low type:docs status:ready | ### Describe the proposed change(s).
https://github.com/renovatebot/renovate/blob/main/lib/config/options/index.ts has `description:` fields, that are also used to generate a part of the config option documentation.
I want to use the monospaced style for things like:
- [x] `true` or `false` Booleans
- [x] References to Renovate concepts like `packageRules`
- [x] References to filenames like `config.js`
Let me know if you want one big PR, or smaller PRs to make this change. 😉 | 1.0 | Use monospaced style for Boolean values, and references to Renovate config options - ### Describe the proposed change(s).
https://github.com/renovatebot/renovate/blob/main/lib/config/options/index.ts has `description:` fields, that are also used to generate a part of the config option documentation.
I want to use the monospaced style for things like:
- [x] `true` or `false` Booleans
- [x] References to Renovate concepts like `packageRules`
- [x] References to filenames like `config.js`
Let me know if you want one big PR, or smaller PRs to make this change. 😉 | non_usab | use monospaced style for boolean values and references to renovate config options describe the proposed change s has description fields that are also used to generate a part of the config option documentation i want to use the monospaced style for things like true or false booleans references to renovate concepts like packagerules references to filenames like config js let me know if you want one big pr or smaller prs to make this change 😉 | 0 |
266,520 | 28,375,328,345 | IssuesEvent | 2023-04-12 20:21:17 | JoshRMendDemo/SourceFileMatching-Demo | https://api.github.com/repos/JoshRMendDemo/SourceFileMatching-Demo | opened | sulinoswpa_supplicant-2.9: 3 vulnerabilities (highest severity is: 9.8) | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p></summary>
<p>
<p>Indipendent distro uses inary package system. Sulin is roolling donkey</p>
<p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p>
</p>
</p></p>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b>
</p>
<p></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (sulinoswpa_supplicant version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2021-0516](https://www.mend.io/vulnerability-database/CVE-2021-0516) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | sulinoswpa_supplicant-2.9 | Direct | android-11.0.0_r38 | ❌ |
| [CVE-2021-27803](https://www.mend.io/vulnerability-database/CVE-2021-27803) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | sulinoswpa_supplicant-2.9 | Direct | wpa_supplicant - 2.6-12,2.9-2,2.7-2,2.9-2,2.9-2,2.9-2,2.9-2,2.6-12,2.7-2,2.9-2,2.7-2,2.9-2,2.6-12,2.9-2,2.9-2,2.7-2,2.6-12,2.9-2,2.7-2;wpa_supplicant-debugsource - 2.7-2,2.9-2,2.9-2;wpa_supplicant-debuginfo - 2.9-2,2.9-2,2.6-12,2.7-2 | ❌ |
| [CVE-2021-30004](https://www.mend.io/vulnerability-database/CVE-2021-30004) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | detected in multiple dependencies | Direct | wpa-supplicant - 2.9 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-0516</summary>
### Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p>
<p>
<p>Indipendent distro uses inary package system. Sulin is roolling donkey</p>
<p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p>
<p>Found in base branch: <b>main</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out of bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181660448
<p>Publish Date: 2021-06-21
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-0516>CVE-2021-0516</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2021-06-01">https://source.android.com/security/bulletin/2021-06-01</a></p>
<p>Release Date: 2021-06-21</p>
<p>Fix Resolution: android-11.0.0_r38</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-27803</summary>
### Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p>
<p>
<p>Indipendent distro uses inary package system. Sulin is roolling donkey</p>
<p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p>
<p>Found in base branch: <b>main</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
<p>Publish Date: 2021-02-26
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-27803>CVE-2021-27803</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Adjacent
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">https://nvd.nist.gov/vuln/detail/CVE-2021-27803</a></p>
<p>Release Date: 2021-02-26</p>
<p>Fix Resolution: wpa_supplicant - 2.6-12,2.9-2,2.7-2,2.9-2,2.9-2,2.9-2,2.9-2,2.6-12,2.7-2,2.9-2,2.7-2,2.9-2,2.6-12,2.9-2,2.9-2,2.7-2,2.6-12,2.9-2,2.7-2;wpa_supplicant-debugsource - 2.7-2,2.9-2,2.9-2;wpa_supplicant-debuginfo - 2.9-2,2.9-2,2.6-12,2.7-2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-30004</summary>
### Vulnerable Libraries - <b>sulinoswpa_supplicant-2.9</b>, <b>sulinoswpa_supplicant-2.9</b></p>
<p>
</p>
<p></p>
### Vulnerability Details
<p>
In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.
<p>Publish Date: 2021-04-02
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-30004>CVE-2021-30004</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30004">https://nvd.nist.gov/vuln/detail/CVE-2021-30004</a></p>
<p>Release Date: 2021-04-02</p>
<p>Fix Resolution: wpa-supplicant - 2.9</p>
</p>
<p></p>
</details> | True | sulinoswpa_supplicant-2.9: 3 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p></summary>
<p>
<p>Indipendent distro uses inary package system. Sulin is roolling donkey</p>
<p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p>
</p>
</p></p>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b>
</p>
<p></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (sulinoswpa_supplicant version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2021-0516](https://www.mend.io/vulnerability-database/CVE-2021-0516) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | sulinoswpa_supplicant-2.9 | Direct | android-11.0.0_r38 | ❌ |
| [CVE-2021-27803](https://www.mend.io/vulnerability-database/CVE-2021-27803) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | sulinoswpa_supplicant-2.9 | Direct | wpa_supplicant - 2.6-12,2.9-2,2.7-2,2.9-2,2.9-2,2.9-2,2.9-2,2.6-12,2.7-2,2.9-2,2.7-2,2.9-2,2.6-12,2.9-2,2.9-2,2.7-2,2.6-12,2.9-2,2.7-2;wpa_supplicant-debugsource - 2.7-2,2.9-2,2.9-2;wpa_supplicant-debuginfo - 2.9-2,2.9-2,2.6-12,2.7-2 | ❌ |
| [CVE-2021-30004](https://www.mend.io/vulnerability-database/CVE-2021-30004) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | detected in multiple dependencies | Direct | wpa-supplicant - 2.9 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-0516</summary>
### Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p>
<p>
<p>Indipendent distro uses inary package system. Sulin is roolling donkey</p>
<p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p>
<p>Found in base branch: <b>main</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out of bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181660448
<p>Publish Date: 2021-06-21
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-0516>CVE-2021-0516</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2021-06-01">https://source.android.com/security/bulletin/2021-06-01</a></p>
<p>Release Date: 2021-06-21</p>
<p>Fix Resolution: android-11.0.0_r38</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-27803</summary>
### Vulnerable Library - <b>sulinoswpa_supplicant-2.9</b></p>
<p>
<p>Indipendent distro uses inary package system. Sulin is roolling donkey</p>
<p>Library home page: <a href=https://sourceforge.net/projects/sulinos/>https://sourceforge.net/projects/sulinos/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/SourceFileMatching-Demo/commit/c7e7060c6565047178be114d931a061a8f6b8c1b">c7e7060c6565047178be114d931a061a8f6b8c1b</a></p>
<p>Found in base branch: <b>main</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/vendor/hostapd-2.9/src/p2p/p2p_pd.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
<p>Publish Date: 2021-02-26
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-27803>CVE-2021-27803</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Adjacent
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">https://nvd.nist.gov/vuln/detail/CVE-2021-27803</a></p>
<p>Release Date: 2021-02-26</p>
<p>Fix Resolution: wpa_supplicant - 2.6-12,2.9-2,2.7-2,2.9-2,2.9-2,2.9-2,2.9-2,2.6-12,2.7-2,2.9-2,2.7-2,2.9-2,2.6-12,2.9-2,2.9-2,2.7-2,2.6-12,2.9-2,2.7-2;wpa_supplicant-debugsource - 2.7-2,2.9-2,2.9-2;wpa_supplicant-debuginfo - 2.9-2,2.9-2,2.6-12,2.7-2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-30004</summary>
### Vulnerable Libraries - <b>sulinoswpa_supplicant-2.9</b>, <b>sulinoswpa_supplicant-2.9</b></p>
<p>
</p>
<p></p>
### Vulnerability Details
<p>
In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.
<p>Publish Date: 2021-04-02
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-30004>CVE-2021-30004</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30004">https://nvd.nist.gov/vuln/detail/CVE-2021-30004</a></p>
<p>Release Date: 2021-04-02</p>
<p>Fix Resolution: wpa-supplicant - 2.9</p>
</p>
<p></p>
</details> | non_usab | sulinoswpa supplicant vulnerabilities highest severity is vulnerable library sulinoswpa supplicant indipendent distro uses inary package system sulin is roolling donkey library home page a href found in head commit a href vulnerable source files vendor hostapd src pd c vulnerabilities cve severity cvss dependency type fixed in sulinoswpa supplicant version remediation available critical sulinoswpa supplicant direct android high sulinoswpa supplicant direct wpa supplicant wpa supplicant debugsource wpa supplicant debuginfo medium detected in multiple dependencies direct wpa supplicant details cve vulnerable library sulinoswpa supplicant indipendent distro uses inary package system sulin is roolling donkey library home page a href found in head commit a href found in base branch main vulnerable source files vendor hostapd src pd c vulnerability details in process prov disc req of pd c there is a possible out of bounds read and write due to a use after free this could lead to remote escalation of privilege with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android cve vulnerable library sulinoswpa supplicant indipendent distro uses inary package system sulin is roolling donkey library home page a href found in head commit a href found in base branch main vulnerable source files vendor hostapd src pd c vulnerability details a vulnerability was discovered in how pd c in wpa supplicant before processes wi fi direct provision discovery requests it could result in denial of service or other impact potentially execution of arbitrary code for an attacker within radio range publish date url a href cvss score details base score metrics exploitability metrics attack vector adjacent attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution wpa supplicant wpa supplicant debugsource wpa supplicant debuginfo cve vulnerable libraries sulinoswpa supplicant sulinoswpa supplicant vulnerability details in wpa supplicant and hostapd forging attacks may occur because algorithmidentifier parameters are mishandled in tls c and tls c publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution wpa supplicant | 0 |
266,957 | 28,485,780,896 | IssuesEvent | 2023-04-18 07:46:29 | Satheesh575555/openSSL_1.0.1g | https://api.github.com/repos/Satheesh575555/openSSL_1.0.1g | opened | CVE-2014-3507 (Medium) detected in opensslOpenSSL_1_0_1g | Mend: dependency security vulnerability | ## CVE-2014-3507 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1g</b></p></summary>
<p>
<p>TLS/SSL and crypto library</p>
<p>Library home page: <a href=https://github.com/openssl/openssl.git>https://github.com/openssl/openssl.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/openSSL_1.0.1g/commit/7a1521d6faa1c1b2bda3237d82c41b77511b2861">7a1521d6faa1c1b2bda3237d82c41b77511b2861</a></p>
<p>Found in base branch: <b>main</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/ssl/d1_both.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
<p>Publish Date: 2014-08-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-3507>CVE-2014-3507</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">https://nvd.nist.gov/vuln/detail/CVE-2014-3507</a></p>
<p>Release Date: 2014-08-13</p>
<p>Fix Resolution: 0.9.8zb,1.0.0n,1.0.1i</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2014-3507 (Medium) detected in opensslOpenSSL_1_0_1g - ## CVE-2014-3507 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1g</b></p></summary>
<p>
<p>TLS/SSL and crypto library</p>
<p>Library home page: <a href=https://github.com/openssl/openssl.git>https://github.com/openssl/openssl.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/openSSL_1.0.1g/commit/7a1521d6faa1c1b2bda3237d82c41b77511b2861">7a1521d6faa1c1b2bda3237d82c41b77511b2861</a></p>
<p>Found in base branch: <b>main</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/ssl/d1_both.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
<p>Publish Date: 2014-08-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-3507>CVE-2014-3507</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-3507">https://nvd.nist.gov/vuln/detail/CVE-2014-3507</a></p>
<p>Release Date: 2014-08-13</p>
<p>Fix Resolution: 0.9.8zb,1.0.0n,1.0.1i</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_usab | cve medium detected in opensslopenssl cve medium severity vulnerability vulnerable library opensslopenssl tls ssl and crypto library library home page a href found in head commit a href found in base branch main vulnerable source files ssl both c vulnerability details memory leak in both c in the dtls implementation in openssl before before and before allows remote attackers to cause a denial of service memory consumption via zero length dtls fragments that trigger improper handling of the return value of a certain insert function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
69,270 | 9,285,294,697 | IssuesEvent | 2019-03-21 06:26:02 | ontio/ontology-python-sdk | https://api.github.com/repos/ontio/ontology-python-sdk | closed | AttributeError: 'Oep4' object has no attribute 'set_contract_address' | Documentation | ```
Traceback (most recent call last):
File "get_name.py", line 8, in <module>
oep4.set_contract_address(contract_address)
AttributeError: 'Oep4' object has no attribute 'set_contract_address'
``` | 1.0 | AttributeError: 'Oep4' object has no attribute 'set_contract_address' - ```
Traceback (most recent call last):
File "get_name.py", line 8, in <module>
oep4.set_contract_address(contract_address)
AttributeError: 'Oep4' object has no attribute 'set_contract_address'
``` | non_usab | attributeerror object has no attribute set contract address traceback most recent call last file get name py line in set contract address contract address attributeerror object has no attribute set contract address | 0 |
66,438 | 8,924,477,412 | IssuesEvent | 2019-01-21 18:50:41 | atom/node-keytar | https://api.github.com/repos/atom/node-keytar | closed | findPassword - incorrect documentation | documentation | From https://github.com/atom/node-keytar/blob/0e1757ae895f63ece9c8641e112b892cbdff34cf/README.md#findpasswordservice :
> ### findPassword(service)
>
> Find a password for the `service` in the keychain.
>
>`service` - The string service name.
>
>Yields the string password, or `null` if an entry for the given service and account was not found.
Which given account? This docs looks like a copy-paste error from the `getPassword` method.
#36 questioned before why this function was needed, and although it has been closed, the question is still open - what is the purpose of `findPassword` ? | 1.0 | findPassword - incorrect documentation - From https://github.com/atom/node-keytar/blob/0e1757ae895f63ece9c8641e112b892cbdff34cf/README.md#findpasswordservice :
> ### findPassword(service)
>
> Find a password for the `service` in the keychain.
>
>`service` - The string service name.
>
>Yields the string password, or `null` if an entry for the given service and account was not found.
Which given account? This docs looks like a copy-paste error from the `getPassword` method.
#36 questioned before why this function was needed, and although it has been closed, the question is still open - what is the purpose of `findPassword` ? | non_usab | findpassword incorrect documentation from findpassword service find a password for the service in the keychain service the string service name yields the string password or null if an entry for the given service and account was not found which given account this docs looks like a copy paste error from the getpassword method questioned before why this function was needed and although it has been closed the question is still open what is the purpose of findpassword | 0 |
27,987 | 30,843,681,370 | IssuesEvent | 2023-08-02 12:26:44 | microsoft/AdaptiveCards | https://api.github.com/repos/microsoft/AdaptiveCards | opened | [Adaptive Cards> OrderConfirmation.json]: Tooltip is not appearing for the 'More' option button. | Bug Area-Renderers Area-Accessibility A11yUsable HCL-E+D HCL-AdaptiveCards-Universal | ### Target Platforms
UWP
### SDK Version
1.2.2306.30005
### Application Name
Adaptive Cards
### Problem Description
**Test Environment:**
OS version: 23H2 (Build 25905.1000)
Application: AdaptiveCardVisualizer
Application Version: 1.2.2306.30005
**Repro Steps:**
1. Open the Adaptive Card Visualizer application.
2. Navigate to the 'OrderConfirmation.json' through tab key and activate it.
3. Navigate to 'More option' button through tab key.
4. Observe the issue.
**Actual Result:**
For the 'More option' button, proper tooltip is not appearing. Tooltip is appearing as a (...) more option icon.
**Expected Result:**
Tooltip should properly appear for the 'More' option button.Such as 'More option'.
**User Impact:**
Person with cognitive disability will not be able to understand the purpose of the button and will not be able to navigate or or interact with the content properly.
“Have feedback to share on Bugs? Please help fill [Trusted Tester Bug Feedback (office.com)](https://nam06.safelinks.protection.outlook.com/?url=https://forms.office.com/pages/responsepage.aspx?id%3Dv4j5cvGGr0GRqy180BHbR5dUqGQgJ9lItv-jqY8F09lURVdYTENIRkY2UzlCR0NKV1E2VUE5OVpDVy4u&data=04%7c01%7cv-vaibgu%40microsoft.com%7c551850210d444be9b28308d9691e3dde%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c637656400980259288%7cUnknown%7cTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7c1000&sdata=TrcBaCyAPKg0WAQfdSZJP2i9pghMEDg59i2NeUUs5EQ%3D&reserved=0) “
### Screenshots
https://github.com/microsoft/AdaptiveCards/assets/104483005/f094e3ec-667b-4a2a-aba2-b384ade80162
### Card JSON
```JSON
NA
```
### Sample Code Language
_No response_
### Sample Code
_No response_ | True | [Adaptive Cards> OrderConfirmation.json]: Tooltip is not appearing for the 'More' option button. - ### Target Platforms
UWP
### SDK Version
1.2.2306.30005
### Application Name
Adaptive Cards
### Problem Description
**Test Environment:**
OS version: 23H2 (Build 25905.1000)
Application: AdaptiveCardVisualizer
Application Version: 1.2.2306.30005
**Repro Steps:**
1. Open the Adaptive Card Visualizer application.
2. Navigate to the 'OrderConfirmation.json' through tab key and activate it.
3. Navigate to 'More option' button through tab key.
4. Observe the issue.
**Actual Result:**
For the 'More option' button, proper tooltip is not appearing. Tooltip is appearing as a (...) more option icon.
