Unnamed: 0
int64
3
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
7
112
repo_url
stringlengths
36
141
action
stringclasses
3 values
title
stringlengths
2
742
labels
stringlengths
4
431
body
stringlengths
5
239k
index
stringclasses
10 values
text_combine
stringlengths
96
240k
label
stringclasses
2 values
text
stringlengths
96
200k
binary_label
int64
0
1
6,185
4,172,814,171
IssuesEvent
2016-06-21 08:14:44
coreos/bugs
https://api.github.com/repos/coreos/bugs
closed
Support for fully read-only rootfs (or overlay)
area/usability component/distro kind/question team/os
Previously `/etc` was read-only on CoreOS, but it's since been made writable after improvements. Is there an out-of-the-box way to make it so CoreOS resides entirely as a read-only image, or would I need to hack away at the internals? My use case for this would be using it as an embedded system image. Thoughts?
True
Support for fully read-only rootfs (or overlay) - Previously `/etc` was read-only on CoreOS, but it's since been made writable after improvements. Is there an out-of-the-box way to make it so CoreOS resides entirely as a read-only image, or would I need to hack away at the internals? My use case for this would be using it as an embedded system image. Thoughts?
usab
support for fully read only rootfs or overlay previously etc was read only on coreos but it s since been made writable after improvements is there an out of the box way to make it so coreos resides entirely as a read only image or would i need to hack away at the internals my use case for this would be using it as an embedded system image thoughts
1
6,648
4,422,428,000
IssuesEvent
2016-08-16 02:32:51
VirtualDisgrace/opencollar
https://api.github.com/repos/VirtualDisgrace/opencollar
closed
AO(s) get silently turned on at Collar detach/reattach
fixed usability
When a Collar is detach and gets reattached by default a command is send to the OC AO and Firestorm AO to turn it on again (this was to prevent turned off AOs from collar poses). How ever specially the detach is rather randomly working due to "does it execute before being off world, or does it execute suddenly on attach later again) ... This can have some weird side-effects and AOs get turned on when the collar gets attached/detached without having been turned on before. Lets rather remove this and in any case AOs are off, it is easy to turn them on again, but it is just strange if a "Off state" AO seems to be on and doing animations.
True
AO(s) get silently turned on at Collar detach/reattach - When a Collar is detach and gets reattached by default a command is send to the OC AO and Firestorm AO to turn it on again (this was to prevent turned off AOs from collar poses). How ever specially the detach is rather randomly working due to "does it execute before being off world, or does it execute suddenly on attach later again) ... This can have some weird side-effects and AOs get turned on when the collar gets attached/detached without having been turned on before. Lets rather remove this and in any case AOs are off, it is easy to turn them on again, but it is just strange if a "Off state" AO seems to be on and doing animations.
usab
ao s get silently turned on at collar detach reattach when a collar is detach and gets reattached by default a command is send to the oc ao and firestorm ao to turn it on again this was to prevent turned off aos from collar poses how ever specially the detach is rather randomly working due to does it execute before being off world or does it execute suddenly on attach later again this can have some weird side effects and aos get turned on when the collar gets attached detached without having been turned on before lets rather remove this and in any case aos are off it is easy to turn them on again but it is just strange if a off state ao seems to be on and doing animations
1
281,210
24,371,772,622
IssuesEvent
2022-10-03 19:58:43
appium/appium
https://api.github.com/repos/appium/appium
closed
iOS fails to hide_keyboard on appium-xcuitest-driver 4.11.1 with legit conditions
NotABug XCUITest
## The problem Trying to hide keyboard on iOS with corresponding python client method but receiving error: ``` [debug] [XCUITestDriver@4844 (b91203d3)] Proxying [POST /wda/keyboard/dismiss] to [POST http://127.0.0.1:8100/session/8840DD90-45AF-45C9-9BF7-7B5794C62824/wda/keyboard/dismiss] with body: {"keyNames":["Done","done"]} [XCUITestDriver@4844 (b91203d3)] Got response with status 400: {"value":{"error":"invalid element state","message":"Error Domain=com.facebook.WebDriverAgent Code=1 \"Did not know how to dismiss the keyboard. Try to dismiss it in the way supported by your application under test.\" UserInfo={NSLocalizedDescription=Did not know how to dismiss the keyboard. Try to dismiss it in the way supported by your application under test.}","traceback":""},"sessionId":"8840DD90-45AF-45C9-9BF7-7B5794C62824"} ``` ## Environment * Appium version (or git revision) that exhibits the issue: 1.22.3 * Last Appium version that did not exhibit the issue (if applicable): N/A * Desktop OS/version used to run Appium: macOS Monterey 12.5.1 * Node.js version (unless using Appium.app|exe): 18.9.1 * Npm or Yarn package manager: npm 8.19.1 * Mobile platform/version under test: 15.2 * Real device or emulator/simulator: real iPhone XS * Appium CLI or Appium.app|exe: CLI ## Additional versions (some were updated manually after appium npm installation): ``` ~/.nvm/versions/node/v18.9.1/lib/node_modules/appium/node_modules #v0.38.0  cat appium-xcuitest-driver/package.json| jq .version  0|3 ✘ 20:08:04 "4.11.1" ~/.nvm/versions/node/v18.9.1/lib/node_modules/appium/node_modules #v0.38.0  cat appium-ios-driver/package.json| jq .version  ✔ 20:08:07 "4.8.3" ~/.nvm/versions/node/v18.9.1/lib/node_modules/appium/node_modules #v0.38.0  cat appium-ios-device/package.json| jq .version  ✔ 20:08:35 "2.4.5" ~/.nvm/versions/node/v18.9.1/lib/node_modules/appium/node_modules #v0.38.0  cat appium-webdriveragent/package.json| jq .version  ✔ 20:08:43 "3.17.0" ~/.nvm/versions/node/v18.9.1/lib/node_modules/appium/node_modules #v0.38.0  cat appium-webdriveragent/package.json| jq .version ``` Appium-Python-Client==2.7.0 ## Details Almost the same case as https://github.com/appium/appium/issues/15073 but mine one has legit conditions (as Mykola pointed out https://github.com/appium/appium/issues/15073#issuecomment-770661510) - I have "Done" button and it is clearly visible with Inspector. Appium log provided executing python console line `driver.hide_keyboard(key_name="Done")`: ![python_debugger](https://user-images.githubusercontent.com/20490584/193639088-987f78a0-a025-4126-a1bb-2a575c936478.jpg) ![inspector](https://user-images.githubusercontent.com/20490584/193639166-209c1dc4-53dc-4949-b3c9-a02bf1884f45.jpg) Used capabilities (some values removed) to let know that nothing potentially related was used : ``` Creating session with W3C capabilities: { [debug] [XCUITestDriver@4844] "alwaysMatch": { [debug] [XCUITestDriver@4844] "platformName": "iOS", [debug] [XCUITestDriver@4844] "appium:automationName": "XCUITest", [debug] [XCUITestDriver@4844] "appium:udid": "<removed>", [debug] [XCUITestDriver@4844] "appium:derivedDataPath": "~/Library/Developer/Xcode/DerivedData", [debug] [XCUITestDriver@4844] "appium:xcodeOrgId": "<removed>", [debug] [XCUITestDriver@4844] "appium:xcodeSigningId": "<removed>", [debug] [XCUITestDriver@4844] "appium:usePrebuiltWDA": true, [debug] [XCUITestDriver@4844] "appium:showXcodeLog": true, [debug] [XCUITestDriver@4844] "appium:app": "<removed>" [debug] [XCUITestDriver@4844] }, [debug] [XCUITestDriver@4844] "firstMatch": [ [debug] [XCUITestDriver@4844] {} [debug] [XCUITestDriver@4844] ] [debug] [XCUITestDriver@4844] } ``` Also I want to point out that XCUITestDriver (and Inspector) sends "done" button label/name by default (when, for ex., no args passed to method) while all cases that I faced on iOS had capitalised "Done" label/name. I mean - default value has no use cases at all. ``` [debug] [W3C (e1285559)] Calling AppiumDriver.hideKeyboard() with args: [null,null,null,null,"e1285559-86b2-4b3c-bf27-00871ad90c52"] [debug] [XCUITestDriver@ab03 (e1285559)] Executing command 'hideKeyboard' [debug] [XCUITestDriver@ab03 (e1285559)] Proxying [POST /wda/keyboard/dismiss] to [POST http://127.0.0.1:8100/session/4E04A0F2-C8AC-43E9-BDBA-0219C437EF7B/wda/keyboard/dismiss] with body: {"keyNames":["done"]} ``` ## Link to Appium logs https://gist.github.com/ehabibov/6a6359c490fbf0d2b61cfb03f3224ef0 ## Code To Reproduce Issue [ Good To Have ] `driver.hide_keyboard("Done")`
1.0
iOS fails to hide_keyboard on appium-xcuitest-driver 4.11.1 with legit conditions - ## The problem Trying to hide keyboard on iOS with corresponding python client method but receiving error: ``` [debug] [XCUITestDriver@4844 (b91203d3)] Proxying [POST /wda/keyboard/dismiss] to [POST http://127.0.0.1:8100/session/8840DD90-45AF-45C9-9BF7-7B5794C62824/wda/keyboard/dismiss] with body: {"keyNames":["Done","done"]} [XCUITestDriver@4844 (b91203d3)] Got response with status 400: {"value":{"error":"invalid element state","message":"Error Domain=com.facebook.WebDriverAgent Code=1 \"Did not know how to dismiss the keyboard. Try to dismiss it in the way supported by your application under test.\" UserInfo={NSLocalizedDescription=Did not know how to dismiss the keyboard. Try to dismiss it in the way supported by your application under test.}","traceback":""},"sessionId":"8840DD90-45AF-45C9-9BF7-7B5794C62824"} ``` ## Environment * Appium version (or git revision) that exhibits the issue: 1.22.3 * Last Appium version that did not exhibit the issue (if applicable): N/A * Desktop OS/version used to run Appium: macOS Monterey 12.5.1 * Node.js version (unless using Appium.app|exe): 18.9.1 * Npm or Yarn package manager: npm 8.19.1 * Mobile platform/version under test: 15.2 * Real device or emulator/simulator: real iPhone XS * Appium CLI or Appium.app|exe: CLI ## Additional versions (some were updated manually after appium npm installation): ``` ~/.nvm/versions/node/v18.9.1/lib/node_modules/appium/node_modules #v0.38.0  cat appium-xcuitest-driver/package.json| jq .version  0|3 ✘ 20:08:04 "4.11.1" ~/.nvm/versions/node/v18.9.1/lib/node_modules/appium/node_modules #v0.38.0  cat appium-ios-driver/package.json| jq .version  ✔ 20:08:07 "4.8.3" ~/.nvm/versions/node/v18.9.1/lib/node_modules/appium/node_modules #v0.38.0  cat appium-ios-device/package.json| jq .version  ✔ 20:08:35 "2.4.5" ~/.nvm/versions/node/v18.9.1/lib/node_modules/appium/node_modules #v0.38.0  cat appium-webdriveragent/package.json| jq .version  ✔ 20:08:43 "3.17.0" ~/.nvm/versions/node/v18.9.1/lib/node_modules/appium/node_modules #v0.38.0  cat appium-webdriveragent/package.json| jq .version ``` Appium-Python-Client==2.7.0 ## Details Almost the same case as https://github.com/appium/appium/issues/15073 but mine one has legit conditions (as Mykola pointed out https://github.com/appium/appium/issues/15073#issuecomment-770661510) - I have "Done" button and it is clearly visible with Inspector. Appium log provided executing python console line `driver.hide_keyboard(key_name="Done")`: ![python_debugger](https://user-images.githubusercontent.com/20490584/193639088-987f78a0-a025-4126-a1bb-2a575c936478.jpg) ![inspector](https://user-images.githubusercontent.com/20490584/193639166-209c1dc4-53dc-4949-b3c9-a02bf1884f45.jpg) Used capabilities (some values removed) to let know that nothing potentially related was used : ``` Creating session with W3C capabilities: { [debug] [XCUITestDriver@4844] "alwaysMatch": { [debug] [XCUITestDriver@4844] "platformName": "iOS", [debug] [XCUITestDriver@4844] "appium:automationName": "XCUITest", [debug] [XCUITestDriver@4844] "appium:udid": "<removed>", [debug] [XCUITestDriver@4844] "appium:derivedDataPath": "~/Library/Developer/Xcode/DerivedData", [debug] [XCUITestDriver@4844] "appium:xcodeOrgId": "<removed>", [debug] [XCUITestDriver@4844] "appium:xcodeSigningId": "<removed>", [debug] [XCUITestDriver@4844] "appium:usePrebuiltWDA": true, [debug] [XCUITestDriver@4844] "appium:showXcodeLog": true, [debug] [XCUITestDriver@4844] "appium:app": "<removed>" [debug] [XCUITestDriver@4844] }, [debug] [XCUITestDriver@4844] "firstMatch": [ [debug] [XCUITestDriver@4844] {} [debug] [XCUITestDriver@4844] ] [debug] [XCUITestDriver@4844] } ``` Also I want to point out that XCUITestDriver (and Inspector) sends "done" button label/name by default (when, for ex., no args passed to method) while all cases that I faced on iOS had capitalised "Done" label/name. I mean - default value has no use cases at all. ``` [debug] [W3C (e1285559)] Calling AppiumDriver.hideKeyboard() with args: [null,null,null,null,"e1285559-86b2-4b3c-bf27-00871ad90c52"] [debug] [XCUITestDriver@ab03 (e1285559)] Executing command 'hideKeyboard' [debug] [XCUITestDriver@ab03 (e1285559)] Proxying [POST /wda/keyboard/dismiss] to [POST http://127.0.0.1:8100/session/4E04A0F2-C8AC-43E9-BDBA-0219C437EF7B/wda/keyboard/dismiss] with body: {"keyNames":["done"]} ``` ## Link to Appium logs https://gist.github.com/ehabibov/6a6359c490fbf0d2b61cfb03f3224ef0 ## Code To Reproduce Issue [ Good To Have ] `driver.hide_keyboard("Done")`
non_usab
ios fails to hide keyboard on appium xcuitest driver with legit conditions the problem trying to hide keyboard on ios with corresponding python client method but receiving error proxying to with body keynames got response with status value error invalid element state message error domain com facebook webdriveragent code did not know how to dismiss the keyboard try to dismiss it in the way supported by your application under test userinfo nslocalizeddescription did not know how to dismiss the keyboard try to dismiss it in the way supported by your application under test traceback sessionid environment appium version or git revision that exhibits the issue last appium version that did not exhibit the issue if applicable n a desktop os version used to run appium macos monterey node js version unless using appium app exe npm or yarn package manager npm mobile platform version under test real device or emulator simulator real iphone xs appium cli or appium app exe cli additional versions some were updated manually after appium npm installation nvm versions node lib node modules appium node modules  cat appium xcuitest driver package json jq version  ✘ nvm versions node lib node modules appium node modules  cat appium ios driver package json jq version  ✔ nvm versions node lib node modules appium node modules  cat appium ios device package json jq version  ✔ nvm versions node lib node modules appium node modules  cat appium webdriveragent package json jq version  ✔ nvm versions node lib node modules appium node modules  cat appium webdriveragent package json jq version appium python client details almost the same case as but mine one has legit conditions as mykola pointed out i have done button and it is clearly visible with inspector appium log provided executing python console line driver hide keyboard key name done used capabilities some values removed to let know that nothing potentially related was used creating session with capabilities alwaysmatch platformname ios appium automationname xcuitest appium udid appium deriveddatapath library developer xcode deriveddata appium xcodeorgid appium xcodesigningid appium useprebuiltwda true appium showxcodelog true appium app firstmatch also i want to point out that xcuitestdriver and inspector sends done button label name by default when for ex no args passed to method while all cases that i faced on ios had capitalised done label name i mean default value has no use cases at all calling appiumdriver hidekeyboard with args executing command hidekeyboard proxying to with body keynames link to appium logs code to reproduce issue driver hide keyboard done
0
26,648
27,044,135,860
IssuesEvent
2023-02-13 08:30:04
godotengine/godot-proposals
https://api.github.com/repos/godotengine/godot-proposals
closed
Disable long-press rename in the Scene tree dock to avoid conflicts with the node context menu in the Android editor
topic:editor platform:android usability
### Describe the project you are working on Game, developed using the android editor ### Describe the problem or limitation you are having in your project When trying to delete nodes from the scene tree, Godot attempts to rename them. To popup the right click menu, you have to long-press onto the icon of the node in the scene tree. I have big fingers, it's hard :D ### Describe the feature / enhancement and how it helps to overcome the problem or limitation disabling the long-press-rename helps accessing a menu that also offers the rename ability. renaming is a bit more tedious, perhaps the node name can be made editable with a textbox at the top of the inspector, if that isnt already the case ### Describe how your proposal will work, with code, pseudo-code, mock-ups, and/or diagrams see above ### If this enhancement will not be used often, can it be worked around with a few lines of script? it's the editor ### Is there a reason why this should be core and not an add-on in the asset library? it's the editor
True
Disable long-press rename in the Scene tree dock to avoid conflicts with the node context menu in the Android editor - ### Describe the project you are working on Game, developed using the android editor ### Describe the problem or limitation you are having in your project When trying to delete nodes from the scene tree, Godot attempts to rename them. To popup the right click menu, you have to long-press onto the icon of the node in the scene tree. I have big fingers, it's hard :D ### Describe the feature / enhancement and how it helps to overcome the problem or limitation disabling the long-press-rename helps accessing a menu that also offers the rename ability. renaming is a bit more tedious, perhaps the node name can be made editable with a textbox at the top of the inspector, if that isnt already the case ### Describe how your proposal will work, with code, pseudo-code, mock-ups, and/or diagrams see above ### If this enhancement will not be used often, can it be worked around with a few lines of script? it's the editor ### Is there a reason why this should be core and not an add-on in the asset library? it's the editor
usab
disable long press rename in the scene tree dock to avoid conflicts with the node context menu in the android editor describe the project you are working on game developed using the android editor describe the problem or limitation you are having in your project when trying to delete nodes from the scene tree godot attempts to rename them to popup the right click menu you have to long press onto the icon of the node in the scene tree i have big fingers it s hard d describe the feature enhancement and how it helps to overcome the problem or limitation disabling the long press rename helps accessing a menu that also offers the rename ability renaming is a bit more tedious perhaps the node name can be made editable with a textbox at the top of the inspector if that isnt already the case describe how your proposal will work with code pseudo code mock ups and or diagrams see above if this enhancement will not be used often can it be worked around with a few lines of script it s the editor is there a reason why this should be core and not an add on in the asset library it s the editor
1
20,213
15,145,223,805
IssuesEvent
2021-02-11 03:47:39
joe-daywalt-games/BitmapFontCutterPlus
https://api.github.com/repos/joe-daywalt-games/BitmapFontCutterPlus
closed
Having to specify the characters in order can be a pain, especially when omitting chars.
t:usability v:high
This typically means leaving big gaps of carefully counted blanks between used characters. It's tedious, error-prone, and not respectful of memory.
True
Having to specify the characters in order can be a pain, especially when omitting chars. - This typically means leaving big gaps of carefully counted blanks between used characters. It's tedious, error-prone, and not respectful of memory.
usab
having to specify the characters in order can be a pain especially when omitting chars this typically means leaving big gaps of carefully counted blanks between used characters it s tedious error prone and not respectful of memory
1
6,503
4,322,037,777
IssuesEvent
2016-07-25 12:45:37
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Exposed int script variables have a maximum limit of 65535
enhancement topic:editor usability
If you export an int variable from script like this: export(int) var my_var it can only be set to a maximum of 65,535 via the editor as the editor clamps it to that, despite it being able to hold a much larger number.
True
Exposed int script variables have a maximum limit of 65535 - If you export an int variable from script like this: export(int) var my_var it can only be set to a maximum of 65,535 via the editor as the editor clamps it to that, despite it being able to hold a much larger number.
usab
exposed int script variables have a maximum limit of if you export an int variable from script like this export int var my var it can only be set to a maximum of via the editor as the editor clamps it to that despite it being able to hold a much larger number
1
56,646
15,255,943,426
IssuesEvent
2021-02-20 18:07:10
ophrescue/RescueRails
https://api.github.com/repos/ophrescue/RescueRails
opened
Image Gallery Bug on Mobile Chrome
Defect
> While browsing DMS on mobile chrome (iOS) you can only view a different picture once and then it won’t change pictures again.
1.0
Image Gallery Bug on Mobile Chrome - > While browsing DMS on mobile chrome (iOS) you can only view a different picture once and then it won’t change pictures again.
non_usab
image gallery bug on mobile chrome while browsing dms on mobile chrome ios you can only view a different picture once and then it won’t change pictures again
0
12,880
8,142,911,802
IssuesEvent
2018-08-21 09:09:58
xcat2/xcat-core
https://api.github.com/repos/xcat2/xcat-core
closed
liteimg should display some initial message and progress messages to avoid appearing like a hung command
sprint1 status:pending type:usability
Running `liteimg` caused me some concern because I was not sure how long it would take, and no output is printed to the console.... ``` # liteimg rhels7.5-SP1.1.Frank.IST ``` Then once it's complete, the following messages come out: ``` going to modify /install/netboot/rhels7.5-SP1.1/ppc64le/rhels7.5-SP1.1.Frank.IST/rootimg done. add image info to xcatinfo file Packing contents of /install/netboot/rhels7.5-SP1.1/ppc64le/rhels7.5-SP1.1.Frank.IST/rootimg compress method: gzip ``` So I don't really like the output, since it's so different from `packimage`. I'd like to propose the following externals changes to more match `packimage` with my comments next to each line... ``` # packimage rhels7.5-SP1.1.Frank.IST Modifying /install/netboot/rhels7.5-SP1.1/ppc64le/rhels7.5-SP1.1.Frank.IST/rootimg ... <==== this should print out immediately, so the user knows the command has started... add image info to xcatinfo file <==== delete this line, or show with verbose Packing contents of /install/netboot/rhels7.5-SP1.1/ppc64le/rhels7.5-SP1.1.Frank.IST/rootimg compress method: cpio <==== this should print BEFORE the packing is done... not at the end. ```
True
liteimg should display some initial message and progress messages to avoid appearing like a hung command - Running `liteimg` caused me some concern because I was not sure how long it would take, and no output is printed to the console.... ``` # liteimg rhels7.5-SP1.1.Frank.IST ``` Then once it's complete, the following messages come out: ``` going to modify /install/netboot/rhels7.5-SP1.1/ppc64le/rhels7.5-SP1.1.Frank.IST/rootimg done. add image info to xcatinfo file Packing contents of /install/netboot/rhels7.5-SP1.1/ppc64le/rhels7.5-SP1.1.Frank.IST/rootimg compress method: gzip ``` So I don't really like the output, since it's so different from `packimage`. I'd like to propose the following externals changes to more match `packimage` with my comments next to each line... ``` # packimage rhels7.5-SP1.1.Frank.IST Modifying /install/netboot/rhels7.5-SP1.1/ppc64le/rhels7.5-SP1.1.Frank.IST/rootimg ... <==== this should print out immediately, so the user knows the command has started... add image info to xcatinfo file <==== delete this line, or show with verbose Packing contents of /install/netboot/rhels7.5-SP1.1/ppc64le/rhels7.5-SP1.1.Frank.IST/rootimg compress method: cpio <==== this should print BEFORE the packing is done... not at the end. ```
usab
liteimg should display some initial message and progress messages to avoid appearing like a hung command running liteimg caused me some concern because i was not sure how long it would take and no output is printed to the console liteimg frank ist then once it s complete the following messages come out going to modify install netboot frank ist rootimg done add image info to xcatinfo file packing contents of install netboot frank ist rootimg compress method gzip so i don t really like the output since it s so different from packimage i d like to propose the following externals changes to more match packimage with my comments next to each line packimage frank ist modifying install netboot frank ist rootimg this should print out immediately so the user knows the command has started add image info to xcatinfo file delete this line or show with verbose packing contents of install netboot frank ist rootimg compress method cpio this should print before the packing is done not at the end
1
8,621
5,870,646,292
IssuesEvent
2017-05-15 05:54:03
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Browse for file dialog - incorrect ordering
enhancement junior job topic:core topic:editor usability
**Operating system or device - Godot version:** Godot_v2.1.3-stable_win64 **Issue description:** When importing a large number of files (textures in my case) the browse for file dialog does not order the file list correctly, which makes it difficult for building SpriteFrames because I must click individually through the files to have the correct frames loaded in order. As you can see from the screenshot the order is 0, 1, 10, 1000. Note that when I open up a folder in Windows I do get the correct order, so this behaviour is a bit surprising. **Steps to reproduce:** Import -> Texture -> Click the '...' button next to source textures, and browse to a folder with a large list of numbered images. **Link to minimal example project:** ![screen](https://cloud.githubusercontent.com/assets/1334173/25900578/cec40590-358b-11e7-903b-25b0f8b0a93d.png) Additional information: I am guessing the offending line is below which uses a NoCaseComparator: https://github.com/godotengine/godot/blob/df61dc4b2bd54a5a40c515493c76f5a458e5b541/scene/gui/file_dialog.cpp#L340 The link below shows a sorting implementation for this: https://psycodedeveloper.wordpress.com/2013/04/11/numeric-sort-file-system-names-in-c-like-windows-explorer/
True
Browse for file dialog - incorrect ordering - **Operating system or device - Godot version:** Godot_v2.1.3-stable_win64 **Issue description:** When importing a large number of files (textures in my case) the browse for file dialog does not order the file list correctly, which makes it difficult for building SpriteFrames because I must click individually through the files to have the correct frames loaded in order. As you can see from the screenshot the order is 0, 1, 10, 1000. Note that when I open up a folder in Windows I do get the correct order, so this behaviour is a bit surprising. **Steps to reproduce:** Import -> Texture -> Click the '...' button next to source textures, and browse to a folder with a large list of numbered images. **Link to minimal example project:** ![screen](https://cloud.githubusercontent.com/assets/1334173/25900578/cec40590-358b-11e7-903b-25b0f8b0a93d.png) Additional information: I am guessing the offending line is below which uses a NoCaseComparator: https://github.com/godotengine/godot/blob/df61dc4b2bd54a5a40c515493c76f5a458e5b541/scene/gui/file_dialog.cpp#L340 The link below shows a sorting implementation for this: https://psycodedeveloper.wordpress.com/2013/04/11/numeric-sort-file-system-names-in-c-like-windows-explorer/
usab
browse for file dialog incorrect ordering operating system or device godot version godot stable issue description when importing a large number of files textures in my case the browse for file dialog does not order the file list correctly which makes it difficult for building spriteframes because i must click individually through the files to have the correct frames loaded in order as you can see from the screenshot the order is note that when i open up a folder in windows i do get the correct order so this behaviour is a bit surprising steps to reproduce import texture click the button next to source textures and browse to a folder with a large list of numbered images link to minimal example project additional information i am guessing the offending line is below which uses a nocasecomparator the link below shows a sorting implementation for this
1
694,031
23,799,491,328
IssuesEvent
2022-09-03 03:50:58
googleapis/google-cloud-go
https://api.github.com/repos/googleapis/google-cloud-go
closed
spanner/spansql: Add support for COALESCE expressions
api: spanner triage me priority: p3
**Is your feature request related to a problem? Please describe.** A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] COALESCE expressions are not supported now. https://cloud.google.com/spanner/docs/reference/standard-sql/functions-and-operators#coalesce **Describe the solution you'd like** A clear and concise description of what you want to happen. What should the API be? How would you use it? Add support for COALESCE expressions to the SQL statement parser and builder. **Describe alternatives you've considered** A clear and concise description of any alternative solutions or features you've considered. **Additional context** Add any other context or screenshots about the feature request here.