**Expected Result:**
Tooltip should properly appear for the 'More' option button.Such as 'More option'.
**User Impact:**
Person with cognitive disability will not be able to understand the purpose of the button and will not be able to navigate or or interact with the content properly.
“Have feedback to share on Bugs? Please help fill [Trusted Tester Bug Feedback (office.com)](https://nam06.safelinks.protection.outlook.com/?url=https://forms.office.com/pages/responsepage.aspx?id%3Dv4j5cvGGr0GRqy180BHbR5dUqGQgJ9lItv-jqY8F09lURVdYTENIRkY2UzlCR0NKV1E2VUE5OVpDVy4u&data=04%7c01%7cv-vaibgu%40microsoft.com%7c551850210d444be9b28308d9691e3dde%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c637656400980259288%7cUnknown%7cTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7c1000&sdata=TrcBaCyAPKg0WAQfdSZJP2i9pghMEDg59i2NeUUs5EQ%3D&reserved=0) “
### Screenshots
https://github.com/microsoft/AdaptiveCards/assets/104483005/f094e3ec-667b-4a2a-aba2-b384ade80162
### Card JSON
```JSON
NA
```
### Sample Code Language
_No response_
### Sample Code
_No response_ | usab | tooltip is not appearing for the more option button target platforms uwp sdk version application name adaptive cards problem description test environment os version build application adaptivecardvisualizer application version repro steps open the adaptive card visualizer application navigate to the orderconfirmation json through tab key and activate it navigate to more option button through tab key observe the issue actual result for the more option button proper tooltip is not appearing tooltip is appearing as a more option icon expected result tooltip should properly appear for the more option button such as more option user impact person with cognitive disability will not be able to understand the purpose of the button and will not be able to navigate or or interact with the content properly “have feedback to share on bugs please help fill “ screenshots card json json na sample code language no response sample code no response | 1 |
15,721 | 10,262,483,043 | IssuesEvent | 2019-08-22 12:26:28 | microsoft/BotFramework-Emulator | https://api.github.com/repos/microsoft/BotFramework-Emulator | opened | [Usability-Settings] when we navigating to the scan mode “User ID “content is overlapping | A11yCT A11yLowImpact A11yMAS A11yUsable Accessibility Bug HCL-BotFrameworkEmulator Severity4 | **Actual Result:**
when we navigating to the scan mode “User ID “content is overlapping, and error message is reading twice like “Enter a User ID User ID”
**Expected Result:**
when we navigating to the scan mode “User ID “content should not overlap and error message should read as “Enter a User ID ”
Note: Issue repro'ing with NVDA
**Repro Steps:**
Turn on the narrator
1.Open the Bot Framework V4 Emulator.
2.Navigate to Welcome tab screen and select it, screen gets opened
3.Navigate to the open bot and select it
4.Open bot dialog gets opened and connect to the open bot
5.Live chat screen gets appears
6.Navigate to the Edit ngrok settings and select it
7.Emulator screen gets opened
8.Navigate to the “User ID” element using scan mode (Down arrow key)
9. Observe the issue
**User Impact:**
Users who rely on AT will be affected if the screen reader users while navigating to the UI content ,the content is overlapping and reading the info twice users will misguide the info.
**Test Environment:**
OS Build: Version 1903(OS Build 18362.239)
Browser: Edge
Application: Bot Framework V4 Emulator
Screen reader: Narrator
[Usability_Setting.zip](https://github.com/microsoft/BotFramework-Emulator/files/3530094/Usability_Setting.zip)
| True | [Usability-Settings] when we navigating to the scan mode “User ID “content is overlapping - **Actual Result:**
when we navigating to the scan mode “User ID “content is overlapping, and error message is reading twice like “Enter a User ID User ID”
**Expected Result:**
when we navigating to the scan mode “User ID “content should not overlap and error message should read as “Enter a User ID ”
Note: Issue repro'ing with NVDA
**Repro Steps:**
Turn on the narrator
1.Open the Bot Framework V4 Emulator.
2.Navigate to Welcome tab screen and select it, screen gets opened
3.Navigate to the open bot and select it
4.Open bot dialog gets opened and connect to the open bot
5.Live chat screen gets appears
6.Navigate to the Edit ngrok settings and select it
7.Emulator screen gets opened
8.Navigate to the “User ID” element using scan mode (Down arrow key)
9. Observe the issue
**User Impact:**
Users who rely on AT will be affected if the screen reader users while navigating to the UI content ,the content is overlapping and reading the info twice users will misguide the info.
**Test Environment:**
OS Build: Version 1903(OS Build 18362.239)
Browser: Edge
Application: Bot Framework V4 Emulator
Screen reader: Narrator
[Usability_Setting.zip](https://github.com/microsoft/BotFramework-Emulator/files/3530094/Usability_Setting.zip)
| usab | when we navigating to the scan mode “user id “content is overlapping actual result when we navigating to the scan mode “user id “content is overlapping and error message is reading twice like “enter a user id user id” expected result when we navigating to the scan mode “user id “content should not overlap and error message should read as “enter a user id ” note issue repro ing with nvda repro steps turn on the narrator open the bot framework emulator navigate to welcome tab screen and select it screen gets opened navigate to the open bot and select it open bot dialog gets opened and connect to the open bot live chat screen gets appears navigate to the edit ngrok settings and select it emulator screen gets opened navigate to the “user id” element using scan mode down arrow key observe the issue user impact users who rely on at will be affected if the screen reader users while navigating to the ui content the content is overlapping and reading the info twice users will misguide the info test environment os build version os build browser edge application bot framework emulator screen reader narrator | 1 |
2,905 | 3,244,197,026 | IssuesEvent | 2015-10-16 00:03:19 | lionheart/openradar-mirror | https://api.github.com/repos/lionheart/openradar-mirror | closed | 23116258: Xcode UI Testing: XCUI tests need to be able to access the application process | classification:ui/usability reproducible:always status:closed | #### Description
Summary:
XCUI tests are currently run in a completely separate process than the app under test, which makes a lot of sense in theory: You want to test the UI, so you only give the user access to the application proxy.
In practice, this is a bit of a disaster, because you can’t mock anything out without having to set up a ton of stuff on the app side. I can’t tell my UI tests “Test what happens when the user tries to login with network connectivity” and “Test what happens when the user tries to login without network connectivity” because those things are being determined by the app itself, which I have no access to.
Steps to Reproduce:
1. Write some UI tests.
2. Try to @testable import your app bundle, add a few things from your app bundle like string convenience methods
3. Get error about unsafe mutable accessors, scratch head
4. Google it, discover that because test is run in a separate process testable importing doesn’t work for UI tests.
5. Realize that this means you can’t set up any kind of helpful state like “Use a mock network connection” or “Let’s pretend the user tries to do x without a working internet connection”
Expected Results:
Be able to access the application process to update these types of objects within the main application at runtime.
Actual Results:
Any state must be set up using environment arguments in a build scheme, and coded into the application rather than set up in the test target.
Regression:
UI testing was just introduced, but it’s a “regression” from the standard XCTest suite which allows access to these things.
Notes:
This is a major dealbreaker for me in actually using XCUI testing because if I can’t mock state, then I’m testing not only UI but the exact state of the app at any time. Essentially, I don’t want my UI tests to fail because my device cabinet is in a part of the office with iffy wifi.
-
Product Version: Xcode 7.0.1 (7A1001)
Created: 2015-10-14T22:01:29.206000
Originated: 2015-10-14T17:01:00
Open Radar Link: http://www.openradar.me/23116258 | True | 23116258: Xcode UI Testing: XCUI tests need to be able to access the application process - #### Description
Summary:
XCUI tests are currently run in a completely separate process than the app under test, which makes a lot of sense in theory: You want to test the UI, so you only give the user access to the application proxy.
In practice, this is a bit of a disaster, because you can’t mock anything out without having to set up a ton of stuff on the app side. I can’t tell my UI tests “Test what happens when the user tries to login with network connectivity” and “Test what happens when the user tries to login without network connectivity” because those things are being determined by the app itself, which I have no access to.
Steps to Reproduce:
1. Write some UI tests.
2. Try to @testable import your app bundle, add a few things from your app bundle like string convenience methods
3. Get error about unsafe mutable accessors, scratch head
4. Google it, discover that because test is run in a separate process testable importing doesn’t work for UI tests.
5. Realize that this means you can’t set up any kind of helpful state like “Use a mock network connection” or “Let’s pretend the user tries to do x without a working internet connection”
Expected Results:
Be able to access the application process to update these types of objects within the main application at runtime.
Actual Results:
Any state must be set up using environment arguments in a build scheme, and coded into the application rather than set up in the test target.
Regression:
UI testing was just introduced, but it’s a “regression” from the standard XCTest suite which allows access to these things.
Notes:
This is a major dealbreaker for me in actually using XCUI testing because if I can’t mock state, then I’m testing not only UI but the exact state of the app at any time. Essentially, I don’t want my UI tests to fail because my device cabinet is in a part of the office with iffy wifi.
-
Product Version: Xcode 7.0.1 (7A1001)
Created: 2015-10-14T22:01:29.206000
Originated: 2015-10-14T17:01:00
Open Radar Link: http://www.openradar.me/23116258 | usab | xcode ui testing xcui tests need to be able to access the application process description summary xcui tests are currently run in a completely separate process than the app under test which makes a lot of sense in theory you want to test the ui so you only give the user access to the application proxy in practice this is a bit of a disaster because you can’t mock anything out without having to set up a ton of stuff on the app side i can’t tell my ui tests “test what happens when the user tries to login with network connectivity” and “test what happens when the user tries to login without network connectivity” because those things are being determined by the app itself which i have no access to steps to reproduce write some ui tests try to testable import your app bundle add a few things from your app bundle like string convenience methods get error about unsafe mutable accessors scratch head google it discover that because test is run in a separate process testable importing doesn’t work for ui tests realize that this means you can’t set up any kind of helpful state like “use a mock network connection” or “let’s pretend the user tries to do x without a working internet connection” expected results be able to access the application process to update these types of objects within the main application at runtime actual results any state must be set up using environment arguments in a build scheme and coded into the application rather than set up in the test target regression ui testing was just introduced but it’s a “regression” from the standard xctest suite which allows access to these things notes this is a major dealbreaker for me in actually using xcui testing because if i can’t mock state then i’m testing not only ui but the exact state of the app at any time essentially i don’t want my ui tests to fail because my device cabinet is in a part of the office with iffy wifi product version xcode created originated open radar link | 1 |
9,223 | 6,186,814,694 | IssuesEvent | 2017-07-04 04:42:20 | Virtual-Labs/image-processing-iiith | https://api.github.com/repos/Virtual-Labs/image-processing-iiith | closed | QA_Image-Segmentation_Introduction_Spelling-mistakes | Category: Usability Developed By: VLEAD Open-edx-Issue Resolved Severity : S3 | Defect Description :
In the Introduction page of the Image Segmentation experiment in this lab, found spelling mistakes.
Actual Result :
In the Introduction page of the Image Segmentation experiment in this lab, found spelling mistakes. Refer to attachments.
Environment :
OS: Windows 7, Ubuntu-16.04,Centos-6
Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0
Bandwidth : 100Mbps
Hardware Configuration:8GBRAM ,
Processor:i5
Attachment:

| True | QA_Image-Segmentation_Introduction_Spelling-mistakes - Defect Description :
In the Introduction page of the Image Segmentation experiment in this lab, found spelling mistakes.
Actual Result :
In the Introduction page of the Image Segmentation experiment in this lab, found spelling mistakes. Refer to attachments.
Environment :
OS: Windows 7, Ubuntu-16.04,Centos-6
Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0
Bandwidth : 100Mbps
Hardware Configuration:8GBRAM ,
Processor:i5
Attachment:

| usab | qa image segmentation introduction spelling mistakes defect description in the introduction page of the image segmentation experiment in this lab found spelling mistakes actual result in the introduction page of the image segmentation experiment in this lab found spelling mistakes refer to attachments environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor attachment | 1 |
190,927 | 14,589,250,032 | IssuesEvent | 2020-12-19 01:06:30 | kalexmills/github-vet-tests-dec2020 | https://api.github.com/repos/kalexmills/github-vet-tests-dec2020 | closed | terraform-providers/terraform-provider-oci: oci/datacatalog_catalog_test.go; 16 LoC | fresh small test |
Found a possible issue in [terraform-providers/terraform-provider-oci](https://www.github.com/terraform-providers/terraform-provider-oci) at [oci/datacatalog_catalog_test.go](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/datacatalog_catalog_test.go#L291-L306)
Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first
issue it finds, so please do not limit your consideration to the contents of the below message.
> reference to catalogId is reassigned at line 295
[Click here to see the code in its original context.](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/datacatalog_catalog_test.go#L291-L306)
<details>
<summary>Click here to show the 16 line(s) of Go which triggered the analyzer.</summary>
```go
for _, catalogId := range catalogIds {
if ok := SweeperDefaultResourceId[catalogId]; !ok {
deleteCatalogRequest := oci_datacatalog.DeleteCatalogRequest{}
deleteCatalogRequest.CatalogId = &catalogId
deleteCatalogRequest.RequestMetadata.RetryPolicy = getRetryPolicy(true, "datacatalog")
_, error := dataCatalogClient.DeleteCatalog(context.Background(), deleteCatalogRequest)
if error != nil {
fmt.Printf("Error deleting Catalog %s %s, It is possible that the resource is already deleted. Please verify manually \n", catalogId, error)
continue
}
waitTillCondition(testAccProvider, &catalogId, catalogSweepWaitCondition, time.Duration(3*time.Minute),
catalogSweepResponseFetchOperation, "datacatalog", true)
}
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: 507acd0ed6517dbca2fbcfb8100874929c8fd8e1
| 1.0 | terraform-providers/terraform-provider-oci: oci/datacatalog_catalog_test.go; 16 LoC -
Found a possible issue in [terraform-providers/terraform-provider-oci](https://www.github.com/terraform-providers/terraform-provider-oci) at [oci/datacatalog_catalog_test.go](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/datacatalog_catalog_test.go#L291-L306)
Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first
issue it finds, so please do not limit your consideration to the contents of the below message.
> reference to catalogId is reassigned at line 295
[Click here to see the code in its original context.](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/datacatalog_catalog_test.go#L291-L306)
<details>
<summary>Click here to show the 16 line(s) of Go which triggered the analyzer.</summary>
```go
for _, catalogId := range catalogIds {
if ok := SweeperDefaultResourceId[catalogId]; !ok {
deleteCatalogRequest := oci_datacatalog.DeleteCatalogRequest{}
deleteCatalogRequest.CatalogId = &catalogId
deleteCatalogRequest.RequestMetadata.RetryPolicy = getRetryPolicy(true, "datacatalog")
_, error := dataCatalogClient.DeleteCatalog(context.Background(), deleteCatalogRequest)
if error != nil {
fmt.Printf("Error deleting Catalog %s %s, It is possible that the resource is already deleted. Please verify manually \n", catalogId, error)
continue
}
waitTillCondition(testAccProvider, &catalogId, catalogSweepWaitCondition, time.Duration(3*time.Minute),
catalogSweepResponseFetchOperation, "datacatalog", true)
}
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: 507acd0ed6517dbca2fbcfb8100874929c8fd8e1
| non_usab | terraform providers terraform provider oci oci datacatalog catalog test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message reference to catalogid is reassigned at line click here to show the line s of go which triggered the analyzer go for catalogid range catalogids if ok sweeperdefaultresourceid ok deletecatalogrequest oci datacatalog deletecatalogrequest deletecatalogrequest catalogid catalogid deletecatalogrequest requestmetadata retrypolicy getretrypolicy true datacatalog error datacatalogclient deletecatalog context background deletecatalogrequest if error nil fmt printf error deleting catalog s s it is possible that the resource is already deleted please verify manually n catalogid error continue waittillcondition testaccprovider catalogid catalogsweepwaitcondition time duration time minute catalogsweepresponsefetchoperation datacatalog true leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id | 0 |
25,481 | 25,255,808,742 | IssuesEvent | 2022-11-15 17:58:11 | soflyy/oxygen-bugs-and-features | https://api.github.com/repos/soflyy/oxygen-bugs-and-features | closed | Copy & Paste Elements | enhancement feature implemented UI - UI/Usability | Posted on behalf of Michael:
I would like the ability to copy and paste elements (it could be layouts, sections, or columnns or divs etc) between and across pages, templates, blocks and reusable parts. Saving them in a library, for use later would be useful too.
Being forced to always save as a reusable part makes reusable parts an administrative nightmare for those who want to copy and paste a lot. But only want to save a few, since deleting them (even the editable ones) deletes all the pasted instances. | True | Copy & Paste Elements - Posted on behalf of Michael:
I would like the ability to copy and paste elements (it could be layouts, sections, or columnns or divs etc) between and across pages, templates, blocks and reusable parts. Saving them in a library, for use later would be useful too.