1.0
spanner/spansql: Add support for COALESCE expressions - **Is your feature request related to a problem? Please describe.** A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] COALESCE expressions are not supported now. https://cloud.google.com/spanner/docs/reference/standard-sql/functions-and-operators#coalesce **Describe the solution you'd like** A clear and concise description of what you want to happen. What should the API be? How would you use it? Add support for COALESCE expressions to the SQL statement parser and builder. **Describe alternatives you've considered** A clear and concise description of any alternative solutions or features you've considered. **Additional context** Add any other context or screenshots about the feature request here.
non_usab
spanner spansql add support for coalesce expressions is your feature request related to a problem please describe a clear and concise description of what the problem is ex i m always frustrated when coalesce expressions are not supported now describe the solution you d like a clear and concise description of what you want to happen what should the api be how would you use it add support for coalesce expressions to the sql statement parser and builder describe alternatives you ve considered a clear and concise description of any alternative solutions or features you ve considered additional context add any other context or screenshots about the feature request here
0
31,649
2,735,073,186
IssuesEvent
2015-04-18 02:07:25
GoogleCloudPlatform/kubernetes
https://api.github.com/repos/GoogleCloudPlatform/kubernetes
closed
the container data lost when restart k8s cluster env
priority/support
hi, I meet some questions when use kubernetes cluster, please kindly help me if you know the reason. 1.The pod container's data lost when restart k8s cluster, I find replicatorController will create a new pod other than restart the pod container when start the cluster. I set the "restartPolicy" for replicatorController, but failed. 2.how to link containers in k8s? define a service for the pods? it's likely different with docker. thanks
1.0
the container data lost when restart k8s cluster env - hi, I meet some questions when use kubernetes cluster, please kindly help me if you know the reason. 1.The pod container's data lost when restart k8s cluster, I find replicatorController will create a new pod other than restart the pod container when start the cluster. I set the "restartPolicy" for replicatorController, but failed. 2.how to link containers in k8s? define a service for the pods? it's likely different with docker. thanks
non_usab
the container data lost when restart cluster env hi i meet some questions when use kubernetes cluster please kindly help me if you know the reason the pod container s data lost when restart cluster i find replicatorcontroller will create a new pod other than restart the pod container when start the cluster i set the restartpolicy for replicatorcontroller but failed how to link containers in define a service for the pods it s likely different with docker thanks
0
17,291
11,868,325,763
IssuesEvent
2020-03-26 08:59:07
felixerdy/origami
https://api.github.com/repos/felixerdy/origami
closed
Setting screen closure
creategame enhancement usability
**Expected behavior** The settings screen should only close by clicking the save-button or the X. **Actual behavior** The settings screen closes each time the user accidentally clicks next to the screen.
True
Setting screen closure - **Expected behavior** The settings screen should only close by clicking the save-button or the X. **Actual behavior** The settings screen closes each time the user accidentally clicks next to the screen.
usab
setting screen closure expected behavior the settings screen should only close by clicking the save button or the x actual behavior the settings screen closes each time the user accidentally clicks next to the screen
1
3,188
3,367,799,027
IssuesEvent
2015-11-22 13:56:28
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Editor font setting is not applied when open gd file from FileSystem tab
bug topic:editor usability
reproduce steps 1. Set custom font at Editor Settings > Global > Font 2. Browse gd file in FileSystem panel 3. Open gd file which is not already opened.
True
Editor font setting is not applied when open gd file from FileSystem tab - reproduce steps 1. Set custom font at Editor Settings > Global > Font 2. Browse gd file in FileSystem panel 3. Open gd file which is not already opened.
usab
editor font setting is not applied when open gd file from filesystem tab reproduce steps set custom font at editor settings global font browse gd file in filesystem panel open gd file which is not already opened
1
327,614
28,073,428,146
IssuesEvent
2023-03-29 20:57:55
elastic/kibana
https://api.github.com/repos/elastic/kibana
opened
Failing test: Jest Integration Tests.src/plugins/files/server/routes/file_kind/integration_tests - File kind HTTP API list shares
failed-test
A test failed on a tracked branch ``` Error: Unable to read snapshot manifest: Internal Server Error <?xml version='1.0' encoding='UTF-8'?><Error><Code>InternalError</Code><Message>We encountered an internal error. Please try again.</Message><Details>AMJxxAvYGMCv3RmB7FnTF6UK1xl4ft0Qtb7JdQj7ksKRHttXnuw06WfOyRWgK63fjXmBmsuiTtObK28mpTZzcdKcC58LCVhHFb5LMbmK7owwBnznAAHrz7JTytl7KuyKhBPg1T8ZquNC</Details></Error> at getArtifactSpecForSnapshot (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/artifact.ts:151:11) at runMicrotasks (<anonymous>) at processTicksAndRejections (node:internal/process/task_queues:96:5) at Function.getSnapshot (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/artifact.ts:194:26) at downloadSnapshot (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/install/install_snapshot.ts:43:20) at installSnapshot (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/install/install_snapshot.ts:70:28) at /var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/cluster.js:101:31 at /var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-tooling-log/src/tooling_log.ts:84:18 at Cluster.installSnapshot (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/cluster.js:100:12) at TestCluster.start (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-test/src/es/test_es_cluster.ts:220:24) at startES (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/core/test-helpers/core-test-helpers-kbn-server/src/create_root.ts:268:7) at setupIntegrationEnvironment (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/src/plugins/files/server/test_utils/setup_integration_environment.ts:85:20) at Object.<anonymous> (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/src/plugins/files/server/routes/file_kind/integration_tests/file_kind_http.test.ts:20:19) ``` First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/28476#01872f0c-2836-4113-ad6e-954d8d472f5c) <!-- kibanaCiData = {"failed-test":{"test.class":"Jest Integration Tests.src/plugins/files/server/routes/file_kind/integration_tests","test.name":"File kind HTTP API list shares","test.failCount":1}} -->
1.0
Failing test: Jest Integration Tests.src/plugins/files/server/routes/file_kind/integration_tests - File kind HTTP API list shares - A test failed on a tracked branch ``` Error: Unable to read snapshot manifest: Internal Server Error <?xml version='1.0' encoding='UTF-8'?><Error><Code>InternalError</Code><Message>We encountered an internal error. Please try again.</Message><Details>AMJxxAvYGMCv3RmB7FnTF6UK1xl4ft0Qtb7JdQj7ksKRHttXnuw06WfOyRWgK63fjXmBmsuiTtObK28mpTZzcdKcC58LCVhHFb5LMbmK7owwBnznAAHrz7JTytl7KuyKhBPg1T8ZquNC</Details></Error> at getArtifactSpecForSnapshot (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/artifact.ts:151:11) at runMicrotasks (<anonymous>) at processTicksAndRejections (node:internal/process/task_queues:96:5) at Function.getSnapshot (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/artifact.ts:194:26) at downloadSnapshot (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/install/install_snapshot.ts:43:20) at installSnapshot (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/install/install_snapshot.ts:70:28) at /var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/cluster.js:101:31 at /var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-tooling-log/src/tooling_log.ts:84:18 at Cluster.installSnapshot (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-es/src/cluster.js:100:12) at TestCluster.start (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/kbn-test/src/es/test_es_cluster.ts:220:24) at startES (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/packages/core/test-helpers/core-test-helpers-kbn-server/src/create_root.ts:268:7) at setupIntegrationEnvironment (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/src/plugins/files/server/test_utils/setup_integration_environment.ts:85:20) at Object.<anonymous> (/var/lib/buildkite-agent/builds/kb-n2-4-spot-a56a6fe843560bb5/elastic/kibana-on-merge/kibana/src/plugins/files/server/routes/file_kind/integration_tests/file_kind_http.test.ts:20:19) ``` First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/28476#01872f0c-2836-4113-ad6e-954d8d472f5c) <!-- kibanaCiData = {"failed-test":{"test.class":"Jest Integration Tests.src/plugins/files/server/routes/file_kind/integration_tests","test.name":"File kind HTTP API list shares","test.failCount":1}} -->
non_usab
failing test jest integration tests src plugins files server routes file kind integration tests file kind http api list shares a test failed on a tracked branch error unable to read snapshot manifest internal server error internalerror we encountered an internal error please try again at getartifactspecforsnapshot var lib buildkite agent builds kb spot elastic kibana on merge kibana packages kbn es src artifact ts at runmicrotasks at processticksandrejections node internal process task queues at function getsnapshot var lib buildkite agent builds kb spot elastic kibana on merge kibana packages kbn es src artifact ts at downloadsnapshot var lib buildkite agent builds kb spot elastic kibana on merge kibana packages kbn es src install install snapshot ts at installsnapshot var lib buildkite agent builds kb spot elastic kibana on merge kibana packages kbn es src install install snapshot ts at var lib buildkite agent builds kb spot elastic kibana on merge kibana packages kbn es src cluster js at var lib buildkite agent builds kb spot elastic kibana on merge kibana packages kbn tooling log src tooling log ts at cluster installsnapshot var lib buildkite agent builds kb spot elastic kibana on merge kibana packages kbn es src cluster js at testcluster start var lib buildkite agent builds kb spot elastic kibana on merge kibana packages kbn test src es test es cluster ts at startes var lib buildkite agent builds kb spot elastic kibana on merge kibana packages core test helpers core test helpers kbn server src create root ts at setupintegrationenvironment var lib buildkite agent builds kb spot elastic kibana on merge kibana src plugins files server test utils setup integration environment ts at object var lib buildkite agent builds kb spot elastic kibana on merge kibana src plugins files server routes file kind integration tests file kind http test ts first failure
0
1,475
2,856,566,493
IssuesEvent
2015-06-02 15:30:27
Graylog2/graylog2-web-interface
https://api.github.com/repos/Graylog2/graylog2-web-interface
closed
Move terminate input button to somewhere less prominent
usability
right now i feel the urge to click it every time i'm on the page ![](http://25.media.tumblr.com/tumblr_m1vo4gXNN41qzewwzo1_500.gif)
True
Move terminate input button to somewhere less prominent - right now i feel the urge to click it every time i'm on the page ![](http://25.media.tumblr.com/tumblr_m1vo4gXNN41qzewwzo1_500.gif)
usab
move terminate input button to somewhere less prominent right now i feel the urge to click it every time i m on the page
1
13,091
8,248,901,597
IssuesEvent
2018-09-11 19:52:57
uber/hudi
https://api.github.com/repos/uber/hudi
closed
Fixing Spark & Hive jar mismatch for hive registration via hoodie-hive
usability
This is a hairy issue. Spark comes with its version of Hive, which could be different from what version of Hive itself being run. Ultimately since Hoodie is a spark app, this means any incompatibility here prevents hivesync being done inline from a tool like HoodieDeltaStreamer, and forced to run a separate task on a workflow engine.. We need a long term fix for this, to be able to seamlessly register Hive tables from a Hoodie datasource (like you can with HiveContext) * Spark 2.1 still uses hive 1.2, which is different from the CDH version. Running into this (https://www.bountysource.com/issues/1366324-newer-versions-of-jdbc-driver-does-not-work-with-older-hiveserver2) * What does Spark itself do? Thin client to talk to Hive?
True
Fixing Spark & Hive jar mismatch for hive registration via hoodie-hive - This is a hairy issue. Spark comes with its version of Hive, which could be different from what version of Hive itself being run. Ultimately since Hoodie is a spark app, this means any incompatibility here prevents hivesync being done inline from a tool like HoodieDeltaStreamer, and forced to run a separate task on a workflow engine.. We need a long term fix for this, to be able to seamlessly register Hive tables from a Hoodie datasource (like you can with HiveContext) * Spark 2.1 still uses hive 1.2, which is different from the CDH version. Running into this (https://www.bountysource.com/issues/1366324-newer-versions-of-jdbc-driver-does-not-work-with-older-hiveserver2) * What does Spark itself do? Thin client to talk to Hive?
usab
fixing spark hive jar mismatch for hive registration via hoodie hive this is a hairy issue spark comes with its version of hive which could be different from what version of hive itself being run ultimately since hoodie is a spark app this means any incompatibility here prevents hivesync being done inline from a tool like hoodiedeltastreamer and forced to run a separate task on a workflow engine we need a long term fix for this to be able to seamlessly register hive tables from a hoodie datasource like you can with hivecontext spark still uses hive which is different from the cdh version running into this what does spark itself do thin client to talk to hive
1
1,048
2,702,121,673
IssuesEvent
2015-04-06 01:56:36
piwik/piwik
https://api.github.com/repos/piwik/piwik
closed
Skip to Content overlaps with top menu
c: Usability Task
As described in https://github.com/piwik/piwik/pull/7025#issuecomment-81567476 The `Skip to content` link overlaps with top menu: ![skip to content](https://cloud.githubusercontent.com/assets/466765/6677890/00367a44-cc99-11e4-8f02-175cf7ae73f2.png)
True
Skip to Content overlaps with top menu - As described in https://github.com/piwik/piwik/pull/7025#issuecomment-81567476 The `Skip to content` link overlaps with top menu: ![skip to content](https://cloud.githubusercontent.com/assets/466765/6677890/00367a44-cc99-11e4-8f02-175cf7ae73f2.png)
usab
skip to content overlaps with top menu as described in the skip to content link overlaps with top menu
1
7,300
4,866,200,821
IssuesEvent
2016-11-14 22:57:45
rabbitmq/rabbitmq-shovel
https://api.github.com/repos/rabbitmq/rabbitmq-shovel
opened
CLI extension for server status
effort-low enhancement usability
Now that [new CLI tools](https://github.com/rabbitmq/rabbitmq-cli) are merged, we should take advantage of their extensibility and provide a command for Shovel status: `rabbitmqctl shovel-status` (aliased as `rabbitmq-diagnostics shovel-status`).
True
CLI extension for server status - Now that [new CLI tools](https://github.com/rabbitmq/rabbitmq-cli) are merged, we should take advantage of their extensibility and provide a command for Shovel status: `rabbitmqctl shovel-status` (aliased as `rabbitmq-diagnostics shovel-status`).
usab
cli extension for server status now that are merged we should take advantage of their extensibility and provide a command for shovel status rabbitmqctl shovel status aliased as rabbitmq diagnostics shovel status
1
5,458
3,929,992,979
IssuesEvent
2016-04-25 04:56:32
OpenZWave/open-zwave
https://api.github.com/repos/OpenZWave/open-zwave
closed
Error in documentation
Usability
Hello, I found an error in the documentation of the Notification class and more precisely the Notification::Type_ControllerCommand enumeration value. Indeed the documentation said that: * Notification::GetEvent returns a Driver::ControllerCommand and * Notification::GetNotification returns a Driver::ControllerState but in fact and after looking at the code on github directly (https://github.com/OpenZWave/open-zwave/blob/master/cpp/src/Driver.cpp#L5511) I found that: * Notification::GetEvent returns a Driver::ControllerState and * Notification::GetNotification returns a Driver::ControllerError I hope this will help you. Regards, Vincent
True
Error in documentation - Hello, I found an error in the documentation of the Notification class and more precisely the Notification::Type_ControllerCommand enumeration value. Indeed the documentation said that: * Notification::GetEvent returns a Driver::ControllerCommand and * Notification::GetNotification returns a Driver::ControllerState but in fact and after looking at the code on github directly (https://github.com/OpenZWave/open-zwave/blob/master/cpp/src/Driver.cpp#L5511) I found that: * Notification::GetEvent returns a Driver::ControllerState and * Notification::GetNotification returns a Driver::ControllerError I hope this will help you. Regards, Vincent
usab
error in documentation hello i found an error in the documentation of the notification class and more precisely the notification type controllercommand enumeration value indeed the documentation said that notification getevent returns a driver controllercommand and notification getnotification returns a driver controllerstate but in fact and after looking at the code on github directly i found that notification getevent returns a driver controllerstate and notification getnotification returns a driver controllererror i hope this will help you regards vincent
1
25,418
25,162,636,110
IssuesEvent
2022-11-10 17:59:09
privacy-tech-lab/privacy-pioneer
https://api.github.com/repos/privacy-tech-lab/privacy-pioneer
closed
Pre usability study improvements
bug fine tuning optimization usability
- [x] Add unique pop-up message on home page <img width="160" alt="Screen Shot 2022-10-16 at 1 07 59 PM" src="https://user-images.githubusercontent.com/97986810/196048607-5f5c5cd5-5d70-45a2-8300-5ae5c2b0ba0b.png"> - [x] Add watchlist hover label for automatically generated keywords <img width="400" alt="Screen Shot 2022-10-11 at 11 54 22 PM" src="https://user-images.githubusercontent.com/97986810/196048633-69b64a21-1930-41a7-8861-9dff829de97a.png"> - [x] Clarify the purpose or remove the "system default" mode in the viewing options on the settings page <img width="250" alt="Screen Shot 2022-10-13 at 11 24 10 PM" src="https://user-images.githubusercontent.com/97986810/196048702-aece760a-5efb-43ef-80cf-4bb37c215cff.png">
True
Pre usability study improvements - - [x] Add unique pop-up message on home page <img width="160" alt="Screen Shot 2022-10-16 at 1 07 59 PM" src="https://user-images.githubusercontent.com/97986810/196048607-5f5c5cd5-5d70-45a2-8300-5ae5c2b0ba0b.png"> - [x] Add watchlist hover label for automatically generated keywords <img width="400" alt="Screen Shot 2022-10-11 at 11 54 22 PM" src="https://user-images.githubusercontent.com/97986810/196048633-69b64a21-1930-41a7-8861-9dff829de97a.png"> - [x] Clarify the purpose or remove the "system default" mode in the viewing options on the settings page <img width="250" alt="Screen Shot 2022-10-13 at 11 24 10 PM" src="https://user-images.githubusercontent.com/97986810/196048702-aece760a-5efb-43ef-80cf-4bb37c215cff.png">
usab
pre usability study improvements add unique pop up message on home page img width alt screen shot at pm src add watchlist hover label for automatically generated keywords img width alt screen shot at pm src clarify the purpose or remove the system default mode in the viewing options on the settings page img width alt screen shot at pm src
1
24,608
24,015,464,932
IssuesEvent
2022-09-14 23:54:03
dgraph-io/dgraph
https://api.github.com/repos/dgraph-io/dgraph
reopened
Zero's /health endpoint returns just "Ok" where the same Alpha's endpoint returns a JSON
kind/enhancement status/accepted area/usability
I'm testing Dgraph 1.2.3 version and notice there is a difference in `/health` endpoints for Zero and Alpha. It would be good to unify that endpoint to return the same JSON structure. Zero's response to `curl http://localhost:6080/health` ``` Ok ``` Alpha's reponse to `curl http://localhost:8080/health`: ``` {"version":"v1.2.3","instance":"alpha","uptime":59131} ```
True
Zero's /health endpoint returns just "Ok" where the same Alpha's endpoint returns a JSON - I'm testing Dgraph 1.2.3 version and notice there is a difference in `/health` endpoints for Zero and Alpha. It would be good to unify that endpoint to return the same JSON structure. Zero's response to `curl http://localhost:6080/health` ``` Ok ``` Alpha's reponse to `curl http://localhost:8080/health`: ``` {"version":"v1.2.3","instance":"alpha","uptime":59131} ```
usab
zero s health endpoint returns just ok where the same alpha s endpoint returns a json i m testing dgraph version and notice there is a difference in health endpoints for zero and alpha it would be good to unify that endpoint to return the same json structure zero s response to curl ok alpha s reponse to curl version instance alpha uptime
1
98,840
30,193,928,752
IssuesEvent
2023-07-04 18:18:47
easybuilders/easybuild
https://api.github.com/repos/easybuilders/easybuild
closed
Toolchain Support Policy - EasyBuild 5
EasyBuild-5.0 feedback
Work has started on [EasyBuild 5](https://docs.easybuild.io/easybuild-v5/overview-of-changes) and we, the EasyBuild maintainers, are requesting community feedback on some potential changes. If you will be impacted by this proposed change then please leave feedback below. ## Proposed Change For the central EasyBuild repositories, we will support a set of toolchain generations. In year *X* (example using 2023): * Accept PRs only for toolchains *X-2* * `2023a/b`, `2022a/b`, `2021a/b` * Deprecate toolchains *X-3* * `2020a/b` * Close PRs and issues for these toolchains * Archive easyconfigs using toolchain version *X-4* * `2019a/b` (and older) ## Background The central easyconfigs repository is intended to provide references easyconfigs. For the reference easyconfigs we aim to have only one version of a software being used as a dependency in each toolchain generation. (There are exceptions, but we aim to keep these limited.) Sites and users can then supplement these easyconfigs via there own collection of easyconfigs. This additional collection is added via the [robot search path](https://docs.easybuild.io/using-easybuild/#robot_search_path). ## Benefits * Toolchain generations are year based and this aligns the support with that, rather than EasyBuild versions. * Focus community effort of the more recent toolchain generations. * Reduce maintainer workload, and testing time, related to processing easyconfigs from older toolchain generations. ## Drawbacks * There are currently only 4 supported toolchain generations. ## Alternatives ### Alternative 1 As above, but with each step being 1 year older. So, review (*X-3*); deprecate and close (*X-4*); and archive (*X-5*) ### Alternative 2 Base it on the last *6* common toolchains, instead of years. So, review (last *6*); deprecate and close (*7*); and archive (*8*).
1.0
Toolchain Support Policy - EasyBuild 5 - Work has started on [EasyBuild 5](https://docs.easybuild.io/easybuild-v5/overview-of-changes) and we, the EasyBuild maintainers, are requesting community feedback on some potential changes. If you will be impacted by this proposed change then please leave feedback below. ## Proposed Change For the central EasyBuild repositories, we will support a set of toolchain generations. In year *X* (example using 2023): * Accept PRs only for toolchains *X-2* * `2023a/b`, `2022a/b`, `2021a/b` * Deprecate toolchains *X-3* * `2020a/b` * Close PRs and issues for these toolchains * Archive easyconfigs using toolchain version *X-4* * `2019a/b` (and older) ## Background The central easyconfigs repository is intended to provide references easyconfigs. For the reference easyconfigs we aim to have only one version of a software being used as a dependency in each toolchain generation. (There are exceptions, but we aim to keep these limited.) Sites and users can then supplement these easyconfigs via there own collection of easyconfigs. This additional collection is added via the [robot search path](https://docs.easybuild.io/using-easybuild/#robot_search_path). ## Benefits * Toolchain generations are year based and this aligns the support with that, rather than EasyBuild versions. * Focus community effort of the more recent toolchain generations. * Reduce maintainer workload, and testing time, related to processing easyconfigs from older toolchain generations. ## Drawbacks * There are currently only 4 supported toolchain generations. ## Alternatives ### Alternative 1 As above, but with each step being 1 year older. So, review (*X-3*); deprecate and close (*X-4*); and archive (*X-5*) ### Alternative 2 Base it on the last *6* common toolchains, instead of years. So, review (last *6*); deprecate and close (*7*); and archive (*8*).
non_usab
toolchain support policy easybuild work has started on and we the easybuild maintainers are requesting community feedback on some potential changes if you will be impacted by this proposed change then please leave feedback below proposed change for the central easybuild repositories we will support a set of toolchain generations in year x example using accept prs only for toolchains x b b b deprecate toolchains x b close prs and issues for these toolchains archive easyconfigs using toolchain version x b and older background the central easyconfigs repository is intended to provide references easyconfigs for the reference easyconfigs we aim to have only one version of a software being used as a dependency in each toolchain generation there are exceptions but we aim to keep these limited sites and users can then supplement these easyconfigs via there own collection of easyconfigs this additional collection is added via the benefits toolchain generations are year based and this aligns the support with that rather than easybuild versions focus community effort of the more recent toolchain generations reduce maintainer workload and testing time related to processing easyconfigs from older toolchain generations drawbacks there are currently only supported toolchain generations alternatives alternative as above but with each step being year older so review x deprecate and close x and archive x alternative base it on the last common toolchains instead of years so review last deprecate and close and archive
0
7,635
5,100,928,952
IssuesEvent
2017-01-04 14:01:48
lionheart/openradar-mirror
https://api.github.com/repos/lionheart/openradar-mirror
opened
29863723: iOS 10: Cannot edit a contact opened from Spotlight
classification:ui/usability reproducible:always status:open
#### Description Opened a contact from Spotlight, wanted to edit it. Can't. How to Reproduce? • Look for a contact in Spotlight. • Tap on it's name — the card shows • Want to edit Expected Results An Edit button somewhere or any other UI, to at least open that contact in the Contacts/Phone app Actual Results Nothing. Nada. Nichts. - Product Version: 10.2 Created: 2017-01-04T13:09:29.590210 Originated: 2017-01-04T00:00:00 Open Radar Link: http://www.openradar.me/29863723
True
29863723: iOS 10: Cannot edit a contact opened from Spotlight - #### Description Opened a contact from Spotlight, wanted to edit it. Can't. How to Reproduce? • Look for a contact in Spotlight. • Tap on it's name — the card shows • Want to edit Expected Results An Edit button somewhere or any other UI, to at least open that contact in the Contacts/Phone app Actual Results Nothing. Nada. Nichts. - Product Version: 10.2 Created: 2017-01-04T13:09:29.590210 Originated: 2017-01-04T00:00:00 Open Radar Link: http://www.openradar.me/29863723
usab
ios cannot edit a contact opened from spotlight description opened a contact from spotlight wanted to edit it can t how to reproduce • look for a contact in spotlight • tap on it s name — the card shows • want to edit expected results an edit button somewhere or any other ui to at least open that contact in the contacts phone app actual results nothing nada nichts product version created originated open radar link
1
13,985
8,774,370,927
IssuesEvent
2018-12-18 19:37:08
Microsoft/BotFramework-WebChat
https://api.github.com/repos/Microsoft/BotFramework-WebChat
closed
Screen reader is not providing any information about 'Sent' message.