Being forced to always save as a reusable part makes reusable parts an administrative nightmare for those who want to copy and paste a lot. But only want to save a few, since deleting them (even the editable ones) deletes all the pasted instances. | usab | copy paste elements posted on behalf of michael i would like the ability to copy and paste elements it could be layouts sections or columnns or divs etc between and across pages templates blocks and reusable parts saving them in a library for use later would be useful too being forced to always save as a reusable part makes reusable parts an administrative nightmare for those who want to copy and paste a lot but only want to save a few since deleting them even the editable ones deletes all the pasted instances | 1 |
624,553 | 19,701,216,936 | IssuesEvent | 2022-01-12 16:48:38 | kubernetes/ingress-nginx | https://api.github.com/repos/kubernetes/ingress-nginx | closed | Release 1.1.1 | kind/feature needs-triage needs-priority | Follow the documentation in /RELEASE.md to Release v1.1.1
/remove-kind bug
/kind feature | 1.0 | Release 1.1.1 - Follow the documentation in /RELEASE.md to Release v1.1.1
/remove-kind bug
/kind feature | non_usab | release follow the documentation in release md to release remove kind bug kind feature | 0 |
95,650 | 3,954,711,183 | IssuesEvent | 2016-04-29 18:03:01 | Automattic/mongoose | https://api.github.com/repos/Automattic/mongoose | closed | MongoDB error when adding the async cursor option to aggregate query | priority | When adding the `async` cursor option I get the following error:
```
MongoError: cursor object can't contain fields other than batchSize
```
The (simplified) query:
```Javascript
var pipeline = [
{ $lookup: {
from: "interactions",
localField: "_id",
foreignField: "message_id",
as: "interactions"
}},
{ $project: {
id: "$_id",
numberOfInteractions: { $size: "$interactions" }
}},
{ $match: {
numberOfInteractions: { $eq: 0 }
}}
];
var promise = Message
.aggregate(pipeline)
.allowDiskUse(true)
.cursor({ batchSize: 2500, async: true })
.exec();
```
If I make this modification the error goes away:
```diff
diff --git a/lib/aggregate.js b/lib/aggregate.js
index fd2c2fc..ad76bd6 100644
--- a/lib/aggregate.js
+++ b/lib/aggregate.js
@@ -499,6 +499,7 @@ Aggregate.prototype.exec = function(callback) {
if (this.options && this.options.cursor) {
if (this.options.cursor.async) {
+ delete this.options.cursor.async;
return new Promise.ES6(function(resolve) {
if (!_this._model.collection.buffer) {
process.nextTick(function() {
```
My setup:
```
NodeJS 4.2.4
MongoDB version 3.2.5
Mongoose 4.4.13
``` | 1.0 | MongoDB error when adding the async cursor option to aggregate query - When adding the `async` cursor option I get the following error:
```
MongoError: cursor object can't contain fields other than batchSize
```
The (simplified) query:
```Javascript
var pipeline = [
{ $lookup: {
from: "interactions",
localField: "_id",
foreignField: "message_id",
as: "interactions"
}},
{ $project: {
id: "$_id",
numberOfInteractions: { $size: "$interactions" }
}},
{ $match: {
numberOfInteractions: { $eq: 0 }
}}
];
var promise = Message
.aggregate(pipeline)
.allowDiskUse(true)
.cursor({ batchSize: 2500, async: true })
.exec();
```
If I make this modification the error goes away:
```diff
diff --git a/lib/aggregate.js b/lib/aggregate.js
index fd2c2fc..ad76bd6 100644
--- a/lib/aggregate.js
+++ b/lib/aggregate.js
@@ -499,6 +499,7 @@ Aggregate.prototype.exec = function(callback) {
if (this.options && this.options.cursor) {
if (this.options.cursor.async) {
+ delete this.options.cursor.async;
return new Promise.ES6(function(resolve) {
if (!_this._model.collection.buffer) {
process.nextTick(function() {
```
My setup:
```
NodeJS 4.2.4
MongoDB version 3.2.5
Mongoose 4.4.13
``` | non_usab | mongodb error when adding the async cursor option to aggregate query when adding the async cursor option i get the following error mongoerror cursor object can t contain fields other than batchsize the simplified query javascript var pipeline lookup from interactions localfield id foreignfield message id as interactions project id id numberofinteractions size interactions match numberofinteractions eq var promise message aggregate pipeline allowdiskuse true cursor batchsize async true exec if i make this modification the error goes away diff diff git a lib aggregate js b lib aggregate js index a lib aggregate js b lib aggregate js aggregate prototype exec function callback if this options this options cursor if this options cursor async delete this options cursor async return new promise function resolve if this model collection buffer process nexttick function my setup nodejs mongodb version mongoose | 0 |
9,482 | 6,320,671,358 | IssuesEvent | 2017-07-25 02:40:23 | upspin/upspin | https://api.github.com/repos/upspin/upspin | closed | doc: stress the importance of remembering secret seeds | usability | @awly [commented](https://github.com/upspin/upspin/issues/301#issuecomment-284032442) that:
> Some users (myself included) will only backup their keys and will miss/forget to write down the secret seed. It's not stressed enough in the docs.
We should perhaps be over-the-top in prompting users to write these strings down. | True | doc: stress the importance of remembering secret seeds - @awly [commented](https://github.com/upspin/upspin/issues/301#issuecomment-284032442) that:
> Some users (myself included) will only backup their keys and will miss/forget to write down the secret seed. It's not stressed enough in the docs.
We should perhaps be over-the-top in prompting users to write these strings down. | usab | doc stress the importance of remembering secret seeds awly that some users myself included will only backup their keys and will miss forget to write down the secret seed it s not stressed enough in the docs we should perhaps be over the top in prompting users to write these strings down | 1 |
177,652 | 13,734,791,774 | IssuesEvent | 2020-10-05 09:12:35 | prisma/prisma-engines | https://api.github.com/repos/prisma/prisma-engines | closed | Implement a `debugPanic` RPC in introspection engine | engines/introspection engine kind/feature team/engines topic: testing | Like in migrate engine :)
It's a blocker for https://github.com/prisma/prisma/issues/3788 | 1.0 | Implement a `debugPanic` RPC in introspection engine - Like in migrate engine :)
It's a blocker for https://github.com/prisma/prisma/issues/3788 | non_usab | implement a debugpanic rpc in introspection engine like in migrate engine it s a blocker for | 0 |
19,610 | 14,333,155,162 | IssuesEvent | 2020-11-27 04:56:54 | ClickHouse/ClickHouse | https://api.github.com/repos/ClickHouse/ClickHouse | opened | ReplaceMerge Tree | usability | Hi Team,
I have mysql db and i have port to CH by cron job with ReplcaeMerge Tree.
if mysql row any column change with int/float same will be merge into same row in CH.
incase change in string column mysql. IN CH same primary key duplicate row will create.
Please any clue to solve this one issue.
| True | ReplaceMerge Tree - Hi Team,
I have mysql db and i have port to CH by cron job with ReplcaeMerge Tree.
if mysql row any column change with int/float same will be merge into same row in CH.
incase change in string column mysql. IN CH same primary key duplicate row will create.
Please any clue to solve this one issue.
| usab | replacemerge tree hi team i have mysql db and i have port to ch by cron job with replcaemerge tree if mysql row any column change with int float same will be merge into same row in ch incase change in string column mysql in ch same primary key duplicate row will create please any clue to solve this one issue | 1 |
17,058 | 11,613,396,488 | IssuesEvent | 2020-02-26 10:39:10 | virtualsatellite/VirtualSatellite4-Core | https://api.github.com/repos/virtualsatellite/VirtualSatellite4-Core | closed | Write developer manual | comfort/usability concept IDE quality wontfix | Same as the user manual, we need a developer manual. The manual should focus on using our Virtual Satellite 4 IDE to write your own concept. The manual does not cover general Virtual Satellite 4 development. | True | Write developer manual - Same as the user manual, we need a developer manual. The manual should focus on using our Virtual Satellite 4 IDE to write your own concept. The manual does not cover general Virtual Satellite 4 development. | usab | write developer manual same as the user manual we need a developer manual the manual should focus on using our virtual satellite ide to write your own concept the manual does not cover general virtual satellite development | 1 |
19,862 | 14,672,760,253 | IssuesEvent | 2020-12-30 11:24:14 | WordPress/gutenberg | https://api.github.com/repos/WordPress/gutenberg | closed | Sidebar doesn't appear when selecting a block inside a Reusable Block | Needs Dev [Feature] Reusable Blocks [Type] Bug | **Describe the bug**
Before the update, when you select a block inside the reusable block, it's settings would show in the sidebar under the "Block" tab. Now the tab is empty. This issue isn't there is a block isn't reusable, but a regular block.
**To reproduce**
Steps to reproduce the behavior:
1. Create 2 group blocks with paragraphs in them
2. Make one block reusable.
3. Select block inside regular group and see the settings of the block in the sidebar.
4. Click "edit" on the reusable group.
5. Select the paragraph block
6. See empty sidebar on the right or reusable group settings (don't know on what this depends, but it's either way and isn't consistent).
**Expected behavior**
The inner block of the reusable block have settings on the right sidebar when selected
**Screenshots**
[block settings in a simple group](http://i.imgur.com/h8kaVu4.png)
[block settings in a reusable group](http://i.imgur.com/W6zZtbY.png)
[block settings in a reusable group v2](http://i.imgur.com/ne6tZlT.png)
**Desktop (please complete the following information):**
- OS: Ubuntu 18.04
- Browser: Chrome 78
- Version : WP 5.3
| True | Sidebar doesn't appear when selecting a block inside a Reusable Block - **Describe the bug**
Before the update, when you select a block inside the reusable block, it's settings would show in the sidebar under the "Block" tab. Now the tab is empty. This issue isn't there is a block isn't reusable, but a regular block.
**To reproduce**
Steps to reproduce the behavior:
1. Create 2 group blocks with paragraphs in them
2. Make one block reusable.
3. Select block inside regular group and see the settings of the block in the sidebar.
4. Click "edit" on the reusable group.
5. Select the paragraph block
6. See empty sidebar on the right or reusable group settings (don't know on what this depends, but it's either way and isn't consistent).
**Expected behavior**
The inner block of the reusable block have settings on the right sidebar when selected
**Screenshots**
[block settings in a simple group](http://i.imgur.com/h8kaVu4.png)
[block settings in a reusable group](http://i.imgur.com/W6zZtbY.png)
[block settings in a reusable group v2](http://i.imgur.com/ne6tZlT.png)
**Desktop (please complete the following information):**
- OS: Ubuntu 18.04
- Browser: Chrome 78
- Version : WP 5.3
| usab | sidebar doesn t appear when selecting a block inside a reusable block describe the bug before the update when you select a block inside the reusable block it s settings would show in the sidebar under the block tab now the tab is empty this issue isn t there is a block isn t reusable but a regular block to reproduce steps to reproduce the behavior create group blocks with paragraphs in them make one block reusable select block inside regular group and see the settings of the block in the sidebar click edit on the reusable group select the paragraph block see empty sidebar on the right or reusable group settings don t know on what this depends but it s either way and isn t consistent expected behavior the inner block of the reusable block have settings on the right sidebar when selected screenshots desktop please complete the following information os ubuntu browser chrome version wp | 1 |
202,873 | 7,055,877,940 | IssuesEvent | 2018-01-04 10:17:48 | steemit/hivemind | https://api.github.com/repos/steemit/hivemind | closed | use is_valid flag for community posts | priority/med | Provides more flexibility in how we interpret data, and leaves possibilities open for UI and reports.
It doesn't make sense to force-override the community field for comments, since they would not be accessible anyway. They should still be part of the tree, just flagged automatically.
For root posts, it's not yet clear which is the ideal approach. | 1.0 | use is_valid flag for community posts - Provides more flexibility in how we interpret data, and leaves possibilities open for UI and reports.
It doesn't make sense to force-override the community field for comments, since they would not be accessible anyway. They should still be part of the tree, just flagged automatically.
For root posts, it's not yet clear which is the ideal approach. | non_usab | use is valid flag for community posts provides more flexibility in how we interpret data and leaves possibilities open for ui and reports it doesn t make sense to force override the community field for comments since they would not be accessible anyway they should still be part of the tree just flagged automatically for root posts it s not yet clear which is the ideal approach | 0 |
63,971 | 26,564,225,312 | IssuesEvent | 2023-01-20 18:32:04 | cityofaustin/atd-data-tech | https://api.github.com/repos/cityofaustin/atd-data-tech | closed | Finalize ATD submissions for APWA accreditation - Chapter 16 ROW Management (7 Practices) | Service: Data Science Project: APWA Accreditation | ### Tasks for each Practice
- [x] Do a final review of the Practice sheet and corresponding EVIDENCE folder using the checklist below
- [x] Communicate final gaps / questions to the Lead
- [x] Support Leads to ensure everything is finalized by **Jan 30th** to submit to PWD (but PWD said we can submit chapter by chapter if we don't have everything quite done by then)
### Final checklist for each Practice
1. Does the Agency Compliance statement match the Practice requirement (blue statement)? Is it specific, succinct, and easy to follow? (acronyms should be defined; vague, general statements are not good)
2. Are naming and formatting standards used? (evidence number, file names, wording, etc.)
3. Is each item of evidence listed in the Documentation/Directives table linked if possible?
4. Is there a PDF file saved for each item of evidence listed in the Documentation/Directives table?
5. Is each PDF file specific, highlighting or only including the info related to the specific Practice requirement? (entire manuals with lots of pages is not good - it should only include what's relevant; highlight exact sentences and/or headings when possible)
6. Are there any remaining comments / unanswered questions from the executive review guide?
### [Chapter 16 ROW Management (7 Practices)](https://cityofaustin.sharepoint.com/sites/ATD_APWA_Accreditation/Lists/ATD%20APWA%20Progress%20Tracker/AllItems.aspx?FilterField1=field%5F4&FilterValue1=16%20%2D%20ROW%20Management&FilterType1=Choice&viewid=db3efeaa%2D5db2%2D4df4%2D99cb%2Df1da454529cb)
- [x] [16.01](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B1E8089AA-0B7D-459B-9322-77E041BBFBD9%7D&file=ATD%2016.1%20Permit%20Issuance.docx&action=default&mobileredirect=true) Permit Issuance
- [x] [16.02](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B1758B879-B39C-45A8-B4C1-60200E05E847%7D&file=ATD%2016.2%20Permitting%20Responsibilitty.docx&action=default&mobileredirect=true) Permitting Responsibility
- [x] [16.03](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B904701F1-5226-431F-8879-44C855A38C08%7D&file=ATD%2016.3%20Codes%20and%20Permits%20Information.docx&action=default&mobileredirect=true) Codes and Permits Information
- [x] [16.04](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7BBA5726D4-41BD-41C7-9F61-17BB0B495312%7D&file=ATD%2016.4%20Permit%20Process.docx&action=default&mobileredirect=true) Permit Process
- [x] [16.05](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B64B58B60-A6C5-4DCD-854F-82439359D517%7D&file=ATD%2016.5%20Permit%20Inspection.docx&action=default&mobileredirect=true) Permit Inspection
- [x] [16.06](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B99E0AF59-6D0A-45A3-87CF-272234681437%7D&file=ATD%2016.6%20One-Call%20Center%20Coordination.docx&action=default&mobileredirect=true) One-Call Center Coordination
- [x] [16.07](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7BD53A5157-A585-44CC-BBD8-68CECB4D73E4%7D&file=ATD%2016.7%20Utility%20Marking%20Guidelines%20and%20Color%20Code.docx&action=default&mobileredirect=true) Utility Marking Guidelines and Color Code | 1.0 | Finalize ATD submissions for APWA accreditation - Chapter 16 ROW Management (7 Practices) - ### Tasks for each Practice
- [x] Do a final review of the Practice sheet and corresponding EVIDENCE folder using the checklist below
- [x] Communicate final gaps / questions to the Lead
- [x] Support Leads to ensure everything is finalized by **Jan 30th** to submit to PWD (but PWD said we can submit chapter by chapter if we don't have everything quite done by then)
### Final checklist for each Practice
1. Does the Agency Compliance statement match the Practice requirement (blue statement)? Is it specific, succinct, and easy to follow? (acronyms should be defined; vague, general statements are not good)
2. Are naming and formatting standards used? (evidence number, file names, wording, etc.)
3. Is each item of evidence listed in the Documentation/Directives table linked if possible?
4. Is there a PDF file saved for each item of evidence listed in the Documentation/Directives table?
5. Is each PDF file specific, highlighting or only including the info related to the specific Practice requirement? (entire manuals with lots of pages is not good - it should only include what's relevant; highlight exact sentences and/or headings when possible)
6. Are there any remaining comments / unanswered questions from the executive review guide?
### [Chapter 16 ROW Management (7 Practices)](https://cityofaustin.sharepoint.com/sites/ATD_APWA_Accreditation/Lists/ATD%20APWA%20Progress%20Tracker/AllItems.aspx?FilterField1=field%5F4&FilterValue1=16%20%2D%20ROW%20Management&FilterType1=Choice&viewid=db3efeaa%2D5db2%2D4df4%2D99cb%2Df1da454529cb)
- [x] [16.01](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B1E8089AA-0B7D-459B-9322-77E041BBFBD9%7D&file=ATD%2016.1%20Permit%20Issuance.docx&action=default&mobileredirect=true) Permit Issuance
- [x] [16.02](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B1758B879-B39C-45A8-B4C1-60200E05E847%7D&file=ATD%2016.2%20Permitting%20Responsibilitty.docx&action=default&mobileredirect=true) Permitting Responsibility
- [x] [16.03](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B904701F1-5226-431F-8879-44C855A38C08%7D&file=ATD%2016.3%20Codes%20and%20Permits%20Information.docx&action=default&mobileredirect=true) Codes and Permits Information
- [x] [16.04](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7BBA5726D4-41BD-41C7-9F61-17BB0B495312%7D&file=ATD%2016.4%20Permit%20Process.docx&action=default&mobileredirect=true) Permit Process
- [x] [16.05](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B64B58B60-A6C5-4DCD-854F-82439359D517%7D&file=ATD%2016.5%20Permit%20Inspection.docx&action=default&mobileredirect=true) Permit Inspection
- [x] [16.06](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7B99E0AF59-6D0A-45A3-87CF-272234681437%7D&file=ATD%2016.6%20One-Call%20Center%20Coordination.docx&action=default&mobileredirect=true) One-Call Center Coordination
- [x] [16.07](https://cityofaustin.sharepoint.com/:w:/r/sites/ATD_APWA_Accreditation/_layouts/15/Doc.aspx?sourcedoc=%7BD53A5157-A585-44CC-BBD8-68CECB4D73E4%7D&file=ATD%2016.7%20Utility%20Marking%20Guidelines%20and%20Color%20Code.docx&action=default&mobileredirect=true) Utility Marking Guidelines and Color Code | non_usab | finalize atd submissions for apwa accreditation chapter row management practices tasks for each practice do a final review of the practice sheet and corresponding evidence folder using the checklist below communicate final gaps questions to the lead support leads to ensure everything is finalized by jan to submit to pwd but pwd said we can submit chapter by chapter if we don t have everything quite done by then final checklist for each practice does the agency compliance statement match the practice requirement blue statement is it specific succinct and easy to follow acronyms should be defined vague general statements are not good are naming and formatting standards used evidence number file names wording etc is each item of evidence listed in the documentation directives table linked if possible is there a pdf file saved for each item of evidence listed in the documentation directives table is each pdf file specific highlighting or only including the info related to the specific practice requirement entire manuals with lots of pages is not good it should only include what s relevant highlight exact sentences and or headings when possible are there any remaining comments unanswered questions from the executive review guide permit issuance permitting responsibility codes and permits information permit process permit inspection one call center coordination utility marking guidelines and color code | 0 |
17,994 | 12,473,669,416 | IssuesEvent | 2020-05-29 08:15:49 | the-tale/the-tale | https://api.github.com/repos/the-tale/the-tale | closed | Управление данными пользователей (GDPR) | comp_general cont_community cont_usability est_medium type_story | Необходимо реализовать универсальный механизм обработки данных пользователей.
Пользователь должен иметь возможность:
- получить все данные о себе, которые есть в проекте
- удалить все данные о себе, которые есть в проекте
см. также gh-2311 и gh-737
Примерное описание архитектуры: https://tiendil.org/how-i-did-and-would-do-gdpr-support/ | True | Управление данными пользователей (GDPR) - Необходимо реализовать универсальный механизм обработки данных пользователей.
Пользователь должен иметь возможность:
- получить все данные о себе, которые есть в проекте
- удалить все данные о себе, которые есть в проекте
см. также gh-2311 и gh-737
Примерное описание архитектуры: https://tiendil.org/how-i-did-and-would-do-gdpr-support/ | usab | управление данными пользователей gdpr необходимо реализовать универсальный механизм обработки данных пользователей пользователь должен иметь возможность получить все данные о себе которые есть в проекте удалить все данные о себе которые есть в проекте см также gh и gh примерное описание архитектуры | 1 |
20,478 | 15,587,861,090 | IssuesEvent | 2021-03-18 05:10:20 | cpn-io/cpn-js | https://api.github.com/repos/cpn-io/cpn-js | reopened | Front-end: CTRL+Z, CTRL+Y for undo/redo | usability issue | Users expect that CTRL+Z triggers undo, CTRL+Y triggers redo.
Suggested general solution: provide file/class that we (as developers) can use to set up key-bindings for various UI actions (not user-facing), this would allow us at TU/e to define key bindings for any UI action we would find relevant | True | Front-end: CTRL+Z, CTRL+Y for undo/redo - Users expect that CTRL+Z triggers undo, CTRL+Y triggers redo.
Suggested general solution: provide file/class that we (as developers) can use to set up key-bindings for various UI actions (not user-facing), this would allow us at TU/e to define key bindings for any UI action we would find relevant | usab | front end ctrl z ctrl y for undo redo users expect that ctrl z triggers undo ctrl y triggers redo suggested general solution provide file class that we as developers can use to set up key bindings for various ui actions not user facing this would allow us at tu e to define key bindings for any ui action we would find relevant | 1 |
5,673 | 5,872,510,527 | IssuesEvent | 2017-05-15 11:44:31 | vmware/docker-volume-vsphere | https://api.github.com/repos/vmware/docker-volume-vsphere | closed | Add NFS client lib to vendor | component/ci-infrastructure component/guest-plugin kind/Feature P1 | To mount NFS volumes we need an NFS library to get the mount protocol and NFS server mount done on the guest. This issue is to pull https://github.com/davecheney/nfs into the volume plugin repo. | 1.0 | Add NFS client lib to vendor - To mount NFS volumes we need an NFS library to get the mount protocol and NFS server mount done on the guest. This issue is to pull https://github.com/davecheney/nfs into the volume plugin repo. | non_usab | add nfs client lib to vendor to mount nfs volumes we need an nfs library to get the mount protocol and nfs server mount done on the guest this issue is to pull into the volume plugin repo | 0 |
152,865 | 12,128,356,002 | IssuesEvent | 2020-04-22 20:21:22 | expressjs/express | https://api.github.com/repos/expressjs/express | closed | remove acceptance tests | tests | kind of noisy imo. most of the tests should be integrated into express's tests somehow. we should just move them into a `expressjs/examples` repo or something.
| 1.0 | remove acceptance tests - kind of noisy imo. most of the tests should be integrated into express's tests somehow. we should just move them into a `expressjs/examples` repo or something.
| non_usab | remove acceptance tests kind of noisy imo most of the tests should be integrated into express s tests somehow we should just move them into a expressjs examples repo or something | 0 |
395,310 | 27,065,083,853 | IssuesEvent | 2023-02-13 23:22:55 | monetr/monetr | https://api.github.com/repos/monetr/monetr | closed | bug(docs): Help `Note` does not expand/hide properly. | bug documentation good first issue | https://monetr.app/help/
The `Note` section on this page is meant to contain the text below it. But the text is always shown and the note collapsable is doing nothing.
Problem is here:
https://github.com/monetr/monetr/blob/9470a34de4277b9126f7b637214d679acb9f534a/docs/help/index.md?plain=1#L8-L11
---
The text below the `??? note` should be part of the collapsable. | 1.0 | bug(docs): Help `Note` does not expand/hide properly. - https://monetr.app/help/
The `Note` section on this page is meant to contain the text below it. But the text is always shown and the note collapsable is doing nothing.
Problem is here:
https://github.com/monetr/monetr/blob/9470a34de4277b9126f7b637214d679acb9f534a/docs/help/index.md?plain=1#L8-L11
---
The text below the `??? note` should be part of the collapsable. | non_usab | bug docs help note does not expand hide properly the note section on this page is meant to contain the text below it but the text is always shown and the note collapsable is doing nothing problem is here the text below the note should be part of the collapsable | 0 |
331,539 | 24,312,087,115 | IssuesEvent | 2022-09-30 00:07:53 | cloudflare/cloudflare-docs | https://api.github.com/repos/cloudflare/cloudflare-docs | closed | Content-Security-Policy for Cloudflare Turnstile | documentation content:new | ### Which Cloudflare product(s) does this pertain to?
Bots
### Subject Matter
Need CSP configuration manual for Cloudflare Turnstile
### Content Location
https://github.com/cloudflare/cloudflare-docs/blob/production/content/turnstile/get-started/client-side-rendering.md
### Additional information
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross-Site Scripting (XSS) and data injection attacks.
As of now I noticed Turnstile will load a script from `challenges.cloudflare.com` and embed an iframe pointing to the same domain, I wonder what other CSP rules I need to touch to ensure Turnstile operate properly. | 1.0 | Content-Security-Policy for Cloudflare Turnstile - ### Which Cloudflare product(s) does this pertain to?
Bots
### Subject Matter
Need CSP configuration manual for Cloudflare Turnstile
### Content Location
https://github.com/cloudflare/cloudflare-docs/blob/production/content/turnstile/get-started/client-side-rendering.md
### Additional information
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross-Site Scripting (XSS) and data injection attacks.
As of now I noticed Turnstile will load a script from `challenges.cloudflare.com` and embed an iframe pointing to the same domain, I wonder what other CSP rules I need to touch to ensure Turnstile operate properly. | non_usab | content security policy for cloudflare turnstile which cloudflare product s does this pertain to bots subject matter need csp configuration manual for cloudflare turnstile content location additional information content security policy csp is an added layer of security that helps to detect and mitigate certain types of attacks including cross site scripting xss and data injection attacks as of now i noticed turnstile will load a script from challenges cloudflare com and embed an iframe pointing to the same domain i wonder what other csp rules i need to touch to ensure turnstile operate properly | 0 |
37,652 | 18,715,538,262 | IssuesEvent | 2021-11-03 03:45:32 | AlgebraicJulia/Catlab.jl | https://api.github.com/repos/AlgebraicJulia/Catlab.jl | closed | Limits of free diagrams by conversion to free bipartite diagrams | performance | Limits of arbitrary diagrams in `FinSet` are currently evaluated by the naive product-then-filter algorithm, which is very inefficient. We should implement an alternative algorithm that reduces the free diagram to a free bipartite diagram having the same limit and then evaluate the latter using the specialized algorithms already implemented.
It would also be interesting to investigate more efficient strategies for taking the limit of arbitrary diagrams, but the above will be the most expedient route to reasonably performant conjunctive data migrations (#532). | True | Limits of free diagrams by conversion to free bipartite diagrams - Limits of arbitrary diagrams in `FinSet` are currently evaluated by the naive product-then-filter algorithm, which is very inefficient. We should implement an alternative algorithm that reduces the free diagram to a free bipartite diagram having the same limit and then evaluate the latter using the specialized algorithms already implemented.
It would also be interesting to investigate more efficient strategies for taking the limit of arbitrary diagrams, but the above will be the most expedient route to reasonably performant conjunctive data migrations (#532). | non_usab | limits of free diagrams by conversion to free bipartite diagrams limits of arbitrary diagrams in finset are currently evaluated by the naive product then filter algorithm which is very inefficient we should implement an alternative algorithm that reduces the free diagram to a free bipartite diagram having the same limit and then evaluate the latter using the specialized algorithms already implemented it would also be interesting to investigate more efficient strategies for taking the limit of arbitrary diagrams but the above will be the most expedient route to reasonably performant conjunctive data migrations | 0 |
17,797 | 12,343,084,750 | IssuesEvent | 2020-05-15 02:51:30 | gluster/glusterfs | https://api.github.com/repos/gluster/glusterfs | closed | RFE: Gluster Hot Spare | CB: disperse CB: glusterd FA: Usability & Supportability wontfix | In a Gluster arrangement of 12 drives in a 2 x (5+1) gives two layers of disks in a distributed dispersed array (similar to a JBOD of RAID5)
12 Bricks
dddddp + dddddp
d = data
p = parity
h = hotspare
In this setup, allows for upto two disks to fail (as long as they aren't both in the same dispersed array. Now this is pretty standard glustering :D
What I'd like to have is a "hot spare brick" somewhere in the gluster pool. So when a drive fails gluster can kick it out and use the "hot spare brick" to "rebuild" the gluster array automatically, without manual intervention.
So you'd end up with
13 Bricks
h dddddp + dddddp
Then seeing an alert that a brick has failed we can pull that brick/node and replace with a new one which would become the new "Hot Spare" | True | RFE: Gluster Hot Spare - In a Gluster arrangement of 12 drives in a 2 x (5+1) gives two layers of disks in a distributed dispersed array (similar to a JBOD of RAID5)
12 Bricks
dddddp + dddddp
d = data
p = parity
h = hotspare
In this setup, allows for upto two disks to fail (as long as they aren't both in the same dispersed array. Now this is pretty standard glustering :D
What I'd like to have is a "hot spare brick" somewhere in the gluster pool. So when a drive fails gluster can kick it out and use the "hot spare brick" to "rebuild" the gluster array automatically, without manual intervention.
So you'd end up with
13 Bricks
h dddddp + dddddp
Then seeing an alert that a brick has failed we can pull that brick/node and replace with a new one which would become the new "Hot Spare" | usab | rfe gluster hot spare in a gluster arrangement of drives in a x gives two layers of disks in a distributed dispersed array similar to a jbod of bricks dddddp dddddp d data p parity h hotspare in this setup allows for upto two disks to fail as long as they aren t both in the same dispersed array now this is pretty standard glustering d what i d like to have is a hot spare brick somewhere in the gluster pool so when a drive fails gluster can kick it out and use the hot spare brick to rebuild the gluster array automatically without manual intervention so you d end up with bricks h dddddp dddddp then seeing an alert that a brick has failed we can pull that brick node and replace with a new one which would become the new hot spare | 1 |
350,214 | 31,863,074,961 | IssuesEvent | 2023-09-15 12:23:42 | enonic/app-contentstudio | https://api.github.com/repos/enonic/app-contentstudio | closed | Add ui-tests for target path in notification message | Test | Update test to verify Locate target node in the grid after move #6764 | 1.0 | Add ui-tests for target path in notification message - Update test to verify Locate target node in the grid after move #6764 | non_usab | add ui tests for target path in notification message update test to verify locate target node in the grid after move | 0 |
19,289 | 13,781,562,147 | IssuesEvent | 2020-10-08 16:20:50 | ClickHouse/ClickHouse | https://api.github.com/repos/ClickHouse/ClickHouse | opened | Dynamically reload TLS certificates | usability | **Describe the issue**
We should be able to reload TLS certificates without restarting clickhouse.
relates to #14106 | True | Dynamically reload TLS certificates - **Describe the issue**
We should be able to reload TLS certificates without restarting clickhouse.
relates to #14106 | usab | dynamically reload tls certificates describe the issue we should be able to reload tls certificates without restarting clickhouse relates to | 1 |
266,663 | 23,252,526,920 | IssuesEvent | 2022-08-04 06:06:10 | vanlyfe/capstone | https://api.github.com/repos/vanlyfe/capstone | closed | implement auth.test.js unit tests | Backend Create unit tests | DESCRIPTION
As a backend developer, I want to have sufficient tests for my auth routes file so that I can ensure user dataflow is working well
A/C
- [ ] Test "POST /login"
- [ ] Test "Existing user can login to their account"
- [ ] Test "Throws unauthorized error when user provides wrong password"
- [ ] Test "Throws bad request error when user doesn't provide password"
- [ ] Test "Throws bad request error when user doesn't provide email"
- [ ] Test "Throws unauthorized error when user provides wrong email"
- [ ] Test "POST /register"
- [ ] Test "User can create a new account"
- [ ] Test "Throws bad request error when invalid credentials passed"
- [ ] Test "GET /me"
- [ ] Test "Authed user can access own profile"
- [ ] Test "Throws unauthorized error when anonymous user tries to access user account"
- [ ] Test "GET /:userId"
- [ ] Test "User can fetch a user's profile details by user id"
- [ ] Test "PUT "/:userId"
- [ ] Test "Authed user can update their own profile"
- [ ] Test "Throws forbidden error when authed user tries to update other user's profile"
- [ ] Test "Throws unauthorized error when anonymous user tries to update a profile"
- [ ] Test "DELETE "/:userId"
- [ ] Test "Authed user can delete their own account"
- [ ] Test "Throws forbidden error when authed user tries to delete other user's account"
- [ ] Test "Throws unauthorized error when anonymous user tries to delete a account"
DoD
All test cases are defined and running them displays results in console | 1.0 | implement auth.test.js unit tests - DESCRIPTION
As a backend developer, I want to have sufficient tests for my auth routes file so that I can ensure user dataflow is working well
A/C
- [ ] Test "POST /login"
- [ ] Test "Existing user can login to their account"
- [ ] Test "Throws unauthorized error when user provides wrong password"
- [ ] Test "Throws bad request error when user doesn't provide password"
- [ ] Test "Throws bad request error when user doesn't provide email"
- [ ] Test "Throws unauthorized error when user provides wrong email"
- [ ] Test "POST /register"
- [ ] Test "User can create a new account"
- [ ] Test "Throws bad request error when invalid credentials passed"
- [ ] Test "GET /me"
- [ ] Test "Authed user can access own profile"
- [ ] Test "Throws unauthorized error when anonymous user tries to access user account"
- [ ] Test "GET /:userId"
- [ ] Test "User can fetch a user's profile details by user id"
- [ ] Test "PUT "/:userId"
- [ ] Test "Authed user can update their own profile"
- [ ] Test "Throws forbidden error when authed user tries to update other user's profile"
- [ ] Test "Throws unauthorized error when anonymous user tries to update a profile"
- [ ] Test "DELETE "/:userId"
- [ ] Test "Authed user can delete their own account"
- [ ] Test "Throws forbidden error when authed user tries to delete other user's account"
- [ ] Test "Throws unauthorized error when anonymous user tries to delete a account"
DoD
All test cases are defined and running them displays results in console | non_usab | implement auth test js unit tests description as a backend developer i want to have sufficient tests for my auth routes file so that i can ensure user dataflow is working well a c test post login test existing user can login to their account test throws unauthorized error when user provides wrong password test throws bad request error when user doesn t provide password test throws bad request error when user doesn t provide email test throws unauthorized error when user provides wrong email test post register test user can create a new account test throws bad request error when invalid credentials passed test get me test authed user can access own profile test throws unauthorized error when anonymous user tries to access user account test get userid test user can fetch a user s profile details by user id test put userid test authed user can update their own profile test throws forbidden error when authed user tries to update other user s profile test throws unauthorized error when anonymous user tries to update a profile test delete userid test authed user can delete their own account test throws forbidden error when authed user tries to delete other user s account test throws unauthorized error when anonymous user tries to delete a account dod all test cases are defined and running them displays results in console | 0 |
24,264 | 23,575,790,989 | IssuesEvent | 2022-08-23 00:33:14 | ZcashFoundation/zebra | https://api.github.com/repos/ZcashFoundation/zebra | closed | Zebra should follow OS directory conventions better | C-bug A-rust A-devops C-enhancement P-Low :snowflake: I-usability | **Is your feature request related to a problem? Please describe.**
Zebra doesn't follow the config convention for any platform.