4.3 A11yUsable AccSelfLime Accessibility Bug HCL_BotFramework_WebChat Nov-18 Production T-Shirt: S Triaged
**Actual Result:** After sending the "hi" message narrator is silent, not reading anything when message is in Sending state. Narrator is not providing any information about the sent message. **Note:** Same issue repro at - Upload File button - After Uploading Image narrator not give information that Image has been uploaded. Attachment -"Usable_Image uploading Information". **Expected Result:** Narrator should provide the information about the sent message. **Repro Steps:** 1. Open URL [https://microsoft.github.io/BotFramework-WebChat/full-bundle](https://microsoft.github.io/BotFramework-WebChat/full-bundle ) in Edge browser. 2. Notice 'Upload File' and 'Send' button icons present in bottom of screen. 3. Open Narrator (Caps+Win. Key+Enter) 4. Type 'hi' in the input control at the bottom of the screen and hit enter (or click on the send button) . 5. Observe that Narrator not is not providing any information about 'Sent' message. **User Impact:** Users depending on screen reader might get confused as screen reader is not providing information about the action. **Test Environment:** **OS:** Windows 10 **OS Build:** 17134.345 **OS Version:** 1803 **Browser:** Edge **Tool:** Narrator **Attachment:** 1. [Usable_Messgae sending state.zip](https://github.com/Microsoft/BotFramework-WebChat/files/2548363/MAS1.3.1_Messgae.sending.state.zip) 2. [Usable_Image uploading Information.zip](https://github.com/Microsoft/BotFramework-WebChat/files/2604000/Usable_Image.uploading.Information.zip)
True
Screen reader is not providing any information about 'Sent' message. - **Actual Result:** After sending the "hi" message narrator is silent, not reading anything when message is in Sending state. Narrator is not providing any information about the sent message. **Note:** Same issue repro at - Upload File button - After Uploading Image narrator not give information that Image has been uploaded. Attachment -"Usable_Image uploading Information". **Expected Result:** Narrator should provide the information about the sent message. **Repro Steps:** 1. Open URL [https://microsoft.github.io/BotFramework-WebChat/full-bundle](https://microsoft.github.io/BotFramework-WebChat/full-bundle ) in Edge browser. 2. Notice 'Upload File' and 'Send' button icons present in bottom of screen. 3. Open Narrator (Caps+Win. Key+Enter) 4. Type 'hi' in the input control at the bottom of the screen and hit enter (or click on the send button) . 5. Observe that Narrator not is not providing any information about 'Sent' message. **User Impact:** Users depending on screen reader might get confused as screen reader is not providing information about the action. **Test Environment:** **OS:** Windows 10 **OS Build:** 17134.345 **OS Version:** 1803 **Browser:** Edge **Tool:** Narrator **Attachment:** 1. [Usable_Messgae sending state.zip](https://github.com/Microsoft/BotFramework-WebChat/files/2548363/MAS1.3.1_Messgae.sending.state.zip) 2. [Usable_Image uploading Information.zip](https://github.com/Microsoft/BotFramework-WebChat/files/2604000/Usable_Image.uploading.Information.zip)
usab
screen reader is not providing any information about sent message actual result after sending the hi message narrator is silent not reading anything when message is in sending state narrator is not providing any information about the sent message note same issue repro at upload file button after uploading image narrator not give information that image has been uploaded attachment usable image uploading information expected result narrator should provide the information about the sent message repro steps open url in edge browser notice upload file and send button icons present in bottom of screen open narrator caps win key enter type hi in the input control at the bottom of the screen and hit enter or click on the send button observe that narrator not is not providing any information about sent message user impact users depending on screen reader might get confused as screen reader is not providing information about the action test environment os windows os build os version browser edge tool narrator attachment
1
4,651
3,875,580,571
IssuesEvent
2016-04-12 02:01:48
lionheart/openradar-mirror
https://api.github.com/repos/lionheart/openradar-mirror
opened
22001495: Don't display UIAlertController when opening your own app's CFBundleURLTypes
classification:ui/usability reproducible:always status:open
#### Description Summary: Starting in iOS 9b4, a UIAlertController is presented when an app tries to open another app with openURL:. This is confusing and disrupting to users when an app is trying to open URLs to itself, which must be done to authenticate in the OAuth authentication scheme. These URLs are in CFBundleURLTypes in Info.plist and should bypass this alert. Steps to Reproduce: 1. Register myapp as a URL scheme in Info.plist CFBundleURLTypes 2. [[UIApplication sharedApplication] openURL:[NSURL URLWithString:@"myapp://"]]; Expected Results: AppDelegate's URL handling method is run. Actual Results: UIAlertController from system is displayed saying "MyApp wants to open MyApp." Regression: Regression since iOS 9b3. Notes: This can be seen when performing OAuth steps. If OAuth was performed in a UIWebView before, the alert displayed might say "MyApp wants to open MyApp." Now, with SFSafariViewController, it's "SafariViewService wants to open MyApp." - Product Version: Xcode-beta (7A165t) Created: 2015-07-26T13:23:45.119200 Originated: 2015-07-26T09:23:00 Open Radar Link: http://www.openradar.me/22001495
True
22001495: Don't display UIAlertController when opening your own app's CFBundleURLTypes - #### Description Summary: Starting in iOS 9b4, a UIAlertController is presented when an app tries to open another app with openURL:. This is confusing and disrupting to users when an app is trying to open URLs to itself, which must be done to authenticate in the OAuth authentication scheme. These URLs are in CFBundleURLTypes in Info.plist and should bypass this alert. Steps to Reproduce: 1. Register myapp as a URL scheme in Info.plist CFBundleURLTypes 2. [[UIApplication sharedApplication] openURL:[NSURL URLWithString:@"myapp://"]]; Expected Results: AppDelegate's URL handling method is run. Actual Results: UIAlertController from system is displayed saying "MyApp wants to open MyApp." Regression: Regression since iOS 9b3. Notes: This can be seen when performing OAuth steps. If OAuth was performed in a UIWebView before, the alert displayed might say "MyApp wants to open MyApp." Now, with SFSafariViewController, it's "SafariViewService wants to open MyApp." - Product Version: Xcode-beta (7A165t) Created: 2015-07-26T13:23:45.119200 Originated: 2015-07-26T09:23:00 Open Radar Link: http://www.openradar.me/22001495
usab
don t display uialertcontroller when opening your own app s cfbundleurltypes description summary starting in ios a uialertcontroller is presented when an app tries to open another app with openurl this is confusing and disrupting to users when an app is trying to open urls to itself which must be done to authenticate in the oauth authentication scheme these urls are in cfbundleurltypes in info plist and should bypass this alert steps to reproduce register myapp as a url scheme in info plist cfbundleurltypes openurl expected results appdelegate s url handling method is run actual results uialertcontroller from system is displayed saying myapp wants to open myapp regression regression since ios notes this can be seen when performing oauth steps if oauth was performed in a uiwebview before the alert displayed might say myapp wants to open myapp now with sfsafariviewcontroller it s safariviewservice wants to open myapp product version xcode beta created originated open radar link
1
836
2,633,970,175
IssuesEvent
2015-03-09 10:01:19
AdamsLair/duality
https://api.github.com/repos/AdamsLair/duality
opened
Allow PropertyGrid to Create Generics of Undefined <T>
Editor Feature Usability
- Right now, the Object Inspector can edit any List<T>, but is only able to create one when T is pre-defined. - There should be a UI for manually selecting T when creating a new List<T> without knowing what T could be. It also should pop up when T can be derived from previous elements in a list, but isn't strictly bound to be exactly one Type. - Generics should show up in the generalized create object dialog.
True
Allow PropertyGrid to Create Generics of Undefined <T> - - Right now, the Object Inspector can edit any List<T>, but is only able to create one when T is pre-defined. - There should be a UI for manually selecting T when creating a new List<T> without knowing what T could be. It also should pop up when T can be derived from previous elements in a list, but isn't strictly bound to be exactly one Type. - Generics should show up in the generalized create object dialog.
usab
allow propertygrid to create generics of undefined right now the object inspector can edit any list but is only able to create one when t is pre defined there should be a ui for manually selecting t when creating a new list without knowing what t could be it also should pop up when t can be derived from previous elements in a list but isn t strictly bound to be exactly one type generics should show up in the generalized create object dialog
1
25,105
24,716,672,063
IssuesEvent
2022-10-20 07:33:21
git4school/git4school-visu
https://api.github.com/repos/git4school/git4school-visu
opened
Include the questions in a set (worksheet)
usability story pending
**Description** So it will be easier to link a milestone with a whole set of questions for example.
True
Include the questions in a set (worksheet) - **Description** So it will be easier to link a milestone with a whole set of questions for example.
usab
include the questions in a set worksheet description so it will be easier to link a milestone with a whole set of questions for example
1
5,216
3,906,051,772
IssuesEvent
2016-04-19 07:05:57
kolliSuman/issues
https://api.github.com/repos/kolliSuman/issues
closed
QA_Morphological Operations_Back to experiment_smk
Category: Production Developed By: VLEAD Release Number: 18 Severity: Usability Status: Open
Test Step Link: https://github.com/Virtual-Labs/image-processing-iiith/blob/master/test-cases/integration_test-cases/Morphological%20Operations/Morphological%20Operations_Defect Description : In the "Morphological Operations" experiment,the back to experiments link is not present in the page instead the back to experiments link should be displayed on the screen in-order to view the list of experiments by the user Actual Result : In the "Morphological Operations" experiment,the back to experiments link is not present in the page Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 _Back%20to%20experiment_smk.org
True
QA_Morphological Operations_Back to experiment_smk - Test Step Link: https://github.com/Virtual-Labs/image-processing-iiith/blob/master/test-cases/integration_test-cases/Morphological%20Operations/Morphological%20Operations_Defect Description : In the "Morphological Operations" experiment,the back to experiments link is not present in the page instead the back to experiments link should be displayed on the screen in-order to view the list of experiments by the user Actual Result : In the "Morphological Operations" experiment,the back to experiments link is not present in the page Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 _Back%20to%20experiment_smk.org
usab
qa morphological operations back to experiment smk test step link description in the morphological operations experiment the back to experiments link is not present in the page instead the back to experiments link should be displayed on the screen in order to view the list of experiments by the user actual result in the morphological operations experiment the back to experiments link is not present in the page environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor back smk org
1
1,470
2,855,812,263
IssuesEvent
2015-06-02 11:53:43
MISP/MISP
https://api.github.com/repos/MISP/MISP
closed
Free text importer parsing improvements
functionality usability
Try to also parse the following cases taken from [this post](http://blog.shadowserver.org/2012/04/16/beware-of-what-you-download-recent-purported-ceiec-document-dump-booby-trapped/): ``` 1. Both samples beacon back to www.ollay011.zyns.com, which at the time of this writing and since -> Expected output: parsed as hostname 2. <strong>CALLBACK/C2:</strong> front11.gicp.net:81 -> Expected output: parsed as hostname with port added as comment. 3. 64.56.70.254:80 (Backup: 173.252.204.85:8089, 216.70.255.201:8089, 216.70.128.124:8089, 58.137.153.115:8089, 64.56.70.253:80) -> Expected output: parsed as IPs with ports added as comments. ```
True
Free text importer parsing improvements - Try to also parse the following cases taken from [this post](http://blog.shadowserver.org/2012/04/16/beware-of-what-you-download-recent-purported-ceiec-document-dump-booby-trapped/): ``` 1. Both samples beacon back to www.ollay011.zyns.com, which at the time of this writing and since -> Expected output: parsed as hostname 2. <strong>CALLBACK/C2:</strong> front11.gicp.net:81 -> Expected output: parsed as hostname with port added as comment. 3. 64.56.70.254:80 (Backup: 173.252.204.85:8089, 216.70.255.201:8089, 216.70.128.124:8089, 58.137.153.115:8089, 64.56.70.253:80) -> Expected output: parsed as IPs with ports added as comments. ```
usab
free text importer parsing improvements try to also parse the following cases taken from both samples beacon back to which at the time of this writing and since expected output parsed as hostname callback gicp net expected output parsed as hostname with port added as comment backup expected output parsed as ips with ports added as comments
1
71,818
15,209,826,621
IssuesEvent
2021-02-17 06:13:42
YJSoft/bootstrap-board
https://api.github.com/repos/YJSoft/bootstrap-board
opened
CVE-2018-14040 (Medium) detected in bootstrap-3.0.3.min.js
security vulnerability
## CVE-2018-14040 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.0.3.min.js</b></p></summary> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.3/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.3/js/bootstrap.min.js</a></p> <p>Path to vulnerable library: bootstrap-board/js/bootstrap.min.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.0.3.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/YJSoft/bootstrap-board/commit/f0318a7fb98126a4aa605ad24f6735b7afe4fc09">f0318a7fb98126a4aa605ad24f6735b7afe4fc09</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. <p>Publish Date: 2018-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040>CVE-2018-14040</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p> <p>Release Date: 2018-07-13</p> <p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-14040 (Medium) detected in bootstrap-3.0.3.min.js - ## CVE-2018-14040 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.0.3.min.js</b></p></summary> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.3/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.3/js/bootstrap.min.js</a></p> <p>Path to vulnerable library: bootstrap-board/js/bootstrap.min.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.0.3.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/YJSoft/bootstrap-board/commit/f0318a7fb98126a4aa605ad24f6735b7afe4fc09">f0318a7fb98126a4aa605ad24f6735b7afe4fc09</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. <p>Publish Date: 2018-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040>CVE-2018-14040</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p> <p>Release Date: 2018-07-13</p> <p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve medium detected in bootstrap min js cve medium severity vulnerability vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library bootstrap board js bootstrap min js dependency hierarchy x bootstrap min js vulnerable library found in head commit a href found in base branch master vulnerability details in bootstrap before xss is possible in the collapse data parent attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org webjars npm bootstrap org webjars bootstrap step up your open source security game with whitesource
0
94,321
8,484,621,431
IssuesEvent
2018-10-26 03:38:56
nodejs/node
https://api.github.com/repos/nodejs/node
closed
Investigate flaky test-http2-compat-serverresponse-end
CI / flaky test http2