Zebra doesn't follow the cache convention for macOS and Windows.
**Describe the solution you'd like**
- [ ] use `directories-next` to find application-specific paths
- https://docs.rs/directories-next/2.0.0/directories_next/struct.ProjectDirs.html#method.cache_dir
- [ ] use `ProjectDirs::cache_dir` for caches
- [ ] use `ProjectDirs::config_dir` for configs
- [ ] update any deployment scripts that provide custom configs
- [ ] update the acceptance tests?
- [ ] update the relevant documentation
This is a breaking change for config and cache locations.
**Describe alternatives you've considered**
We could just not do this, and most people wouldn't notice. But some OSes (and automated tools) might do bad things with Zebra's configs or cache.
| True | Zebra should follow OS directory conventions better - **Is your feature request related to a problem? Please describe.**
Zebra doesn't follow the config convention for any platform.
Zebra doesn't follow the cache convention for macOS and Windows.
**Describe the solution you'd like**
- [ ] use `directories-next` to find application-specific paths
- https://docs.rs/directories-next/2.0.0/directories_next/struct.ProjectDirs.html#method.cache_dir
- [ ] use `ProjectDirs::cache_dir` for caches
- [ ] use `ProjectDirs::config_dir` for configs
- [ ] update any deployment scripts that provide custom configs
- [ ] update the acceptance tests?
- [ ] update the relevant documentation
This is a breaking change for config and cache locations.
**Describe alternatives you've considered**
We could just not do this, and most people wouldn't notice. But some OSes (and automated tools) might do bad things with Zebra's configs or cache.
| usab | zebra should follow os directory conventions better is your feature request related to a problem please describe zebra doesn t follow the config convention for any platform zebra doesn t follow the cache convention for macos and windows describe the solution you d like use directories next to find application specific paths use projectdirs cache dir for caches use projectdirs config dir for configs update any deployment scripts that provide custom configs update the acceptance tests update the relevant documentation this is a breaking change for config and cache locations describe alternatives you ve considered we could just not do this and most people wouldn t notice but some oses and automated tools might do bad things with zebra s configs or cache | 1 |
474 | 2,502,212,945 | IssuesEvent | 2015-01-09 05:21:45 | fossology/fossology | https://api.github.com/repos/fossology/fossology | opened | Can not upload files when enable SELinux on Rhel/Fedora system | Component: Rank Component: Tester Priority: Normal Status: New Tracker: Bug | ---
Author Name: **Dong Ma**
Original Redmine Issue: 5007, http://www.fossology.org/issues/5007
Original Date: 2013/05/30
Original Assignee: Dong Ma
---
If you enable SELinux on Rhel/Fedora system use:
```
setenforceforce 1
```
Will get this error and the files can not be uploaded:
Upload failed for file fossology-delagent-2.0.1-0.20120924190128.el6.i686.rpm: File upload failed. Error:126
| 1.0 | Can not upload files when enable SELinux on Rhel/Fedora system - ---
Author Name: **Dong Ma**
Original Redmine Issue: 5007, http://www.fossology.org/issues/5007
Original Date: 2013/05/30
Original Assignee: Dong Ma
---
If you enable SELinux on Rhel/Fedora system use:
```
setenforceforce 1
```
Will get this error and the files can not be uploaded:
Upload failed for file fossology-delagent-2.0.1-0.20120924190128.el6.i686.rpm: File upload failed. Error:126
| non_usab | can not upload files when enable selinux on rhel fedora system author name dong ma original redmine issue original date original assignee dong ma if you enable selinux on rhel fedora system use setenforceforce will get this error and the files can not be uploaded upload failed for file fossology delagent rpm file upload failed error | 0 |
4,991 | 3,898,973,921 | IssuesEvent | 2016-04-17 13:01:34 | lionheart/openradar-mirror | https://api.github.com/repos/lionheart/openradar-mirror | opened | 13949076: SLComposeViewController should optionally provide a UI for taking photos | classification:ui/usability reproducible:not applicable status:open | #### Description
A reasonably common way to share things on Facebook is for the user to share a URL augmented with a photograph the user has taken.
I would like SLComposeViewController to have a new property, BOOL allowsUserGeneratedPhoto. When this property is set to YES, and the SLComposeViewController is presented, there will be a new button on the SLComposeViewController that looks like a camera. Pressing this button will allow the user to take a photo or to choose one from their photo library. If they do this, the photo will be attached to that post.
If a photo is attached in this manner, it should be previewed as a thumbnail in the SLComposeViewController, and there should be a way to remove it again (by tapping it maybe?). When the SLComposeViewController is posted, the image should be uploaded to Facebook, and the image[0][user_generated] API property should be set to true (so that Facebook knows that this is a user generated image).
-
Product Version: 6.1
Created: 2013-05-21T14:35:07.014898
Originated: 2013-05-21T15:34:00
Open Radar Link: http://www.openradar.me/13949076 | True | 13949076: SLComposeViewController should optionally provide a UI for taking photos - #### Description
A reasonably common way to share things on Facebook is for the user to share a URL augmented with a photograph the user has taken.
I would like SLComposeViewController to have a new property, BOOL allowsUserGeneratedPhoto. When this property is set to YES, and the SLComposeViewController is presented, there will be a new button on the SLComposeViewController that looks like a camera. Pressing this button will allow the user to take a photo or to choose one from their photo library. If they do this, the photo will be attached to that post.
If a photo is attached in this manner, it should be previewed as a thumbnail in the SLComposeViewController, and there should be a way to remove it again (by tapping it maybe?). When the SLComposeViewController is posted, the image should be uploaded to Facebook, and the image[0][user_generated] API property should be set to true (so that Facebook knows that this is a user generated image).
-
Product Version: 6.1
Created: 2013-05-21T14:35:07.014898
Originated: 2013-05-21T15:34:00
Open Radar Link: http://www.openradar.me/13949076 | usab | slcomposeviewcontroller should optionally provide a ui for taking photos description a reasonably common way to share things on facebook is for the user to share a url augmented with a photograph the user has taken i would like slcomposeviewcontroller to have a new property bool allowsusergeneratedphoto when this property is set to yes and the slcomposeviewcontroller is presented there will be a new button on the slcomposeviewcontroller that looks like a camera pressing this button will allow the user to take a photo or to choose one from their photo library if they do this the photo will be attached to that post if a photo is attached in this manner it should be previewed as a thumbnail in the slcomposeviewcontroller and there should be a way to remove it again by tapping it maybe when the slcomposeviewcontroller is posted the image should be uploaded to facebook and the image api property should be set to true so that facebook knows that this is a user generated image product version created originated open radar link | 1 |
7,134 | 4,787,521,439 | IssuesEvent | 2016-10-30 02:06:28 | s-rah/onionscan | https://api.github.com/repos/s-rah/onionscan | closed | Update README.md / Docs for Onionscan 0.2 | usabilty | OnionScan 0.2 will add a large number of scans and features. These need to be documented somewhere - main features in the README and more detailed usage examples somewhere new (to be defined...maybe readthedocs or something) | True | Update README.md / Docs for Onionscan 0.2 - OnionScan 0.2 will add a large number of scans and features. These need to be documented somewhere - main features in the README and more detailed usage examples somewhere new (to be defined...maybe readthedocs or something) | usab | update readme md docs for onionscan onionscan will add a large number of scans and features these need to be documented somewhere main features in the readme and more detailed usage examples somewhere new to be defined maybe readthedocs or something | 1 |
178,454 | 13,780,579,508 | IssuesEvent | 2020-10-08 15:05:32 | rootzoll/raspiblitz | https://api.github.com/repos/rootzoll/raspiblitz | closed | error code: -28 error message: Loading block index... | final testing | I get this on every reboot and and I've seen a number of other people get this on 1.6. Seems like it is giving up to early or something, doesn't give enough time to let the block index load.
```
*****************************************
* The bitcoind service is not running.
*****************************************
If you just started some config/setup, this might be OK.
More Error Detail:
error code: -28 error message: Loading block index...
POSSIBLE OPTIONS:
-> Use command 'repair' and then choose 'DELETE-INDEX' to try rebuilding transaction index.
-> Use command 'repair' and then choose 'RESET-CHAIN' to try downloading new blockchain.
-> Use command 'debug' for more log output you can use for getting support.
-> Use command 'menu' to open main menu.
-> Have you tried to turn it off and on again? Use command 'restart'
bitcoin error: error code: -28
error message:
Loading block index...
``` | 1.0 | error code: -28 error message: Loading block index... - I get this on every reboot and and I've seen a number of other people get this on 1.6. Seems like it is giving up to early or something, doesn't give enough time to let the block index load.
```
*****************************************
* The bitcoind service is not running.
*****************************************
If you just started some config/setup, this might be OK.
More Error Detail:
error code: -28 error message: Loading block index...
POSSIBLE OPTIONS:
-> Use command 'repair' and then choose 'DELETE-INDEX' to try rebuilding transaction index.
-> Use command 'repair' and then choose 'RESET-CHAIN' to try downloading new blockchain.
-> Use command 'debug' for more log output you can use for getting support.
-> Use command 'menu' to open main menu.
-> Have you tried to turn it off and on again? Use command 'restart'
bitcoin error: error code: -28
error message:
Loading block index...
``` | non_usab | error code error message loading block index i get this on every reboot and and i ve seen a number of other people get this on seems like it is giving up to early or something doesn t give enough time to let the block index load the bitcoind service is not running if you just started some config setup this might be ok more error detail error code error message loading block index possible options use command repair and then choose delete index to try rebuilding transaction index use command repair and then choose reset chain to try downloading new blockchain use command debug for more log output you can use for getting support use command menu to open main menu have you tried to turn it off and on again use command restart bitcoin error error code error message loading block index | 0 |
13,141 | 8,304,819,765 | IssuesEvent | 2018-09-21 23:05:49 | proudcity/wp-proudcity | https://api.github.com/repos/proudcity/wp-proudcity | opened | Link accessibility review | accessibility frontend usability | Per "relying solely on color for links," we should review link styles, particularly the general ones in body text.
Reviewing link accessibility and found this from 18F:
>Links that only rely on color also fail this requirement. Links must be distinguished by more than just color (hue). Links can be distinguished by underlines, symbols, context (in a menu for example), or lightness. If the contrast between the surrounding text and a link is greater than 3:1 it is acceptable. Also note, the link text itself still needs to have a contrast ratio of 4.5:1 or greater with the background. More information about link color dependence.
And W3C: https://www.w3.org/TR/2016/NOTE-WCAG20-TECHS-20161007/F73 | True | Link accessibility review - Per "relying solely on color for links," we should review link styles, particularly the general ones in body text.
Reviewing link accessibility and found this from 18F:
>Links that only rely on color also fail this requirement. Links must be distinguished by more than just color (hue). Links can be distinguished by underlines, symbols, context (in a menu for example), or lightness. If the contrast between the surrounding text and a link is greater than 3:1 it is acceptable. Also note, the link text itself still needs to have a contrast ratio of 4.5:1 or greater with the background. More information about link color dependence.
And W3C: https://www.w3.org/TR/2016/NOTE-WCAG20-TECHS-20161007/F73 | usab | link accessibility review per relying solely on color for links we should review link styles particularly the general ones in body text reviewing link accessibility and found this from links that only rely on color also fail this requirement links must be distinguished by more than just color hue links can be distinguished by underlines symbols context in a menu for example or lightness if the contrast between the surrounding text and a link is greater than it is acceptable also note the link text itself still needs to have a contrast ratio of or greater with the background more information about link color dependence and | 1 |
757,809 | 26,530,165,833 | IssuesEvent | 2023-01-19 11:52:41 | EinStealth/EinStealth | https://api.github.com/repos/EinStealth/EinStealth | opened | UI elements側で計算の呼び出ししてる部分を直す | Mobile Priority: High | # 概要
2重LiveData問題で悩んでたけど、そもそもUI elementsで監視する必要ない。
ViewModelで計算とか判定とか呼び出しちゃって、その結果だけViewに通知すればいい。
そうすれば、Viewは何も考えず結果に応じてUIを変えるだけで良くなる
# 関連するissue
<!-- 関連するissueがあればここに書いてね -->
<!-- ex. #{issue番号} -->
# 参考
<!-- 参考資料などはここに書いてね -->
# チェックリスト
- [ ] 優先度tagを設定しましたか?
| 1.0 | UI elements側で計算の呼び出ししてる部分を直す - # 概要
2重LiveData問題で悩んでたけど、そもそもUI elementsで監視する必要ない。
ViewModelで計算とか判定とか呼び出しちゃって、その結果だけViewに通知すればいい。
そうすれば、Viewは何も考えず結果に応じてUIを変えるだけで良くなる
# 関連するissue
<!-- 関連するissueがあればここに書いてね -->
<!-- ex. #{issue番号} -->
# 参考
<!-- 参考資料などはここに書いてね -->
# チェックリスト
- [ ] 優先度tagを設定しましたか?
| non_usab | ui elements側で計算の呼び出ししてる部分を直す 概要 、そもそもui elementsで監視する必要ない。 viewmodelで計算とか判定とか呼び出しちゃって、その結果だけviewに通知すればいい。 そうすれば、viewは何も考えず結果に応じてuiを変えるだけで良くなる 関連するissue 参考 チェックリスト 優先度tagを設定しましたか? | 0 |
234,887 | 25,897,947,766 | IssuesEvent | 2022-12-15 01:07:09 | Trinadh465/linux-3.0.35 | https://api.github.com/repos/Trinadh465/linux-3.0.35 | opened | CVE-2013-2635 (Low) detected in linux-stable-rtv3.8.6 | security vulnerability | ## CVE-2013-2635 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Trinadh465/linux-3.0.35/commit/bc642faf5ff07c31ee8f8788b7523e6fa3638231">bc642faf5ff07c31ee8f8788b7523e6fa3638231</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/core/rtnetlink.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
<p>Publish Date: 2013-03-22
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-2635>CVE-2013-2635</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>2.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2013-2635">https://nvd.nist.gov/vuln/detail/CVE-2013-2635</a></p>
<p>Release Date: 2013-03-22</p>
<p>Fix Resolution: 3.8.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2013-2635 (Low) detected in linux-stable-rtv3.8.6 - ## CVE-2013-2635 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Trinadh465/linux-3.0.35/commit/bc642faf5ff07c31ee8f8788b7523e6fa3638231">bc642faf5ff07c31ee8f8788b7523e6fa3638231</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/core/rtnetlink.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
<p>Publish Date: 2013-03-22
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-2635>CVE-2013-2635</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>2.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2013-2635">https://nvd.nist.gov/vuln/detail/CVE-2013-2635</a></p>
<p>Release Date: 2013-03-22</p>
<p>Fix Resolution: 3.8.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_usab | cve low detected in linux stable cve low severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files net core rtnetlink c vulnerability details the rtnl fill ifinfo function in net core rtnetlink c in the linux kernel before does not initialize a certain structure member which allows local users to obtain sensitive information from kernel stack memory via a crafted application publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
329,852 | 28,311,479,583 | IssuesEvent | 2023-04-10 15:47:37 | brave/brave-browser | https://api.github.com/repos/brave/brave-browser | opened | Test failure: P3ARotationSchedulerTest.ConstellationRotation | QA/No release-notes/exclude ci-concern bot/type/test bot/arch/x64 bot/channel/nightly bot/platform/macos bot/branch/v1.52 | Greetings human!
Bad news. `P3ARotationSchedulerTest.ConstellationRotation` [failed on macos x64 nightly v1.52.31](https://ci.brave.com/job/brave-browser-build-macos-x64/6279/testReport/junit/(root)/P3ARotationSchedulerTest/test_unit___ConstellationRotation).
<details>
<summary>Stack trace</summary>
```
[ RUN ] P3ARotationSchedulerTest.ConstellationRotation
../../brave/components/p3a/rotation_scheduler_unittest.cc:69: Failure
Expected equality of these values:
constellation_rotation_count_
Which is: 1
0u
Which is: 0
Stack trace:
0 brave_unit_tests 0x00000001046fd4f0 __rust_probestack + 16078288
[ FAILED ] P3ARotationSchedulerTest.ConstellationRotation (20 ms)
[ FAILED ] P3ARotationSchedulerTest.ConstellationRotation
```
</details>
<details>
<summary>Previous issues</summary>
* #29571
[Find all](https://github.com/brave/brave-browser/issues?q=type%3Aissue+label%3Abot%2Ftype%2Ftest+in%3Atitle+%22Test+failure%3A+P3ARotationSchedulerTest.ConstellationRotation%22)
</details> | 1.0 | Test failure: P3ARotationSchedulerTest.ConstellationRotation - Greetings human!
Bad news. `P3ARotationSchedulerTest.ConstellationRotation` [failed on macos x64 nightly v1.52.31](https://ci.brave.com/job/brave-browser-build-macos-x64/6279/testReport/junit/(root)/P3ARotationSchedulerTest/test_unit___ConstellationRotation).