https://ci.nodejs.org/job/node-test-binary-windows/20236/COMPILED_BY=vs2017-x86,RUNNER=win2012r2,RUN_SUBSET=0/console ```console 07:09:30 not ok 257 parallel/test-http2-compat-serverresponse-end 07:09:30 --- 07:09:30 duration_ms: 120.69 07:09:30 severity: fail 07:09:30 exitcode: 1 07:09:30 stack: |- 07:09:30 timeout 07:09:30 ... ```
1.0
Investigate flaky test-http2-compat-serverresponse-end - https://ci.nodejs.org/job/node-test-binary-windows/20236/COMPILED_BY=vs2017-x86,RUNNER=win2012r2,RUN_SUBSET=0/console ```console 07:09:30 not ok 257 parallel/test-http2-compat-serverresponse-end 07:09:30 --- 07:09:30 duration_ms: 120.69 07:09:30 severity: fail 07:09:30 exitcode: 1 07:09:30 stack: |- 07:09:30 timeout 07:09:30 ... ```
non_usab
investigate flaky test compat serverresponse end console not ok parallel test compat serverresponse end duration ms severity fail exitcode stack timeout
0
24,790
24,288,973,660
IssuesEvent
2022-09-29 02:54:29
yirugi/sptest
https://api.github.com/repos/yirugi/sptest
opened
Tool doesn't adjust to fill/fit screen on a larger display
enhancement usability
<a href="https://github.itap.purdue.edu/kawasson"><img src="https://avatars.github.itap.purdue.edu/u/4727?" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [kawasson](https://github.itap.purdue.edu/kawasson)** _Thursday May 26, 2022 at 19:41 GMT_ _Originally opened as https://github.itap.purdue.edu/ScientificSolutions/superpower_gui/issues/212_ ---- **Describe the bug** When I open the SuperPower app on different sized monitors/displays, the tool doesn't readjust to fit the size of the monitor. **Screenshots** I noticed this issue when I tried to use the tool on my large external monitor hooked up to my laptop. Here is how to tool loaded on my screen: ![image](https://media.github.itap.purdue.edu/user/4727/files/b901f480-dd09-11ec-8857-a6258c040996) The display also didn't readjust when I tried opening it on my laptop screen and then dragging it to the external monitor: ![image](https://media.github.itap.purdue.edu/user/4727/files/2ca40180-dd0a-11ec-9868-78b837e54b74) I also wanted to include an image of the tool on my laptop screen to ensure that this is how you want it to display. Is there supposed to be so much gray margin, or should the white background fill the screen? ![image](https://media.github.itap.purdue.edu/user/4727/files/fcf4f980-dd09-11ec-80bb-da3e2a0d690d) **System** Version RC3.8 - published on 24 May 2022 OS: Windows 10 _Edition Windows 10 Home Version 21H1 Installed on ‎3/‎6/‎2021 OS build 19043.1706_ _Experience Windows Feature Experience Pack 120.2212.4170.0_ Browser: Chrome Version 101.0.4951.67 (Official Build) (64-bit) _Note_ I just updated my version of Chrome (see below) but I'm still experiencing the same issue. New Browser: Chrome Version 102.0.5005.63 (Official Build) (64-bit)
True
Tool doesn't adjust to fill/fit screen on a larger display - <a href="https://github.itap.purdue.edu/kawasson"><img src="https://avatars.github.itap.purdue.edu/u/4727?" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [kawasson](https://github.itap.purdue.edu/kawasson)** _Thursday May 26, 2022 at 19:41 GMT_ _Originally opened as https://github.itap.purdue.edu/ScientificSolutions/superpower_gui/issues/212_ ---- **Describe the bug** When I open the SuperPower app on different sized monitors/displays, the tool doesn't readjust to fit the size of the monitor. **Screenshots** I noticed this issue when I tried to use the tool on my large external monitor hooked up to my laptop. Here is how to tool loaded on my screen: ![image](https://media.github.itap.purdue.edu/user/4727/files/b901f480-dd09-11ec-8857-a6258c040996) The display also didn't readjust when I tried opening it on my laptop screen and then dragging it to the external monitor: ![image](https://media.github.itap.purdue.edu/user/4727/files/2ca40180-dd0a-11ec-9868-78b837e54b74) I also wanted to include an image of the tool on my laptop screen to ensure that this is how you want it to display. Is there supposed to be so much gray margin, or should the white background fill the screen? ![image](https://media.github.itap.purdue.edu/user/4727/files/fcf4f980-dd09-11ec-80bb-da3e2a0d690d) **System** Version RC3.8 - published on 24 May 2022 OS: Windows 10 _Edition Windows 10 Home Version 21H1 Installed on ‎3/‎6/‎2021 OS build 19043.1706_ _Experience Windows Feature Experience Pack 120.2212.4170.0_ Browser: Chrome Version 101.0.4951.67 (Official Build) (64-bit) _Note_ I just updated my version of Chrome (see below) but I'm still experiencing the same issue. New Browser: Chrome Version 102.0.5005.63 (Official Build) (64-bit)
usab
tool doesn t adjust to fill fit screen on a larger display issue by thursday may at gmt originally opened as describe the bug when i open the superpower app on different sized monitors displays the tool doesn t readjust to fit the size of the monitor screenshots i noticed this issue when i tried to use the tool on my large external monitor hooked up to my laptop here is how to tool loaded on my screen the display also didn t readjust when i tried opening it on my laptop screen and then dragging it to the external monitor i also wanted to include an image of the tool on my laptop screen to ensure that this is how you want it to display is there supposed to be so much gray margin or should the white background fill the screen system version published on may os windows edition windows home version installed on ‎ ‎ ‎ os build experience windows feature experience pack browser chrome version official build bit note i just updated my version of chrome see below but i m still experiencing the same issue new browser chrome version official build bit
1
23,109
15,826,462,434
IssuesEvent
2021-04-06 07:27:41
airyhq/airy
https://api.github.com/repos/airyhq/airy
closed
Prometheus Metrics about Kubernetes Pods
infrastructure
This [Prometheus Operator](https://github.com/prometheus-operator/prometheus-operator) makes it easier to configure Prometheus instances to monitor Kubernetes Pods
1.0
Prometheus Metrics about Kubernetes Pods - This [Prometheus Operator](https://github.com/prometheus-operator/prometheus-operator) makes it easier to configure Prometheus instances to monitor Kubernetes Pods
non_usab
prometheus metrics about kubernetes pods this makes it easier to configure prometheus instances to monitor kubernetes pods
0
127,247
18,010,358,057
IssuesEvent
2021-09-16 07:53:22
maddyCode23/linux-4.1.15
https://api.github.com/repos/maddyCode23/linux-4.1.15
opened
CVE-2018-13095 (Medium) detected in linux-stable-rtv4.1.33
security vulnerability
## CVE-2018-13095 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/xfs/libxfs/xfs_inode_buf.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/xfs/libxfs/xfs_inode_buf.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork. <p>Publish Date: 2018-07-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-13095>CVE-2018-13095</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-13095">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-13095</a></p> <p>Release Date: 2018-07-03</p> <p>Fix Resolution: v4.18-rc3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-13095 (Medium) detected in linux-stable-rtv4.1.33 - ## CVE-2018-13095 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/xfs/libxfs/xfs_inode_buf.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/xfs/libxfs/xfs_inode_buf.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork. <p>Publish Date: 2018-07-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-13095>CVE-2018-13095</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-13095">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-13095</a></p> <p>Release Date: 2018-07-03</p> <p>Fix Resolution: v4.18-rc3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve medium detected in linux stable cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href vulnerable source files fs xfs libxfs xfs inode buf c fs xfs libxfs xfs inode buf c vulnerability details an issue was discovered in fs xfs libxfs xfs inode buf c in the linux kernel through a denial of service memory corruption and bug can occur for a corrupted xfs image upon encountering an inode that is in extent format but has more extents than fit in the inode fork publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
257
2,597,990,314
IssuesEvent
2015-02-22 01:25:31
TeamMentor/TM_4_0_Design
https://api.github.com/repos/TeamMentor/TM_4_0_Design
closed
HTTP 413 Request entity too large in Login form
Action:QA Area: Security Effort: Schooner - 1d P0 Sprint1 Type:Bug
If you enter a long value in the username textbox in the login form, you receive this error Note that the stack trace also shows up directories. ![screen shot 2015-01-31 at 7 35 26 am](https://cloud.githubusercontent.com/assets/1732035/5988223/fe4347f8-a91b-11e4-872f-583411b188f1.png)
True
HTTP 413 Request entity too large in Login form - If you enter a long value in the username textbox in the login form, you receive this error Note that the stack trace also shows up directories. ![screen shot 2015-01-31 at 7 35 26 am](https://cloud.githubusercontent.com/assets/1732035/5988223/fe4347f8-a91b-11e4-872f-583411b188f1.png)
non_usab
http request entity too large in login form if you enter a long value in the username textbox in the login form you receive this error note that the stack trace also shows up directories
0
22,903
20,513,562,963
IssuesEvent
2022-03-01 09:26:44
OpenRefine/OpenRefine
https://api.github.com/repos/OpenRefine/OpenRefine
closed
Modal dialogue buttons should be right-aligned
bug usability UI good first issue
Many of the modal dialogue buttons are left-aligned, while it is standard that they should be right-aligned The following dialogs have the buttons left-aligned: Export->Custom tabular exporter Export-> SQL Exporter Undo/Redo-> Extract operation history Undo/Redo->Apply Operation History All->Edit all columns->Transform All->Edit all columns->Trim leading and trailing whitespace All->Edit all columns->Collapse consecutive whitespace All->Edit all columns->Unescape HTML entities All->Edit all columns->Replace smart quotes with ASCII All->Edit all columns->To titlecase All->Edit all columns->To uppercase All->Edit all columns->To lowercase All->Edit all columns->To number All->Edit all columns->To date All->Edit all columns->To text All->Edit all columns->To null All->Edit all columns->To empty string Column->Facet->Custom text facet on column Column->Facet->Custom numeric facet on column Column->Edit cells->Split multi-valued cells Column->Edit cells->Join multi-valued cells Column->Edit cells->Replace Column->Edit Column->Transform Column->Edit Column->Add column by fetching URLs based on column X Column->Edit Column->Add column based on column X Column->Edit Column->Split column X into several columns Column->Edit Column->Join columns Column->Transpose->Transpose cells across columns into rows... Column->Transpose->Transpose cells in rows into columns... Column->Transpose->Columnize by key/value columns... Column->Sort Column->Reconcile->Actions->Match all filtered cells to... Column->Reconcile->Copy recon judgments from column X Column->Reconcile->Use values as identifiers Column->Reconcile->Add column containing entity identifiers on Bird ### Proposed solution Right-align the buttons in the listed dialogues
True
Modal dialogue buttons should be right-aligned - Many of the modal dialogue buttons are left-aligned, while it is standard that they should be right-aligned The following dialogs have the buttons left-aligned: Export->Custom tabular exporter Export-> SQL Exporter Undo/Redo-> Extract operation history Undo/Redo->Apply Operation History All->Edit all columns->Transform All->Edit all columns->Trim leading and trailing whitespace All->Edit all columns->Collapse consecutive whitespace All->Edit all columns->Unescape HTML entities All->Edit all columns->Replace smart quotes with ASCII All->Edit all columns->To titlecase All->Edit all columns->To uppercase All->Edit all columns->To lowercase All->Edit all columns->To number All->Edit all columns->To date All->Edit all columns->To text All->Edit all columns->To null All->Edit all columns->To empty string Column->Facet->Custom text facet on column Column->Facet->Custom numeric facet on column Column->Edit cells->Split multi-valued cells Column->Edit cells->Join multi-valued cells Column->Edit cells->Replace Column->Edit Column->Transform Column->Edit Column->Add column by fetching URLs based on column X Column->Edit Column->Add column based on column X Column->Edit Column->Split column X into several columns Column->Edit Column->Join columns Column->Transpose->Transpose cells across columns into rows... Column->Transpose->Transpose cells in rows into columns... Column->Transpose->Columnize by key/value columns... Column->Sort Column->Reconcile->Actions->Match all filtered cells to... Column->Reconcile->Copy recon judgments from column X Column->Reconcile->Use values as identifiers Column->Reconcile->Add column containing entity identifiers on Bird ### Proposed solution Right-align the buttons in the listed dialogues
usab
modal dialogue buttons should be right aligned many of the modal dialogue buttons are left aligned while it is standard that they should be right aligned the following dialogs have the buttons left aligned export custom tabular exporter export sql exporter undo redo extract operation history undo redo apply operation history all edit all columns transform all edit all columns trim leading and trailing whitespace all edit all columns collapse consecutive whitespace all edit all columns unescape html entities all edit all columns replace smart quotes with ascii all edit all columns to titlecase all edit all columns to uppercase all edit all columns to lowercase all edit all columns to number all edit all columns to date all edit all columns to text all edit all columns to null all edit all columns to empty string column facet custom text facet on column column facet custom numeric facet on column column edit cells split multi valued cells column edit cells join multi valued cells column edit cells replace column edit column transform column edit column add column by fetching urls based on column x column edit column add column based on column x column edit column split column x into several columns column edit column join columns column transpose transpose cells across columns into rows column transpose transpose cells in rows into columns column transpose columnize by key value columns column sort column reconcile actions match all filtered cells to column reconcile copy recon judgments from column x column reconcile use values as identifiers column reconcile add column containing entity identifiers on bird proposed solution right align the buttons in the listed dialogues
1
576,968
17,100,104,586
IssuesEvent
2021-07-09 09:59:26
GluuFederation/oxTrust
https://api.github.com/repos/GluuFederation/oxTrust
closed
Custom Branding (change in logo and favicon) is not working in Gluu CE 4.2.2
Low priority bug
Hi I am trying to change the logo and favicon in Gluu CE 4.2.2 and to do this I have copied the custom logo to custom/static/logo/logo.png and favicon to custom/static/favicon/favicon.ico. After this I restarted services (oxauth, identity). Still I see the default logo and favicon. It seems that the internal servlets (/servlet/logo and /servlet/favicon) are not working as expected. However,It works when I copy them in /opt/gluu/jetty/oxauth/custom/static/img/ or (/opt/gluu/jetty/oxauth/custom/static/logo/ and /opt/gluu/jetty/oxauth/custom/static/favicon/) and in login-template.xhtml referring them through ext/resources/img/logo.png or ext/resources/logo/logo.png ext/resources/img/favicon.ico or ext/resources/favicon/favicon.ico instead of #{request.contextPath}/servlet/logo #{request.contextPath}/servlet/favicon.
1.0
Custom Branding (change in logo and favicon) is not working in Gluu CE 4.2.2 - Hi I am trying to change the logo and favicon in Gluu CE 4.2.2 and to do this I have copied the custom logo to custom/static/logo/logo.png and favicon to custom/static/favicon/favicon.ico. After this I restarted services (oxauth, identity). Still I see the default logo and favicon. It seems that the internal servlets (/servlet/logo and /servlet/favicon) are not working as expected. However,It works when I copy them in /opt/gluu/jetty/oxauth/custom/static/img/ or (/opt/gluu/jetty/oxauth/custom/static/logo/ and /opt/gluu/jetty/oxauth/custom/static/favicon/) and in login-template.xhtml referring them through ext/resources/img/logo.png or ext/resources/logo/logo.png ext/resources/img/favicon.ico or ext/resources/favicon/favicon.ico instead of #{request.contextPath}/servlet/logo #{request.contextPath}/servlet/favicon.
non_usab
custom branding change in logo and favicon is not working in gluu ce hi i am trying to change the logo and favicon in gluu ce and to do this i have copied the custom logo to custom static logo logo png and favicon to custom static favicon favicon ico after this i restarted services oxauth identity still i see the default logo and favicon it seems that the internal servlets servlet logo and servlet favicon are not working as expected however it works when i copy them in opt gluu jetty oxauth custom static img or opt gluu jetty oxauth custom static logo and opt gluu jetty oxauth custom static favicon and in login template xhtml referring them through ext resources img logo png or ext resources logo logo png ext resources img favicon ico or ext resources favicon favicon ico instead of request contextpath servlet logo request contextpath servlet favicon
0
18,463
12,963,502,484
IssuesEvent
2020-07-20 18:53:48
solo-io/gloo
https://api.github.com/repos/solo-io/gloo
closed
New Rate Limiting API
Area: API Area: Usability Enterprise Type: Enhancement
# Problem Summary Gloo Enterprise currently exposes a fine-grained rate limit API that allows you to configure a [vast number of use cases](https://docs.solo.io/gloo/latest/guides/security/rate_limiting/envoy/). The two main objects that make up the API are: 1. the [`descriptors`](https://docs.solo.io/gloo/latest/guides/security/rate_limiting/envoy/#descriptors), which configure the rate limit server and are defined on the global `Settings` resource, and 2. the [`actions`](https://docs.solo.io/gloo/latest/guides/security/rate_limiting/envoy/#actions) that determine how Envoy composes the descriptors that are sent to the server to check whether a request should be rate-limited; `actions` are defined either on the `Route` or on the `VirtualHost` `options`. Although powerful, this API has some drawbacks: - The `descriptors` that define the rate limit policies you want to enforce are defined in a single, central location. The global nature of the `Settings` does not guarantee isolation between different rate limits: if you make a mistake while updating a policy, you might end up impacting other policies. This centralized configuration also makes it harder to safely manage you rate limit policies in an automated fashion. - Since `actions` are defined directly on your `Virtual Services`, your rate limits are tightly coupled to your routing configuration. If you need to apply the same policy on different routes, you will need to redefine the same configuration in multiple places. This can be a significant source of configuration bloat, especially if your policies are complex. # Proposed solution To address these shortcomings, we will introduce a new `RateLimitConfig` custom resource. A `RateLimitConfig` resource represents a self-contained rate limit policy; this means that Gloo will use the resource to configure both the Envoy proxies and the Gloo Enterprise rate limit server they communicate with. Gloo will guarantee that rate limit rules defined on different `RateLimitConfig` resources are completely independent of each other. Here is a simple example of a `RateLimitConfig` resource: ```yaml apiVersion: ratelimit.solo.io/v1alpha1 kind: RateLimitConfig metadata: name: my-rate-limit-policy namespace: gloo-system spec: raw: descriptors: - key: generic_key value: counter rateLimit: requestsPerUnit: 10 unit: MINUTE rateLimits: - actions: - genericKey: descriptorValue: counters ``` Once an `RateLimitConfig` is created, it can be used to enforce rate limits on your `Virtual Services` (or on the lower-level `Proxy` resources) by simply referencing it on `VirtualHosts` and `Routes`. ```yaml apiVersion: gateway.solo.io/v1 kind: VirtualService metadata: name: example namespace: gloo-system spec: virtualHost: domains: - '*' options: rateLimitConfigs: refs: - name: my-rate-limit-policy namespace: gloo-system routes: - matchers: - prefix: /foo routeAction: single: upstream: name: example-upstream namespace: gloo-system - matchers: - prefix: / options: rateLimitConfigs: refs: - name: my-other-policy namespace: gloo-system routeAction: single: upstream: name: other namespace: gloo-system ``` # Task checklist - [x] Update the Rate Limit API definitions in the open source Gloo repository - [x] Update the Gloo Enterprise Rate Limit server to handle the new configuration format - [ ] Update the Gloo Enterprise control plane so it can process the `RateLimitConfig` resource - [x] Update the rate limit documentation
True
New Rate Limiting API - # Problem Summary Gloo Enterprise currently exposes a fine-grained rate limit API that allows you to configure a [vast number of use cases](https://docs.solo.io/gloo/latest/guides/security/rate_limiting/envoy/). The two main objects that make up the API are: 1. the [`descriptors`](https://docs.solo.io/gloo/latest/guides/security/rate_limiting/envoy/#descriptors), which configure the rate limit server and are defined on the global `Settings` resource, and 2. the [`actions`](https://docs.solo.io/gloo/latest/guides/security/rate_limiting/envoy/#actions) that determine how Envoy composes the descriptors that are sent to the server to check whether a request should be rate-limited; `actions` are defined either on the `Route` or on the `VirtualHost` `options`. Although powerful, this API has some drawbacks: - The `descriptors` that define the rate limit policies you want to enforce are defined in a single, central location. The global nature of the `Settings` does not guarantee isolation between different rate limits: if you make a mistake while updating a policy, you might end up impacting other policies. This centralized configuration also makes it harder to safely manage you rate limit policies in an automated fashion. - Since `actions` are defined directly on your `Virtual Services`, your rate limits are tightly coupled to your routing configuration. If you need to apply the same policy on different routes, you will need to redefine the same configuration in multiple places. This can be a significant source of configuration bloat, especially if your policies are complex. # Proposed solution To address these shortcomings, we will introduce a new `RateLimitConfig` custom resource. A `RateLimitConfig` resource represents a self-contained rate limit policy; this means that Gloo will use the resource to configure both the Envoy proxies and the Gloo Enterprise rate limit server they communicate with. Gloo will guarantee that rate limit rules defined on different `RateLimitConfig` resources are completely independent of each other. Here is a simple example of a `RateLimitConfig` resource: ```yaml apiVersion: ratelimit.solo.io/v1alpha1 kind: RateLimitConfig metadata: name: my-rate-limit-policy namespace: gloo-system spec: raw: descriptors: - key: generic_key value: counter rateLimit: requestsPerUnit: 10 unit: MINUTE rateLimits: - actions: - genericKey: descriptorValue: counters ``` Once an `RateLimitConfig` is created, it can be used to enforce rate limits on your `Virtual Services` (or on the lower-level `Proxy` resources) by simply referencing it on `VirtualHosts` and `Routes`. ```yaml apiVersion: gateway.solo.io/v1 kind: VirtualService metadata: name: example namespace: gloo-system spec: virtualHost: domains: - '*' options: rateLimitConfigs: refs: - name: my-rate-limit-policy namespace: gloo-system routes: - matchers: - prefix: /foo routeAction: single: upstream: name: example-upstream namespace: gloo-system - matchers: - prefix: / options: rateLimitConfigs: refs: - name: my-other-policy namespace: gloo-system routeAction: single: upstream: name: other namespace: gloo-system ``` # Task checklist - [x] Update the Rate Limit API definitions in the open source Gloo repository - [x] Update the Gloo Enterprise Rate Limit server to handle the new configuration format - [ ] Update the Gloo Enterprise control plane so it can process the `RateLimitConfig` resource - [x] Update the rate limit documentation
usab
new rate limiting api problem summary gloo enterprise currently exposes a fine grained rate limit api that allows you to configure a the two main objects that make up the api are the which configure the rate limit server and are defined on the global settings resource and the that determine how envoy composes the descriptors that are sent to the server to check whether a request should be rate limited actions are defined either on the route or on the virtualhost options although powerful this api has some drawbacks the descriptors that define the rate limit policies you want to enforce are defined in a single central location the global nature of the settings does not guarantee isolation between different rate limits if you make a mistake while updating a policy you might end up impacting other policies this centralized configuration also makes it harder to safely manage you rate limit policies in an automated fashion since actions are defined directly on your virtual services your rate limits are tightly coupled to your routing configuration if you need to apply the same policy on different routes you will need to redefine the same configuration in multiple places this can be a significant source of configuration bloat especially if your policies are complex proposed solution to address these shortcomings we will introduce a new ratelimitconfig custom resource a ratelimitconfig resource represents a self contained rate limit policy this means that gloo will use the resource to configure both the envoy proxies and the gloo enterprise rate limit server they communicate with gloo will guarantee that rate limit rules defined on different ratelimitconfig resources are completely independent of each other here is a simple example of a ratelimitconfig resource yaml apiversion ratelimit solo io kind ratelimitconfig metadata name my rate limit policy namespace gloo system spec raw descriptors key generic key value counter ratelimit requestsperunit unit minute ratelimits actions generickey descriptorvalue counters once an ratelimitconfig is created it can be used to enforce rate limits on your virtual services or on the lower level proxy resources by simply referencing it on virtualhosts and routes yaml apiversion gateway solo io kind virtualservice metadata name example namespace gloo system spec virtualhost domains options ratelimitconfigs refs name my rate limit policy namespace gloo system routes matchers prefix foo routeaction single upstream name example upstream namespace gloo system matchers prefix options ratelimitconfigs refs name my other policy namespace gloo system routeaction single upstream name other namespace gloo system task checklist update the rate limit api definitions in the open source gloo repository update the gloo enterprise rate limit server to handle the new configuration format update the gloo enterprise control plane so it can process the ratelimitconfig resource update the rate limit documentation
1
15,014
9,657,673,222
IssuesEvent
2019-05-20 09:08:51
eclipse/mita
https://api.github.com/repos/eclipse/mita
opened
Content assist shows to many elements
In-Progress Usability
**Current behavior:** <!-- Describe how the bug manifests. --> The content assist shows too many elements. Selecting the wrong ones results in compilation errors. **Expected behavior:** <!-- Describe what the behavior would be without the bug. --> Only elements that are relevant in the corresponding context should be provided. **List of issues:** - [ ] In event handler code, feature call on sensor should only show modalities - [ ] Feature call on variable should only show type members and available extension methods - [ ] Feature call on modality should only show type members and available extension methods
True
Content assist shows to many elements - **Current behavior:** <!-- Describe how the bug manifests. --> The content assist shows too many elements. Selecting the wrong ones results in compilation errors. **Expected behavior:** <!-- Describe what the behavior would be without the bug. --> Only elements that are relevant in the corresponding context should be provided. **List of issues:** - [ ] In event handler code, feature call on sensor should only show modalities - [ ] Feature call on variable should only show type members and available extension methods - [ ] Feature call on modality should only show type members and available extension methods
usab
content assist shows to many elements current behavior the content assist shows too many elements selecting the wrong ones results in compilation errors expected behavior only elements that are relevant in the corresponding context should be provided list of issues in event handler code feature call on sensor should only show modalities feature call on variable should only show type members and available extension methods feature call on modality should only show type members and available extension methods
1
125,619
26,699,708,830
IssuesEvent
2023-01-27 13:26:22
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
closed
data corruption on delta+gorilla+lz4 codec pipeline
bug minor comp-codecs
**Describe what's wrong** I have dataset from sensors that was corrupted when using codec (Delta, Gorilla, LZ4) **Does it reproduce on recent release?** checked only on ``` +----------------+----------------------------------------+ |name |value | +----------------+----------------------------------------+ |VERSION_FULL |ClickHouse 22.10.1.1877 | |VERSION_DESCRIBE|v22.10.1.1877-testing | |VERSION_INTEGER |22010001 | |SYSTEM |Linux | |VERSION_GITHASH |98ab5a3c189232ea2a3dddb9d2be7196ae8b3434| |VERSION_REVISION|54467 | +----------------+----------------------------------------+ ``` **Enable crash reporting** no errors in server logs **How to reproduce** ``` create table bug_gor_lz ( master_serial String, sensor_serial String, type String, datetime DateTime codec (Delta, LZ4), value Nullable(Decimal(15, 5)) default NULL, value_bug Nullable(Decimal(15, 5)) default NULL codec (Delta, Gorilla, LZ4) ) engine = ReplacingMergeTree PARTITION BY toYYYYMM(datetime) ORDER BY (master_serial, sensor_serial, type, datetime) SETTINGS index_granularity = 8192; ``` Import from [file](https://github.com/mosinnik/bug_data/blob/6fae4459ea089869e0d20368d6814e8ee259de04/bug_click_data.zip) TabSeparated I export to file correct values in `value` column and in `value_bug` bugged value - check diffs: ``` select * from bug_gor_lz where value <> value_bug limit 10; ``` For ex currently: ``` +-------------+-------------+-----+-------------------+-------+---------------------+ |master_serial|sensor_serial|type |datetime |value |value_bug | +-------------+-------------+-----+-------------------+-------+---------------------+ |70160 |10000175HIT |press|2022-06-14 06:07:02|0.00000|44483799547993.14956 | |70160 |10000175HIT |press|2022-06-14 06:07:03|0.00000|-36626579495765.90833| |70160 |10000175HIT |press|2022-06-14 06:07:04|0.00000|66730889016872.82706 | |70160 |10000175HIT |press|2022-06-14 06:07:05|0.00000|-14377895735025.95563| |70160 |10000175HIT |press|2022-06-14 06:07:06|0.00000|88981167069473.05496 | |70160 |10000175HIT |press|2022-06-01 04:32:54|0.00000|0.64536 | |70160 |10000175HIT |press|2022-06-01 04:32:55|0.00000|1.29072 | |70160 |10000175HIT |press|2022-06-01 04:32:56|0.00000|1.93608 | |70160 |10000175HIT |press|2022-06-01 04:32:57|0.00000|2.58144 | |70160 |10000175HIT |press|2022-06-01 04:32:58|0.00000|3.22680 | +-------------+-------------+-----+-------------------+-------+---------------------+ ``` To reproduce create new table with above structure and refill from `value` to `value_bug` **Expected behavior** values in value and value_bug should be same **Error message and/or stacktrace** no **Additional context** no
1.0
data corruption on delta+gorilla+lz4 codec pipeline - **Describe what's wrong** I have dataset from sensors that was corrupted when using codec (Delta, Gorilla, LZ4) **Does it reproduce on recent release?** checked only on ``` +----------------+----------------------------------------+ |name |value | +----------------+----------------------------------------+ |VERSION_FULL |ClickHouse 22.10.1.1877 | |VERSION_DESCRIBE|v22.10.1.1877-testing | |VERSION_INTEGER |22010001 | |SYSTEM |Linux | |VERSION_GITHASH |98ab5a3c189232ea2a3dddb9d2be7196ae8b3434| |VERSION_REVISION|54467 | +----------------+----------------------------------------+ ``` **Enable crash reporting** no errors in server logs **How to reproduce** ``` create table bug_gor_lz ( master_serial String, sensor_serial String, type String, datetime DateTime codec (Delta, LZ4), value Nullable(Decimal(15, 5)) default NULL, value_bug Nullable(Decimal(15, 5)) default NULL codec (Delta, Gorilla, LZ4) ) engine = ReplacingMergeTree PARTITION BY toYYYYMM(datetime) ORDER BY (master_serial, sensor_serial, type, datetime) SETTINGS index_granularity = 8192; ``` Import from [file](https://github.com/mosinnik/bug_data/blob/6fae4459ea089869e0d20368d6814e8ee259de04/bug_click_data.zip) TabSeparated I export to file correct values in `value` column and in `value_bug` bugged value - check diffs: ``` select * from bug_gor_lz where value <> value_bug limit 10; ``` For ex currently: ``` +-------------+-------------+-----+-------------------+-------+---------------------+ |master_serial|sensor_serial|type |datetime |value |value_bug | +-------------+-------------+-----+-------------------+-------+---------------------+ |70160 |10000175HIT |press|2022-06-14 06:07:02|0.00000|44483799547993.14956 | |70160 |10000175HIT |press|2022-06-14 06:07:03|0.00000|-36626579495765.90833| |70160 |10000175HIT |press|2022-06-14 06:07:04|0.00000|66730889016872.82706 | |70160 |10000175HIT |press|2022-06-14 06:07:05|0.00000|-14377895735025.95563| |70160 |10000175HIT |press|2022-06-14 06:07:06|0.00000|88981167069473.05496 | |70160 |10000175HIT |press|2022-06-01 04:32:54|0.00000|0.64536 | |70160 |10000175HIT |press|2022-06-01 04:32:55|0.00000|1.29072 | |70160 |10000175HIT |press|2022-06-01 04:32:56|0.00000|1.93608 | |70160 |10000175HIT |press|2022-06-01 04:32:57|0.00000|2.58144 | |70160 |10000175HIT |press|2022-06-01 04:32:58|0.00000|3.22680 | +-------------+-------------+-----+-------------------+-------+---------------------+ ``` To reproduce create new table with above structure and refill from `value` to `value_bug` **Expected behavior** values in value and value_bug should be same **Error message and/or stacktrace** no **Additional context** no