<details>
<summary>Stack trace</summary>
```
[ RUN ] P3ARotationSchedulerTest.ConstellationRotation
../../brave/components/p3a/rotation_scheduler_unittest.cc:69: Failure
Expected equality of these values:
constellation_rotation_count_
Which is: 1
0u
Which is: 0
Stack trace:
0 brave_unit_tests 0x00000001046fd4f0 __rust_probestack + 16078288
[ FAILED ] P3ARotationSchedulerTest.ConstellationRotation (20 ms)
[ FAILED ] P3ARotationSchedulerTest.ConstellationRotation
```
</details>
<details>
<summary>Previous issues</summary>
* #29571
[Find all](https://github.com/brave/brave-browser/issues?q=type%3Aissue+label%3Abot%2Ftype%2Ftest+in%3Atitle+%22Test+failure%3A+P3ARotationSchedulerTest.ConstellationRotation%22)
</details> | non_usab | test failure constellationrotation greetings human bad news constellationrotation stack trace constellationrotation brave components rotation scheduler unittest cc failure expected equality of these values constellation rotation count which is which is stack trace brave unit tests rust probestack constellationrotation ms constellationrotation previous issues | 0 |
308,508 | 9,440,137,667 | IssuesEvent | 2019-04-14 15:44:29 | openfaas/faas | https://api.github.com/repos/openfaas/faas | closed | Proposal: Secrets Integration for OpenFaas with Vault | priority/middle proposal | HashiCorp Vault is an open source tool for managing and controlling access to tokens, passwords, certificates. Integrating OpenFaas with Vault would allow a generic backend which would enable the injection of secrets into OpenFaas. In addition to secrets Vault could be used to generate and and manage x.509 certificates for jobs again enabling transparant cross platform TLS.
## Expected Behaviour
**Secrets:**
When a user creates a new function in OpenFaaS they should be able to provide key/value pairs which would be encrypted and stored in Vault. When a job executes this data would be retrieved from Vault and injected into the job for it to use.
**TLS:**
When a job is created it would contact vault to obtain a x.509 certificate securing it with TLS. The gateway would then communicate with the service using TLS rather than plain HTTP. In addition to this the proxy could use mutual TLS with a client side certificate to ensure that the job it is talking to is intact the correct job to mitigate man in the middle attacks.
## Possible Solution
The internals from consul template [https://github.com/hashicorp/consul-template](https://github.com/hashicorp/consul-template) could be embedded into the gateway to ensure that when a secret expires (all secrets have a TTL) or if the secret is updated it would be able to update the function. This would reduce the load on the Vault server and making a call every-time a function executes. Nomad and Kubernetes both have this capability when you integrate Vault and start a Job or Pod however by placing this integration into the proxy it gives agnosticism to the underlying scheduler and allows seamless integration with Swarm, Rancher, Mesos, etc.
## Context
Having a central capability for secrets management and encryption functions allows functions to remain light and the author to concentrate on functionality not security. Enterprises already trust Vault and implementing it would allow them to leverage existing infrastructure. TLS can be complicated to set up and get right however leveraging Vaults CA capability allows easy creation and management for x.509 certificates.
| 1.0 | Proposal: Secrets Integration for OpenFaas with Vault - HashiCorp Vault is an open source tool for managing and controlling access to tokens, passwords, certificates. Integrating OpenFaas with Vault would allow a generic backend which would enable the injection of secrets into OpenFaas. In addition to secrets Vault could be used to generate and and manage x.509 certificates for jobs again enabling transparant cross platform TLS.
## Expected Behaviour
**Secrets:**
When a user creates a new function in OpenFaaS they should be able to provide key/value pairs which would be encrypted and stored in Vault. When a job executes this data would be retrieved from Vault and injected into the job for it to use.
**TLS:**
When a job is created it would contact vault to obtain a x.509 certificate securing it with TLS. The gateway would then communicate with the service using TLS rather than plain HTTP. In addition to this the proxy could use mutual TLS with a client side certificate to ensure that the job it is talking to is intact the correct job to mitigate man in the middle attacks.
## Possible Solution
The internals from consul template [https://github.com/hashicorp/consul-template](https://github.com/hashicorp/consul-template) could be embedded into the gateway to ensure that when a secret expires (all secrets have a TTL) or if the secret is updated it would be able to update the function. This would reduce the load on the Vault server and making a call every-time a function executes. Nomad and Kubernetes both have this capability when you integrate Vault and start a Job or Pod however by placing this integration into the proxy it gives agnosticism to the underlying scheduler and allows seamless integration with Swarm, Rancher, Mesos, etc.
## Context
Having a central capability for secrets management and encryption functions allows functions to remain light and the author to concentrate on functionality not security. Enterprises already trust Vault and implementing it would allow them to leverage existing infrastructure. TLS can be complicated to set up and get right however leveraging Vaults CA capability allows easy creation and management for x.509 certificates.
| non_usab | proposal secrets integration for openfaas with vault hashicorp vault is an open source tool for managing and controlling access to tokens passwords certificates integrating openfaas with vault would allow a generic backend which would enable the injection of secrets into openfaas in addition to secrets vault could be used to generate and and manage x certificates for jobs again enabling transparant cross platform tls expected behaviour secrets when a user creates a new function in openfaas they should be able to provide key value pairs which would be encrypted and stored in vault when a job executes this data would be retrieved from vault and injected into the job for it to use tls when a job is created it would contact vault to obtain a x certificate securing it with tls the gateway would then communicate with the service using tls rather than plain http in addition to this the proxy could use mutual tls with a client side certificate to ensure that the job it is talking to is intact the correct job to mitigate man in the middle attacks possible solution the internals from consul template could be embedded into the gateway to ensure that when a secret expires all secrets have a ttl or if the secret is updated it would be able to update the function this would reduce the load on the vault server and making a call every time a function executes nomad and kubernetes both have this capability when you integrate vault and start a job or pod however by placing this integration into the proxy it gives agnosticism to the underlying scheduler and allows seamless integration with swarm rancher mesos etc context having a central capability for secrets management and encryption functions allows functions to remain light and the author to concentrate on functionality not security enterprises already trust vault and implementing it would allow them to leverage existing infrastructure tls can be complicated to set up and get right however leveraging vaults ca capability allows easy creation and management for x certificates | 0 |
12,934 | 8,198,376,715 | IssuesEvent | 2018-08-31 16:10:40 | precice/precice | https://api.github.com/repos/precice/precice | closed | Improve error message for wrong use of writeBlockVectorData | bug usability | If data is (accidentally) defined as `data:scalar` in `precice-config.xml`, while inside the adapter `writeBlockVectorData` is used the following error message is returned:
```
ASSERTION FAILED
Location: void precice::impl::SolverInterfaceImpl::writeBlockVectorData(int, int, int*, double*)
File: src/precice/impl/SolverInterfaceImpl.cpp:1159
Rank: 0
Failed expression: offset+dim < valuesInternal.size()
Argument 0: 1
Argument 1: 1
```
Providing a correct `precice-config.xml` with `data:vector`, of course, works.
A code example where this behaviour is reproduced can be found on the branch [reproducePythonAssertionFail](https://github.com/precice/precice/tree/reproducePythonAssertionFail), https://github.com/precice/precice/commit/6a8bb353fd6327d92ff66f4de106083d348900e0 in [/tools/solverdummies/python/assertionfail](https://github.com/precice/precice/tree/6a8bb353fd6327d92ff66f4de106083d348900e0/tools/solverdummies/python/assertionfail). Just use the same commands for running as for the original python solverdummy [see README.md](https://github.com/precice/precice/blob/6a8bb353fd6327d92ff66f4de106083d348900e0/tools/solverdummies/python/README.md)
**side note:** if you use `data:vector` in `precice-config.xml`, while inside the adapter `writeBlockScalarData`, no assertion fail is returned. we should consider returning an error in this case, as well.
# Progress
- [x] only with python bindings or general issue? -> general issue
- [ ] meaningful error if `data:scalar` in `precice-config.xml` and `writeBlockVectorData` in adapter
- [ ] meaningful error if `data:vector` in `precice-config.xml` and `writeBlockScalarData` in adapter
| True | Improve error message for wrong use of writeBlockVectorData - If data is (accidentally) defined as `data:scalar` in `precice-config.xml`, while inside the adapter `writeBlockVectorData` is used the following error message is returned:
```
ASSERTION FAILED
Location: void precice::impl::SolverInterfaceImpl::writeBlockVectorData(int, int, int*, double*)
File: src/precice/impl/SolverInterfaceImpl.cpp:1159
Rank: 0
Failed expression: offset+dim < valuesInternal.size()
Argument 0: 1
Argument 1: 1
```
Providing a correct `precice-config.xml` with `data:vector`, of course, works.
A code example where this behaviour is reproduced can be found on the branch [reproducePythonAssertionFail](https://github.com/precice/precice/tree/reproducePythonAssertionFail), https://github.com/precice/precice/commit/6a8bb353fd6327d92ff66f4de106083d348900e0 in [/tools/solverdummies/python/assertionfail](https://github.com/precice/precice/tree/6a8bb353fd6327d92ff66f4de106083d348900e0/tools/solverdummies/python/assertionfail). Just use the same commands for running as for the original python solverdummy [see README.md](https://github.com/precice/precice/blob/6a8bb353fd6327d92ff66f4de106083d348900e0/tools/solverdummies/python/README.md)
**side note:** if you use `data:vector` in `precice-config.xml`, while inside the adapter `writeBlockScalarData`, no assertion fail is returned. we should consider returning an error in this case, as well.
# Progress
- [x] only with python bindings or general issue? -> general issue
- [ ] meaningful error if `data:scalar` in `precice-config.xml` and `writeBlockVectorData` in adapter
- [ ] meaningful error if `data:vector` in `precice-config.xml` and `writeBlockScalarData` in adapter
| usab | improve error message for wrong use of writeblockvectordata if data is accidentally defined as data scalar in precice config xml while inside the adapter writeblockvectordata is used the following error message is returned assertion failed location void precice impl solverinterfaceimpl writeblockvectordata int int int double file src precice impl solverinterfaceimpl cpp rank failed expression offset dim valuesinternal size argument argument providing a correct precice config xml with data vector of course works a code example where this behaviour is reproduced can be found on the branch in just use the same commands for running as for the original python solverdummy side note if you use data vector in precice config xml while inside the adapter writeblockscalardata no assertion fail is returned we should consider returning an error in this case as well progress only with python bindings or general issue general issue meaningful error if data scalar in precice config xml and writeblockvectordata in adapter meaningful error if data vector in precice config xml and writeblockscalardata in adapter | 1 |
805,416 | 29,519,762,893 | IssuesEvent | 2023-06-04 23:04:04 | cse110-sp23-group27/Fortune-Telling-Group-27 | https://api.github.com/repos/cse110-sp23-group27/Fortune-Telling-Group-27 | closed | Fix bug related to going back to home page, and tarot cards disappearing | bug Priority | # Describe the task:
The tarot cards are not showing up again after the home page button is clicked. To be more specific, after going through the tarot card process once and the home page button is clicked, the shuffling animation does not play and the tarot cards do not show up.
Also, after clicking the three tarot cards, they disappear. Not sure if that's a bug or if it's intended.
# Possible implementations/steps to take:
* Take a look at how the tarot cards are generated when clicked
* See if the html elements of the cards are showing up or not when the shuffle card button is clicked again
# Resources:
# Possible people to ask/assign:
@ejoa27 | 1.0 | Fix bug related to going back to home page, and tarot cards disappearing - # Describe the task:
The tarot cards are not showing up again after the home page button is clicked. To be more specific, after going through the tarot card process once and the home page button is clicked, the shuffling animation does not play and the tarot cards do not show up.
Also, after clicking the three tarot cards, they disappear. Not sure if that's a bug or if it's intended.
# Possible implementations/steps to take:
* Take a look at how the tarot cards are generated when clicked
* See if the html elements of the cards are showing up or not when the shuffle card button is clicked again
# Resources:
# Possible people to ask/assign:
@ejoa27 | non_usab | fix bug related to going back to home page and tarot cards disappearing describe the task the tarot cards are not showing up again after the home page button is clicked to be more specific after going through the tarot card process once and the home page button is clicked the shuffling animation does not play and the tarot cards do not show up also after clicking the three tarot cards they disappear not sure if that s a bug or if it s intended possible implementations steps to take take a look at how the tarot cards are generated when clicked see if the html elements of the cards are showing up or not when the shuffle card button is clicked again resources possible people to ask assign | 0 |
5,274 | 3,917,002,231 | IssuesEvent | 2016-04-21 05:57:19 | kolliSuman/issues | https://api.github.com/repos/kolliSuman/issues | closed | QA_Image Segmentation_Prerequisites_p1 | Category: Usability Developed By: VLEAD Release Number: Production Severity: S2 Status: Open | Defect Description :
In the "Image Segmentation" experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required
Actual Result :
In the "Image Segmentation" experiment, the minimum requirement to run the experiment is not displayed in the page
Environment :
OS: Windows 7, Ubuntu-16.04,Centos-6
Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0
Bandwidth : 100Mbps
Hardware Configuration:8GBRAM ,
Processor:i5
Test Step Link:
https://github.com/Virtual-Labs/image-processing-iiith/blob/master/test-cases/integration_test-cases/Image%20Segmentation/Image%20Segmentation_21_Prerequisites_p1.org | True | QA_Image Segmentation_Prerequisites_p1 - Defect Description :
In the "Image Segmentation" experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required
Actual Result :
In the "Image Segmentation" experiment, the minimum requirement to run the experiment is not displayed in the page
Environment :
OS: Windows 7, Ubuntu-16.04,Centos-6
Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0
Bandwidth : 100Mbps
Hardware Configuration:8GBRAM ,
Processor:i5
Test Step Link:
https://github.com/Virtual-Labs/image-processing-iiith/blob/master/test-cases/integration_test-cases/Image%20Segmentation/Image%20Segmentation_21_Prerequisites_p1.org | usab | qa image segmentation prerequisites defect description in the image segmentation experiment the minimum requirement to run the experiment is not displayed in the page instead a page or scrolling should appear providing information on minimum requirement to run this experiment information like bandwidth device resolution hardware configuration and software required actual result in the image segmentation experiment the minimum requirement to run the experiment is not displayed in the page environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor test step link | 1 |
27,382 | 28,264,135,143 | IssuesEvent | 2023-04-07 04:16:35 | wazuh/wazuh | https://api.github.com/repos/wazuh/wazuh | opened | General active response optimization issues | module/active response feed/active response type/enhancement/usability | |Wazuh version|Component|Install type|Install method|Platform|
|---|---|---|---|---|
| 4.4.x | Wazuh component | Manager/Agent | Packages/Sources | OS version |
### Description
Wazuh has several out of the box active responses for some operating systems it supports (Windows, Linux/Unix). This issue aims to track all defects, misbehavior and missing features of current active response scripts and optimize them in next Wazuh versions.
### Current AR scripts
Wazuh has the following out-of-the-box active response scripts:
**Windows**
```
PS C:\Program Files (x86)\ossec-agent\active-response\bin> ls
Directory: C:\Program Files (x86)\ossec-agent\active-response\bin
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 9/13/2022 4:35 PM 52312 netsh.exe
-a---- 9/13/2022 4:35 PM 50776 restart-wazuh.exe
-a---- 9/13/2022 4:35 PM 52312 route-null.exe
```
**Linux**
```
vagrant@Ubuntu:~$ sudo ls -l /var/ossec/active-response/bin
total 248
-rwxr-x--- 1 root ossec 19504 Nov 12 2021 default-firewall-drop
-rwxr-x--- 1 root ossec 16112 Nov 12 2021 disable-account
-rwxr-x--- 1 root ossec 19504 Nov 12 2021 firewall-drop
-rwxr-x--- 1 root ossec 20528 Nov 12 2021 firewalld-drop
-rwxr-x--- 1 root ossec 17480 Nov 12 2021 host-deny
-rwxr-x--- 1 root ossec 15376 Nov 12 2021 ip-customblock
-rwxr-x--- 1 root ossec 16040 Nov 12 2021 ipfw
-rwxr-x--- 1 root ossec 15352 Nov 12 2021 kaspersky
-rwxr-x--- 1 root ossec 14434 Nov 12 2021 kaspersky.py
-rwxr-x--- 1 root ossec 15984 Nov 12 2021 npf
-rwxr-x--- 1 root ossec 16112 Nov 12 2021 pf
-rwxr-x--- 1 root ossec 15352 Nov 12 2021 restart-wazuh
-rwxr-x--- 1 root ossec 1038 Nov 12 2021 restart.sh
-rwxr-x--- 1 root ossec 15368 Nov 12 2021 route-null
-rwxr-x--- 1 root ossec 16256 Nov 12 2021 wazuh-slack
```
### Linked issues
The table below would hold all child issues linked to General active response optimization issues.
|Issue #|title|Platform|
|---|---|---|
| #15520 | Show error message on the dashboard when firewalld-drop active response fails to run | Linux/Unix |
| #15563 | Show error message on the dashboard when ipfw active response fails to run | Linux/Unix |
| #15652 | Show error message on the dashboard when npf active response fails to run | Linux/Unix |
| #15666 | pf active response fails to run and there is no error shown on the Wazuh dashboard | Linux/Unix |
| #15668 | Show error message on the dashboard when host-deny active response fails to run | Linux/Unix |
| #15687 | Show alert when route-null active response fails to run due to the absence of net-tools on Linux/Unix endpoints | Linux/Unix |
| #15710 | Show error when kaspersky active response fails to run | Linux/Unix |
| #15712 | kaspersky active response with --full_scan arguments deletes packages and system binaries | Linux/Unix |
| #16460 | host-deny uses wrong address format when srcip is an IPv6 address | Linux/Unix |
| #16514 | Active-response Kaspersky is not parsing extra_args correctly | Linux/Unix |
| #16461 | Add required square brackets arround srcip if it looks like IPv6 | Linux/Unix |
### Expected changes
The following changes are to be expected:
All related documentation that uses these scripts will be updated.
### General notes
Any comments and use cases that need to be accounted for in this issue should be added as a comment below. | True | General active response optimization issues - |Wazuh version|Component|Install type|Install method|Platform|
|---|---|---|---|---|
| 4.4.x | Wazuh component | Manager/Agent | Packages/Sources | OS version |
### Description
Wazuh has several out of the box active responses for some operating systems it supports (Windows, Linux/Unix). This issue aims to track all defects, misbehavior and missing features of current active response scripts and optimize them in next Wazuh versions.
### Current AR scripts
Wazuh has the following out-of-the-box active response scripts:
**Windows**
```
PS C:\Program Files (x86)\ossec-agent\active-response\bin> ls
Directory: C:\Program Files (x86)\ossec-agent\active-response\bin
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 9/13/2022 4:35 PM 52312 netsh.exe
-a---- 9/13/2022 4:35 PM 50776 restart-wazuh.exe
-a---- 9/13/2022 4:35 PM 52312 route-null.exe
```
**Linux**
```
vagrant@Ubuntu:~$ sudo ls -l /var/ossec/active-response/bin
total 248
-rwxr-x--- 1 root ossec 19504 Nov 12 2021 default-firewall-drop
-rwxr-x--- 1 root ossec 16112 Nov 12 2021 disable-account
-rwxr-x--- 1 root ossec 19504 Nov 12 2021 firewall-drop
-rwxr-x--- 1 root ossec 20528 Nov 12 2021 firewalld-drop
-rwxr-x--- 1 root ossec 17480 Nov 12 2021 host-deny
-rwxr-x--- 1 root ossec 15376 Nov 12 2021 ip-customblock
-rwxr-x--- 1 root ossec 16040 Nov 12 2021 ipfw
-rwxr-x--- 1 root ossec 15352 Nov 12 2021 kaspersky
-rwxr-x--- 1 root ossec 14434 Nov 12 2021 kaspersky.py
-rwxr-x--- 1 root ossec 15984 Nov 12 2021 npf
-rwxr-x--- 1 root ossec 16112 Nov 12 2021 pf
-rwxr-x--- 1 root ossec 15352 Nov 12 2021 restart-wazuh
-rwxr-x--- 1 root ossec 1038 Nov 12 2021 restart.sh
-rwxr-x--- 1 root ossec 15368 Nov 12 2021 route-null
-rwxr-x--- 1 root ossec 16256 Nov 12 2021 wazuh-slack
```
### Linked issues
The table below would hold all child issues linked to General active response optimization issues.
|Issue #|title|Platform|
|---|---|---|
| #15520 | Show error message on the dashboard when firewalld-drop active response fails to run | Linux/Unix |
| #15563 | Show error message on the dashboard when ipfw active response fails to run | Linux/Unix |
| #15652 | Show error message on the dashboard when npf active response fails to run | Linux/Unix |
| #15666 | pf active response fails to run and there is no error shown on the Wazuh dashboard | Linux/Unix |
| #15668 | Show error message on the dashboard when host-deny active response fails to run | Linux/Unix |
| #15687 | Show alert when route-null active response fails to run due to the absence of net-tools on Linux/Unix endpoints | Linux/Unix |
| #15710 | Show error when kaspersky active response fails to run | Linux/Unix |
| #15712 | kaspersky active response with --full_scan arguments deletes packages and system binaries | Linux/Unix |
| #16460 | host-deny uses wrong address format when srcip is an IPv6 address | Linux/Unix |
| #16514 | Active-response Kaspersky is not parsing extra_args correctly | Linux/Unix |
| #16461 | Add required square brackets arround srcip if it looks like IPv6 | Linux/Unix |
### Expected changes
The following changes are to be expected:
All related documentation that uses these scripts will be updated.
### General notes
Any comments and use cases that need to be accounted for in this issue should be added as a comment below. | usab | general active response optimization issues wazuh version component install type install method platform x wazuh component manager agent packages sources os version description wazuh has several out of the box active responses for some operating systems it supports windows linux unix this issue aims to track all defects misbehavior and missing features of current active response scripts and optimize them in next wazuh versions current ar scripts wazuh has the following out of the box active response scripts windows ps c program files ossec agent active response bin ls directory c program files ossec agent active response bin mode lastwritetime length name a pm netsh exe a pm restart wazuh exe a pm route null exe linux vagrant ubuntu sudo ls l var ossec active response bin total rwxr x root ossec nov default firewall drop rwxr x root ossec nov disable account rwxr x root ossec nov firewall drop rwxr x root ossec nov firewalld drop rwxr x root ossec nov host deny rwxr x root ossec nov ip customblock rwxr x root ossec nov ipfw rwxr x root ossec nov kaspersky rwxr x root ossec nov kaspersky py rwxr x root ossec nov npf rwxr x root ossec nov pf rwxr x root ossec nov restart wazuh rwxr x root ossec nov restart sh rwxr x root ossec nov route null rwxr x root ossec nov wazuh slack linked issues the table below would hold all child issues linked to general active response optimization issues issue title platform show error message on the dashboard when firewalld drop active response fails to run linux unix show error message on the dashboard when ipfw active response fails to run linux unix show error message on the dashboard when npf active response fails to run linux unix pf active response fails to run and there is no error shown on the wazuh dashboard linux unix show error message on the dashboard when host deny active response fails to run linux unix show alert when route null active response fails to run due to the absence of net tools on linux unix endpoints linux unix show error when kaspersky active response fails to run linux unix kaspersky active response with full scan arguments deletes packages and system binaries linux unix host deny uses wrong address format when srcip is an address linux unix active response kaspersky is not parsing extra args correctly linux unix add required square brackets arround srcip if it looks like linux unix expected changes the following changes are to be expected all related documentation that uses these scripts will be updated general notes any comments and use cases that need to be accounted for in this issue should be added as a comment below | 1 |
9,464 | 6,307,789,139 | IssuesEvent | 2017-07-22 05:01:59 | lionheart/openradar-mirror | https://api.github.com/repos/lionheart/openradar-mirror | opened | 33469314: The storage description popups' arrows details overlap with their content | classification:ui/usability status:open | #### Description
Summary:
In the summary on the bottom of the window where it shows a chart for the device's internal storage usage, there are some popups that appear when you hover on any of the categories. Unfortunately it appears that the arrows used for these popups overlap with their actual text. See attached screenshot.
Steps to Reproduce:
1. Connect an iOS device to iTunes.
2. Open the summary view for it.
3. Hover over a storage category on the bottom of the page.
Expected Results:
The arrow for the popup doesn't overlap with its content.
Observed Results:
The arrow overlaps.
Version:
iTunes 12.7.0.48
Notes:
Regression from the last version of iTunes.
Configuration:
MacBook Pro (Retina, 13-inch, Early 2015) running macOS High Sierra 10.13 Beta (17A306f)
-
Product Version: iTunes 12.7.0.48
Created: 2017-07-22T04:52:28.975980
Originated: 2017-07-21T21:39:00
Open Radar Link: http://www.openradar.me/33469314 | True | 33469314: The storage description popups' arrows details overlap with their content - #### Description
Summary:
In the summary on the bottom of the window where it shows a chart for the device's internal storage usage, there are some popups that appear when you hover on any of the categories. Unfortunately it appears that the arrows used for these popups overlap with their actual text. See attached screenshot.
Steps to Reproduce:
1. Connect an iOS device to iTunes.
2. Open the summary view for it.
3. Hover over a storage category on the bottom of the page.
Expected Results:
The arrow for the popup doesn't overlap with its content.
Observed Results:
The arrow overlaps.
Version:
iTunes 12.7.0.48
Notes:
Regression from the last version of iTunes.
Configuration:
MacBook Pro (Retina, 13-inch, Early 2015) running macOS High Sierra 10.13 Beta (17A306f)
-
Product Version: iTunes 12.7.0.48
Created: 2017-07-22T04:52:28.975980
Originated: 2017-07-21T21:39:00
Open Radar Link: http://www.openradar.me/33469314 | usab | the storage description popups arrows details overlap with their content description summary in the summary on the bottom of the window where it shows a chart for the device s internal storage usage there are some popups that appear when you hover on any of the categories unfortunately it appears that the arrows used for these popups overlap with their actual text see attached screenshot steps to reproduce connect an ios device to itunes open the summary view for it hover over a storage category on the bottom of the page expected results the arrow for the popup doesn t overlap with its content observed results the arrow overlaps version itunes notes regression from the last version of itunes configuration macbook pro retina inch early running macos high sierra beta product version itunes created originated open radar link | 1 |
23,087 | 20,992,145,623 | IssuesEvent | 2022-03-29 10:15:04 | HicServices/RDMP | https://api.github.com/repos/HicServices/RDMP | closed | Refactor Pipeline to support DialogArgs and be more userfriendly | enhancement usability | **Pipeline Screen**
- [x] Change window title to the "task" value
- [x] Remove burger menu
- [ ] Reorder top bar to be: Project Name - Cohort Builder Query Name - Cohort Database Name - Cohort Name (not possible at present)
- [x] Update Cohort Name icon in top bar to be person icon
- [x] Remove "Task" (as this is now the window title)
- [x] Update pipeline to say "Select..." if none is selected
- [x] Add numbering to tasks (i.e. 1. Select Pipeline, 2. Execute Pipeline)
- [ ] Once executed, show/enable "View Committed Cohort" button that highlights the Cohort in the tree (being developed in #981 )
| True | Refactor Pipeline to support DialogArgs and be more userfriendly - **Pipeline Screen**
- [x] Change window title to the "task" value
- [x] Remove burger menu
- [ ] Reorder top bar to be: Project Name - Cohort Builder Query Name - Cohort Database Name - Cohort Name (not possible at present)
- [x] Update Cohort Name icon in top bar to be person icon
- [x] Remove "Task" (as this is now the window title)
- [x] Update pipeline to say "Select..." if none is selected
- [x] Add numbering to tasks (i.e. 1. Select Pipeline, 2. Execute Pipeline)
- [ ] Once executed, show/enable "View Committed Cohort" button that highlights the Cohort in the tree (being developed in #981 )
| usab | refactor pipeline to support dialogargs and be more userfriendly pipeline screen change window title to the task value remove burger menu reorder top bar to be project name cohort builder query name cohort database name cohort name not possible at present update cohort name icon in top bar to be person icon remove task as this is now the window title update pipeline to say select if none is selected add numbering to tasks i e select pipeline execute pipeline once executed show enable view committed cohort button that highlights the cohort in the tree being developed in | 1 |
6,194 | 4,174,944,130 | IssuesEvent | 2016-06-21 15:26:22 | MISP/MISP | https://api.github.com/repos/MISP/MISP | closed | In search results - add icon to add proposal | usability visual | for events where the user does not have rights to edit attributes.
What is happing now is that the icon is added for all the attributes including the ones where the user does not have rights to edit an attribute, which leads back to the index with a warning message "invalid attribute". | True | In search results - add icon to add proposal - for events where the user does not have rights to edit attributes.
What is happing now is that the icon is added for all the attributes including the ones where the user does not have rights to edit an attribute, which leads back to the index with a warning message "invalid attribute". | usab | in search results add icon to add proposal for events where the user does not have rights to edit attributes what is happing now is that the icon is added for all the attributes including the ones where the user does not have rights to edit an attribute which leads back to the index with a warning message invalid attribute | 1 |
218,222 | 24,351,850,409 | IssuesEvent | 2022-10-03 01:25:34 | Vonage/vonage-java-code-snippets | https://api.github.com/repos/Vonage/vonage-java-code-snippets | opened | jackson-databind-2.13.3.jar: 2 vulnerabilities (highest severity is: 5.5) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p>
<p>
</details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2022-42004](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42004) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | jackson-databind-2.13.3.jar | Direct | com.fasterxml.jackson.core:jackson-databind:2.13.4 | ✅ |
| [CVE-2022-42003](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42003) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | jackson-databind-2.13.3.jar | Direct | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-42004</summary>
### Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.13.3.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
<p>Publish Date: 2022-10-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42004>CVE-2022-42004</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-10-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.13.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-42003</summary>
### Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.13.3.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
<p>Publish Date: 2022-10-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42003>CVE-2022-42003</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | True | jackson-databind-2.13.3.jar: 2 vulnerabilities (highest severity is: 5.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p>
<p>
</details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2022-42004](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42004) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | jackson-databind-2.13.3.jar | Direct | com.fasterxml.jackson.core:jackson-databind:2.13.4 | ✅ |
| [CVE-2022-42003](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42003) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | jackson-databind-2.13.3.jar | Direct | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-42004</summary>
### Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.13.3.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
<p>Publish Date: 2022-10-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42004>CVE-2022-42004</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-10-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.13.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-42003</summary>
### Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar,/les-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.13.3.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
<p>Publish Date: 2022-10-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42003>CVE-2022-42003</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | non_usab | jackson databind jar vulnerabilities highest severity is vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar les files com fasterxml jackson core jackson databind jackson databind jar vulnerabilities cve severity cvss dependency type fixed in remediation available medium jackson databind jar direct com fasterxml jackson core jackson databind medium jackson databind jar direct n a details cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar les files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in base branch master vulnerability details in fasterxml jackson databind before resource exhaustion can occur because of a lack of a check in beandeserializer deserializefromarray to prevent use of deeply nested arrays an application is vulnerable only with certain customized choices for deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar les files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in base branch master vulnerability details in fasterxml jackson databind before resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting when the unwrap single value arrays feature is enabled publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href rescue worker helmet automatic remediation is available for this issue | 0 |
469,491 | 13,518,938,869 | IssuesEvent | 2020-09-15 00:32:48 | grpc/grpc | https://api.github.com/repos/grpc/grpc | closed | Type Mismatch: Signed to Unsigned | disposition/requires reporter action disposition/stale kind/internal cleanup lang/core priority/P2 | **Summary**
The function in http2_settings.cc is declared to return an unsigned value, but on line 46 it returns a signed value.The function is declared to return an unsigned number but returns a signed value.
### What version of gRPC and what language are you using?
0.0.3 , IOS Swift
### What operating system (Linux, Windows,...) and version?
MAC OS -10.15.3
### What did you do?
**Explanation**
It is dangerous to rely on implicit casts between signed and unsigned numbers because the result can take on an unexpected value and violate weak assumptions made elsewhere in the program.
| 1.0 | Type Mismatch: Signed to Unsigned - **Summary**
The function in http2_settings.cc is declared to return an unsigned value, but on line 46 it returns a signed value.The function is declared to return an unsigned number but returns a signed value.
### What version of gRPC and what language are you using?
0.0.3 , IOS Swift
### What operating system (Linux, Windows,...) and version?
MAC OS -10.15.3
### What did you do?
**Explanation**
It is dangerous to rely on implicit casts between signed and unsigned numbers because the result can take on an unexpected value and violate weak assumptions made elsewhere in the program.
| non_usab | type mismatch signed to unsigned summary the function in settings cc is declared to return an unsigned value but on line it returns a signed value the function is declared to return an unsigned number but returns a signed value what version of grpc and what language are you using ios swift what operating system linux windows and version mac os what did you do explanation it is dangerous to rely on implicit casts between signed and unsigned numbers because the result can take on an unexpected value and violate weak assumptions made elsewhere in the program | 0 |
16,782 | 9,527,491,280 | IssuesEvent | 2019-04-29 04:18:16 | tensorflow/tensorflow | https://api.github.com/repos/tensorflow/tensorflow | closed | There is still bug with function tf.keras.layers.Conv3DTranspose when its input shape is None | comp:keras stat:awaiting response type:bug/performance | <em>Please make sure that this is a bug. As per our [GitHub Policy](https://github.com/tensorflow/tensorflow/blob/master/ISSUES.md), we only address code/doc bugs, performance issues, feature requests and build/installation issues on GitHub. tag:bug_template</em>
**System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow):
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04.2
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device:
- TensorFlow installed from (source or binary): source
- TensorFlow version (use command below): 1.13.1
- Python version: 3.7
You can collect some of this information using our environment capture [script](https://github.com/tensorflow/tensorflow/tree/master/tools/tf_env_collect.sh)
You can also obtain the TensorFlow version with
python -c "import tensorflow as tf; print(tf.GIT_VERSION, tf.VERSION)"
**Describe the current behavior**
Hi, here's my code:
input_img = keras.layers.Input( shape=( None, len(params2), len(params2), 1 ) ) # adapt this if using `channels_first` image data format
conv1 = keras.layers.Conv3D(filters=32, kernel_size=(1, 3, 3), strides=(1, 1, 1), activation='selu', padding='same', data_format='channels_last', name='conv1')(input_img)
conv2 = keras.layers.Conv3D(filters=64, kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv2')(conv1)
conv3 = keras.layers.Conv3D(filters=128,kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv3')(conv2)
conv4 = keras.layers.Conv3D(filters=256,kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv4')(conv3)
convlstm1 = keras.layers.ConvLSTM2D(filters=32, return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm1')(conv1)
convlstm2 = keras.layers.ConvLSTM2D(filters=64, return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm2')(conv2)
convlstm3 = keras.layers.ConvLSTM2D(filters=128,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm3')(conv3)
convlstm4 = keras.layers.ConvLSTM2D(filters=256,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm4')(conv4)
deconv4 = keras.layers.Conv3DTranspose(filters=128, kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv4')(convlstm4)
concat4 = keras.layers.Concatenate(axis=4, name='concat4')([convlstm3, deconv4])
deconv3 = keras.layers.Conv3DTranspose(filters=64 , kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv3')(concat4)
concat3 = keras.layers.Concatenate(axis=4, name='concat3')([convlstm2, deconv3])
deconv2 = keras.layers.Conv3DTranspose(filters=32 , kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same' , data_format='channels_last', name='deconv2')(concat3)
concat2 = keras.layers.Concatenate(axis=4, name='concat2')([convlstm1, deconv2])
deconv1 = keras.layers.Conv3DTranspose(filters=1 , kernel_size=(1, 3, 3), strides=(1, 1, 1), activation='selu', padding='same' , data_format='channels_last', name='deconv1')(concat2)
autoencoder = keras.models.Model(input_img, deconv1)
autoencoder.compile(optimizer='adadelta', loss='binary_crossentropy')
autoencoder.summary()
and here's the error message:
TypeError Traceback (most recent call last)
<ipython-input-150-83622ca7a77b> in <module>
28 return autoencoder
29
---> 30 autoencoder1(1700)
<ipython-input-150-83622ca7a77b> in autoencoder1(file_length)
14 convlstm4 = keras.layers.ConvLSTM2D(filters=256,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm4')(conv4)
15
---> 16 deconv4 = keras.layers.Conv3DTranspose(filters=128, kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv4')(convlstm4)
17 concat4 = keras.layers.Concatenate(axis=4, name='concat4')([convlstm3, deconv4])
18 deconv3 = keras.layers.Conv3DTranspose(filters=64 , kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv3')(concat4)
~/anaconda3/lib/python3.7/site-packages/tensorflow/python/keras/engine/base_layer.py in __call__(self, inputs, *args, **kwargs)
552 # In graph mode, failure to build the layer's graph
553 # implies a user-side bug. We don't catch exceptions.
--> 554 outputs = self.call(inputs, *args, **kwargs)
555 else:
556 try:
~/anaconda3/lib/python3.7/site-packages/tensorflow/python/keras/layers/convolutional.py in call(self, inputs)
1138 else:
1139 outputs_4d = array_ops.reshape(outputs, [
-> 1140 outputs_shape[0], outputs_shape[1] * outputs_shape[2],
1141 outputs_shape[3], outputs_shape[4]
1142 ])
TypeError: unsupported operand type(s) for *: 'NoneType' and 'int'
You just said that this problem was solved. But I'm really not sure why I still have this problem today on April 2019.
| True | There is still bug with function tf.keras.layers.Conv3DTranspose when its input shape is None - <em>Please make sure that this is a bug. As per our [GitHub Policy](https://github.com/tensorflow/tensorflow/blob/master/ISSUES.md), we only address code/doc bugs, performance issues, feature requests and build/installation issues on GitHub. tag:bug_template</em>
**System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow):
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04.2
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device:
- TensorFlow installed from (source or binary): source
- TensorFlow version (use command below): 1.13.1
- Python version: 3.7
You can collect some of this information using our environment capture [script](https://github.com/tensorflow/tensorflow/tree/master/tools/tf_env_collect.sh)
You can also obtain the TensorFlow version with
python -c "import tensorflow as tf; print(tf.GIT_VERSION, tf.VERSION)"
**Describe the current behavior**
Hi, here's my code:
input_img = keras.layers.Input( shape=( None, len(params2), len(params2), 1 ) ) # adapt this if using `channels_first` image data format
conv1 = keras.layers.Conv3D(filters=32, kernel_size=(1, 3, 3), strides=(1, 1, 1), activation='selu', padding='same', data_format='channels_last', name='conv1')(input_img)
conv2 = keras.layers.Conv3D(filters=64, kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv2')(conv1)
conv3 = keras.layers.Conv3D(filters=128,kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv3')(conv2)
conv4 = keras.layers.Conv3D(filters=256,kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same', data_format='channels_last', name='conv4')(conv3)
convlstm1 = keras.layers.ConvLSTM2D(filters=32, return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm1')(conv1)
convlstm2 = keras.layers.ConvLSTM2D(filters=64, return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm2')(conv2)
convlstm3 = keras.layers.ConvLSTM2D(filters=128,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm3')(conv3)
convlstm4 = keras.layers.ConvLSTM2D(filters=256,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm4')(conv4)
deconv4 = keras.layers.Conv3DTranspose(filters=128, kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv4')(convlstm4)
concat4 = keras.layers.Concatenate(axis=4, name='concat4')([convlstm3, deconv4])
deconv3 = keras.layers.Conv3DTranspose(filters=64 , kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv3')(concat4)
concat3 = keras.layers.Concatenate(axis=4, name='concat3')([convlstm2, deconv3])
deconv2 = keras.layers.Conv3DTranspose(filters=32 , kernel_size=(1, 3, 3), strides=(1, 2, 2), activation='selu', padding='same' , data_format='channels_last', name='deconv2')(concat3)
concat2 = keras.layers.Concatenate(axis=4, name='concat2')([convlstm1, deconv2])
deconv1 = keras.layers.Conv3DTranspose(filters=1 , kernel_size=(1, 3, 3), strides=(1, 1, 1), activation='selu', padding='same' , data_format='channels_last', name='deconv1')(concat2)
autoencoder = keras.models.Model(input_img, deconv1)
autoencoder.compile(optimizer='adadelta', loss='binary_crossentropy')
autoencoder.summary()
and here's the error message:
TypeError Traceback (most recent call last)
<ipython-input-150-83622ca7a77b> in <module>
28 return autoencoder
29
---> 30 autoencoder1(1700)
<ipython-input-150-83622ca7a77b> in autoencoder1(file_length)
14 convlstm4 = keras.layers.ConvLSTM2D(filters=256,return_sequences=True, kernel_size=(3, 3), strides=(1, 1), activation='selu', padding='same', data_format='channels_last', name='convlstm4')(conv4)
15
---> 16 deconv4 = keras.layers.Conv3DTranspose(filters=128, kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv4')(convlstm4)
17 concat4 = keras.layers.Concatenate(axis=4, name='concat4')([convlstm3, deconv4])
18 deconv3 = keras.layers.Conv3DTranspose(filters=64 , kernel_size=(1, 2, 2), strides=(1, 2, 2), activation='selu', padding='valid', output_padding=(0, -1, -1), data_format='channels_last', name='deconv3')(concat4)
~/anaconda3/lib/python3.7/site-packages/tensorflow/python/keras/engine/base_layer.py in __call__(self, inputs, *args, **kwargs)
552 # In graph mode, failure to build the layer's graph
553 # implies a user-side bug. We don't catch exceptions.
--> 554 outputs = self.call(inputs, *args, **kwargs)
555 else:
556 try:
~/anaconda3/lib/python3.7/site-packages/tensorflow/python/keras/layers/convolutional.py in call(self, inputs)
1138 else:
1139 outputs_4d = array_ops.reshape(outputs, [
-> 1140 outputs_shape[0], outputs_shape[1] * outputs_shape[2],
1141 outputs_shape[3], outputs_shape[4]
1142 ])
TypeError: unsupported operand type(s) for *: 'NoneType' and 'int'
You just said that this problem was solved. But I'm really not sure why I still have this problem today on April 2019.
| non_usab | there is still bug with function tf keras layers when its input shape is none please make sure that this is a bug as per our we only address code doc bugs performance issues feature requests and build installation issues on github tag bug template system information have i written custom code as opposed to using a stock example script provided in tensorflow os platform and distribution e g linux ubuntu linux ubuntu mobile device e g iphone pixel samsung galaxy if the issue happens on mobile device tensorflow installed from source or binary source tensorflow version use command below python version you can collect some of this information using our environment capture you can also obtain the tensorflow version with python c import tensorflow as tf print tf git version tf version describe the current behavior hi here s my code input img keras layers input shape none len len adapt this if using channels first image data format keras layers filters kernel size strides activation selu padding same data format channels last name input img keras layers filters kernel size strides activation selu padding same data format channels last name keras layers filters kernel size strides activation selu padding same data format channels last name keras layers filters kernel size strides activation selu padding same data format channels last name keras layers filters return sequences true kernel size strides activation selu padding same data format channels last name keras layers filters return sequences true kernel size strides activation selu padding same data format channels last name keras layers filters return sequences true kernel size strides activation selu padding same data format channels last name keras layers filters return sequences true kernel size strides activation selu padding same data format channels last name keras layers filters kernel size strides activation selu padding valid output padding data format channels last name keras layers concatenate axis name keras layers filters kernel size strides activation selu padding valid output padding data format channels last name keras layers concatenate axis name keras layers filters kernel size strides activation selu padding same data format channels last name keras layers concatenate axis name keras layers filters kernel size strides activation selu padding same data format channels last name autoencoder keras models model input img autoencoder compile optimizer adadelta loss binary crossentropy autoencoder summary and here s the error message typeerror traceback most recent call last in return autoencoder in file length keras layers filters return sequences true kernel size strides activation selu padding same data format channels last name keras layers filters kernel size strides activation selu padding valid output padding data format channels last name keras layers concatenate axis name keras layers filters kernel size strides activation selu padding valid output padding data format channels last name lib site packages tensorflow python keras engine base layer py in call self inputs args kwargs in graph mode failure to build the layer s graph implies a user side bug we don t catch exceptions outputs self call inputs args kwargs else try lib site packages tensorflow python keras layers convolutional py in call self inputs else outputs array ops reshape outputs outputs shape outputs shape outputs shape outputs shape outputs shape typeerror unsupported operand type s for nonetype and int you just said that this problem was solved but i m really not sure why i still have this problem today on april | 0 |
210,009 | 7,182,199,192 | IssuesEvent | 2018-02-01 08:59:19 | swarmcity/SwarmCitySite | https://api.github.com/repos/swarmcity/SwarmCitySite | closed | Delete password input | priority terminal | # Expected behavior
On page choose-password the page doesnt remember the input after route change
# Actual behavior.
Currently the page remembers past input
# Steps to reproduce the problem.
Go through new-here flow
# Operating system / hardware
| 1.0 | Delete password input - # Expected behavior
On page choose-password the page doesnt remember the input after route change
# Actual behavior.
Currently the page remembers past input
# Steps to reproduce the problem.
Go through new-here flow
# Operating system / hardware
| non_usab | delete password input expected behavior on page choose password the page doesnt remember the input after route change actual behavior currently the page remembers past input steps to reproduce the problem go through new here flow operating system hardware | 0 |
7,700 | 5,144,935,711 | IssuesEvent | 2017-01-12 20:05:02 | tgstation/tgstation | https://api.github.com/repos/tgstation/tgstation | closed | RCD has confusing text, as well | Bug Usability | That's some metal.
Sheets made out of metal.
They are a normal-sized item.
There are 3 metal sheets in the stack.
You insert 0 metal sheets into the RCD.
The RCD now holds 136/160 matter-units.
hmm | True | RCD has confusing text, as well - That's some metal.
Sheets made out of metal.
They are a normal-sized item.
There are 3 metal sheets in the stack.
You insert 0 metal sheets into the RCD.
The RCD now holds 136/160 matter-units.
hmm | usab | rcd has confusing text as well that s some metal sheets made out of metal they are a normal sized item there are metal sheets in the stack you insert metal sheets into the rcd the rcd now holds matter units hmm | 1 |
25,727 | 25,779,412,985 | IssuesEvent | 2022-12-09 14:42:51 | mageshravi/lyricfront-mobile-app | https://api.github.com/repos/mageshravi/lyricfront-mobile-app | closed | Search bar needs to be clicked twice | bug usability | Search bar needs to be clicked twice to bring up the keyboard.
Keyboard should be brought up upon clicking the first time.
| True | Search bar needs to be clicked twice - Search bar needs to be clicked twice to bring up the keyboard.
Keyboard should be brought up upon clicking the first time.
| usab | search bar needs to be clicked twice search bar needs to be clicked twice to bring up the keyboard keyboard should be brought up upon clicking the first time | 1 |
20,154 | 15,081,601,853 | IssuesEvent | 2021-02-05 13:26:50 | andrewfstratton/quando | https://api.github.com/repos/andrewfstratton/quando | closed | Add undo/redo to file select | enhancement usability | Note that (now) selecting the same file_name is ignored
- i.e. changes nothing and doesn't add to the undo stack.
Fixed as part of text change | True | Add undo/redo to file select - Note that (now) selecting the same file_name is ignored
- i.e. changes nothing and doesn't add to the undo stack.
Fixed as part of text change | usab | add undo redo to file select note that now selecting the same file name is ignored i e changes nothing and doesn t add to the undo stack fixed as part of text change | 1 |
685,150 | 23,445,426,326 | IssuesEvent | 2022-08-15 19:06:04 | johnjung/bmrcportal | https://api.github.com/repos/johnjung/bmrcportal | closed | Sorting order for Titles: depends on how they are entered | data priority-2 | It could be useful to add an element to the encoded finding aids for a "filing" (sort) title. This is provided for in EAD, but is not uniformly used.
End result is that A-Z sorts and listings are in many cases by first name or simply the beginning characters of the title data value and not according to guidelines for alphabetizing lists of materials. | 1.0 | Sorting order for Titles: depends on how they are entered - It could be useful to add an element to the encoded finding aids for a "filing" (sort) title. This is provided for in EAD, but is not uniformly used.
End result is that A-Z sorts and listings are in many cases by first name or simply the beginning characters of the title data value and not according to guidelines for alphabetizing lists of materials. | non_usab | sorting order for titles depends on how they are entered it could be useful to add an element to the encoded finding aids for a filing sort title this is provided for in ead but is not uniformly used end result is that a z sorts and listings are in many cases by first name or simply the beginning characters of the title data value and not according to guidelines for alphabetizing lists of materials | 0 |
3,180 | 3,365,997,022 | IssuesEvent | 2015-11-21 01:30:24 | geneontology/amigo | https://api.github.com/repos/geneontology/amigo | closed | Put AmiGO failback at Berkeley into a more production-like footing | bug (B: affects usability) | Given the extended downtime on production, the berkeley servers need to be setup more like production. Also, we want to get golr.geneontology.org sorted out (here and in the unit tests) so we can test once again.
- [X] get golr.geneontology.org CNAME to groovin, pass back to nakama
- [X] fix internal linking on nakama couldn't get it to work on /static, but general linking should be fixed
- [X] take down beta/labs warning, leave backup site warning up
- [X] <strike>plan on how to get another index built</strike> it looks like stanford is almost there, so will punt
- [X] fix displayed menu items
| True | Put AmiGO failback at Berkeley into a more production-like footing - Given the extended downtime on production, the berkeley servers need to be setup more like production. Also, we want to get golr.geneontology.org sorted out (here and in the unit tests) so we can test once again.
- [X] get golr.geneontology.org CNAME to groovin, pass back to nakama
- [X] fix internal linking on nakama couldn't get it to work on /static, but general linking should be fixed
- [X] take down beta/labs warning, leave backup site warning up
- [X] <strike>plan on how to get another index built</strike> it looks like stanford is almost there, so will punt
- [X] fix displayed menu items
| usab | put amigo failback at berkeley into a more production like footing given the extended downtime on production the berkeley servers need to be setup more like production also we want to get golr geneontology org sorted out here and in the unit tests so we can test once again get golr geneontology org cname to groovin pass back to nakama fix internal linking on nakama couldn t get it to work on static but general linking should be fixed take down beta labs warning leave backup site warning up plan on how to get another index built it looks like stanford is almost there so will punt fix displayed menu items | 1 |
492,263 | 14,199,352,828 | IssuesEvent | 2020-11-16 02:06:06 | InfinityGhost/OpenTabletDriver | https://api.github.com/repos/InfinityGhost/OpenTabletDriver | opened | Analog Bindings | breaking daemon enhancement gui plugins priority:low | ## Description
<!-- List what you would like to see added or changed, -->
<!-- Be descriptive and use images or video when possible. -->
- Takes in a floating point value, executes a function with that value
- Implements `IBinding` or reworks `IBinding` as a whole
- Must support `PropertyAttribute` in the rework | 1.0 | Analog Bindings - ## Description
<!-- List what you would like to see added or changed, -->
<!-- Be descriptive and use images or video when possible. -->
- Takes in a floating point value, executes a function with that value
- Implements `IBinding` or reworks `IBinding` as a whole
- Must support `PropertyAttribute` in the rework | non_usab | analog bindings description takes in a floating point value executes a function with that value implements ibinding or reworks ibinding as a whole must support propertyattribute in the rework | 0 |
9,993 | 6,538,711,878 | IssuesEvent | 2017-09-01 07:53:11 | p-org/PSharp | https://api.github.com/repos/p-org/PSharp | opened | Detecting non-determinism in tests | usability | This is probably a long-term issue. We should add the ability to detect non-determinism in tests, for instance, by noticing when we're unable to repro traces. Even better if we can help pinpoint the culprit. | True | Detecting non-determinism in tests - This is probably a long-term issue. We should add the ability to detect non-determinism in tests, for instance, by noticing when we're unable to repro traces. Even better if we can help pinpoint the culprit. | usab | detecting non determinism in tests this is probably a long term issue we should add the ability to detect non determinism in tests for instance by noticing when we re unable to repro traces even better if we can help pinpoint the culprit | 1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.