non_usab
data corruption on delta gorilla codec pipeline describe what s wrong i have dataset from sensors that was corrupted when using codec delta gorilla does it reproduce on recent release checked only on name value version full clickhouse version describe testing version integer system linux version githash version revision enable crash reporting no errors in server logs how to reproduce create table bug gor lz master serial string sensor serial string type string datetime datetime codec delta value nullable decimal default null value bug nullable decimal default null codec delta gorilla engine replacingmergetree partition by toyyyymm datetime order by master serial sensor serial type datetime settings index granularity import from tabseparated i export to file correct values in value column and in value bug bugged value check diffs select from bug gor lz where value value bug limit for ex currently master serial sensor serial type datetime value value bug press press press press press press press press press press to reproduce create new table with above structure and refill from value to value bug expected behavior values in value and value bug should be same error message and or stacktrace no additional context no
0
173,752
21,177,104,599
IssuesEvent
2022-04-08 01:57:23
Thezone1975/Office-Add-in-NodeJS-SSO
https://api.github.com/repos/Thezone1975/Office-Add-in-NodeJS-SSO
opened
CVE-2022-24785 (High) detected in moment-2.23.0.tgz
security vulnerability
## CVE-2022-24785 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moment-2.23.0.tgz</b></p></summary> <p>Parse, validate, manipulate, and display dates</p> <p>Library home page: <a href="https://registry.npmjs.org/moment/-/moment-2.23.0.tgz">https://registry.npmjs.org/moment/-/moment-2.23.0.tgz</a></p> <p>Path to dependency file: /Office-Add-in-NodeJS-SSO/Completed Multitenant/package.json</p> <p>Path to vulnerable library: /Before/node_modules/moment/package.json,/Before/node_modules/moment/package.json,/Before/node_modules/moment/package.json</p> <p> Dependency Hierarchy: - :x: **moment-2.23.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js. <p>Publish Date: 2022-04-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24785>CVE-2022-24785</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4">https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4</a></p> <p>Release Date: 2022-04-04</p> <p>Fix Resolution: moment - 2.29.2,Moment.js - 2.29.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-24785 (High) detected in moment-2.23.0.tgz - ## CVE-2022-24785 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moment-2.23.0.tgz</b></p></summary> <p>Parse, validate, manipulate, and display dates</p> <p>Library home page: <a href="https://registry.npmjs.org/moment/-/moment-2.23.0.tgz">https://registry.npmjs.org/moment/-/moment-2.23.0.tgz</a></p> <p>Path to dependency file: /Office-Add-in-NodeJS-SSO/Completed Multitenant/package.json</p> <p>Path to vulnerable library: /Before/node_modules/moment/package.json,/Before/node_modules/moment/package.json,/Before/node_modules/moment/package.json</p> <p> Dependency Hierarchy: - :x: **moment-2.23.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js. <p>Publish Date: 2022-04-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24785>CVE-2022-24785</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4">https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4</a></p> <p>Release Date: 2022-04-04</p> <p>Fix Resolution: moment - 2.29.2,Moment.js - 2.29.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve high detected in moment tgz cve high severity vulnerability vulnerable library moment tgz parse validate manipulate and display dates library home page a href path to dependency file office add in nodejs sso completed multitenant package json path to vulnerable library before node modules moment package json before node modules moment package json before node modules moment package json dependency hierarchy x moment tgz vulnerable library vulnerability details moment js is a javascript date library for parsing validating manipulating and formatting dates a path traversal vulnerability impacts npm server users of moment js between versions and especially if a user provided locale string is directly used to switch moment locale this problem is patched in and the patch can be applied to all affected versions as a workaround sanitize the user provided locale name before passing it to moment js publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution moment moment js step up your open source security game with whitesource
0
14,337
9,048,645,833
IssuesEvent
2019-02-12 00:57:43
matomo-org/matomo
https://api.github.com/repos/matomo-org/matomo
opened
in Ecommerce > Sales report and in all Goal reports, move "Keywords (including not defined)" down the list
c: Usability
Since search engines don't provide 95%+ of keywords used to access a website, the "Keywords" report (sometimes named "Keywords (including not defined)") will not contain valuable information. Therefore we can prevent some confusion and show a more interesting default report for people who click on: * Ecommerce > Sales report * or any Goal report and instead of showing items in this order: ![old](https://user-images.githubusercontent.com/466765/52604012-23c89780-2ece-11e9-99a5-4e3c75172442.png) we could move the report `Keywords (including not defined)` below the report `Search Engines`. The first and default report in the list would become `Channel Type` which makes sense.
True
in Ecommerce > Sales report and in all Goal reports, move "Keywords (including not defined)" down the list - Since search engines don't provide 95%+ of keywords used to access a website, the "Keywords" report (sometimes named "Keywords (including not defined)") will not contain valuable information. Therefore we can prevent some confusion and show a more interesting default report for people who click on: * Ecommerce > Sales report * or any Goal report and instead of showing items in this order: ![old](https://user-images.githubusercontent.com/466765/52604012-23c89780-2ece-11e9-99a5-4e3c75172442.png) we could move the report `Keywords (including not defined)` below the report `Search Engines`. The first and default report in the list would become `Channel Type` which makes sense.
usab
in ecommerce sales report and in all goal reports move keywords including not defined down the list since search engines don t provide of keywords used to access a website the keywords report sometimes named keywords including not defined will not contain valuable information therefore we can prevent some confusion and show a more interesting default report for people who click on ecommerce sales report or any goal report and instead of showing items in this order we could move the report keywords including not defined below the report search engines the first and default report in the list would become channel type which makes sense
1
57,925
11,810,574,397
IssuesEvent
2020-03-19 16:42:25
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
opened
Pass correct parameterName to ArgumentException
api-suggestion area-System.Runtime code-analyzer
Find places where `nameof(...)` is passed as the first (rather than second) argument to `ArgumentException`. Also places where `nameof` is used as the argument name in an `ArgumentException` (or derived type) but where it's not referring to a parameter. **Category**: Reliability
1.0
Pass correct parameterName to ArgumentException - Find places where `nameof(...)` is passed as the first (rather than second) argument to `ArgumentException`. Also places where `nameof` is used as the argument name in an `ArgumentException` (or derived type) but where it's not referring to a parameter. **Category**: Reliability
non_usab
pass correct parametername to argumentexception find places where nameof is passed as the first rather than second argument to argumentexception also places where nameof is used as the argument name in an argumentexception or derived type but where it s not referring to a parameter category reliability
0
15,825
10,317,153,971
IssuesEvent
2019-08-30 11:58:39
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Inspector dock changes size when selected
bug confirmed topic:editor usability
<!-- Please search existing issues for potential duplicates before filing yours: https://github.com/godotengine/godot/issues?q=is%3Aissue --> **Godot version:** 5b5db08 **Issue description:** When clicking the Inspector dock, it will change its size. It only affects this dock alone, no matter its current location: ![peek 2019-01-25 11-00](https://user-images.githubusercontent.com/30739239/51747391-428ef780-20a1-11e9-9abe-7adf98e921ba.gif)
True
Inspector dock changes size when selected - <!-- Please search existing issues for potential duplicates before filing yours: https://github.com/godotengine/godot/issues?q=is%3Aissue --> **Godot version:** 5b5db08 **Issue description:** When clicking the Inspector dock, it will change its size. It only affects this dock alone, no matter its current location: ![peek 2019-01-25 11-00](https://user-images.githubusercontent.com/30739239/51747391-428ef780-20a1-11e9-9abe-7adf98e921ba.gif)
usab
inspector dock changes size when selected please search existing issues for potential duplicates before filing yours godot version issue description when clicking the inspector dock it will change its size it only affects this dock alone no matter its current location
1
152,899
5,871,686,607
IssuesEvent
2017-05-15 09:22:43
javaee/glassfish
https://api.github.com/repos/javaee/glassfish
closed
"Delete all messages" doesn't clear stats
Component: jms Priority: Major Type: Bug
From the Glassfish server 4.0 admin console server(Admin Server)>JMS Physical Destinations>Select any queue(s) -> "delete all messages" after this If you click on "View" to see the statistics of the queue they remain unchanged.
1.0
"Delete all messages" doesn't clear stats - From the Glassfish server 4.0 admin console server(Admin Server)>JMS Physical Destinations>Select any queue(s) -> "delete all messages" after this If you click on "View" to see the statistics of the queue they remain unchanged.
non_usab
delete all messages doesn t clear stats from the glassfish server admin console server admin server jms physical destinations select any queue s delete all messages after this if you click on view to see the statistics of the queue they remain unchanged
0
42,228
9,195,161,128
IssuesEvent
2019-03-07 01:14:38
cryptoeconomics-study/visualizations
https://api.github.com/repos/cryptoeconomics-study/visualizations
closed
Use library for message animation
UI/UX code refactoring
Here's an example of using d3 transition to animate along an svg path. Definitely better performance than our current animation: http://bl.ocks.org/KoGor/8162640 I think the above is the best option, but if we end up needing to use react for animation, here are the top react animation libraries: react-transition-group, react-motion, and react-move
1.0
Use library for message animation - Here's an example of using d3 transition to animate along an svg path. Definitely better performance than our current animation: http://bl.ocks.org/KoGor/8162640 I think the above is the best option, but if we end up needing to use react for animation, here are the top react animation libraries: react-transition-group, react-motion, and react-move
non_usab
use library for message animation here s an example of using transition to animate along an svg path definitely better performance than our current animation i think the above is the best option but if we end up needing to use react for animation here are the top react animation libraries react transition group react motion and react move
0
22,115
18,720,973,164
IssuesEvent
2021-11-03 11:44:52
eclipse/dirigible
https://api.github.com/repos/eclipse/dirigible
closed
[Workbench] Alerts not working
bug web-ide usability efforts-low
**Describe the bug** When you activate `AlertSuccess`, `AlertInfo`, `AlertWarning` or `AlertError` while in the workbench perspective, nothing happens. There is no error in the console but there is no alert either. **Expected behavior** Alerts should be shown in the workbench perspective. **Desktop (please complete the following information):** - OS: macOS 12 - Browser: Firefox 93 - Version: Dirigible 6.1.3
True
[Workbench] Alerts not working - **Describe the bug** When you activate `AlertSuccess`, `AlertInfo`, `AlertWarning` or `AlertError` while in the workbench perspective, nothing happens. There is no error in the console but there is no alert either. **Expected behavior** Alerts should be shown in the workbench perspective. **Desktop (please complete the following information):** - OS: macOS 12 - Browser: Firefox 93 - Version: Dirigible 6.1.3
usab
alerts not working describe the bug when you activate alertsuccess alertinfo alertwarning or alerterror while in the workbench perspective nothing happens there is no error in the console but there is no alert either expected behavior alerts should be shown in the workbench perspective desktop please complete the following information os macos browser firefox version dirigible
1
270,472
28,960,725,171
IssuesEvent
2023-05-10 02:04:58
mattdanielbrown/primed
https://api.github.com/repos/mattdanielbrown/primed
closed
CVE-2020-7751 (High) detected in pathval-1.1.0.tgz - autoclosed
Mend: dependency security vulnerability
## CVE-2020-7751 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>pathval-1.1.0.tgz</b></p></summary> <p>Object value retrieval given a string path</p> <p>Library home page: <a href="https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz">https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/pathval/package.json</p> <p> Dependency Hierarchy: - chai-4.2.0.tgz (Root Library) - :x: **pathval-1.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/mattdanielbrown/primed/commit/4c04dadd915d6323f64b1d98dcdbc29df3b57cbb">4c04dadd915d6323f64b1d98dcdbc29df3b57cbb</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> pathval before version 1.1.1 is vulnerable to prototype pollution. <p>Publish Date: 2020-10-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7751>CVE-2020-7751</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7751</a></p> <p>Release Date: 2020-10-26</p> <p>Fix Resolution (pathval): 1.1.1</p> <p>Direct dependency fix Resolution (chai): 4.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7751 (High) detected in pathval-1.1.0.tgz - autoclosed - ## CVE-2020-7751 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>pathval-1.1.0.tgz</b></p></summary> <p>Object value retrieval given a string path</p> <p>Library home page: <a href="https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz">https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/pathval/package.json</p> <p> Dependency Hierarchy: - chai-4.2.0.tgz (Root Library) - :x: **pathval-1.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/mattdanielbrown/primed/commit/4c04dadd915d6323f64b1d98dcdbc29df3b57cbb">4c04dadd915d6323f64b1d98dcdbc29df3b57cbb</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> pathval before version 1.1.1 is vulnerable to prototype pollution. <p>Publish Date: 2020-10-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7751>CVE-2020-7751</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7751</a></p> <p>Release Date: 2020-10-26</p> <p>Fix Resolution (pathval): 1.1.1</p> <p>Direct dependency fix Resolution (chai): 4.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve high detected in pathval tgz autoclosed cve high severity vulnerability vulnerable library pathval tgz object value retrieval given a string path library home page a href path to dependency file package json path to vulnerable library node modules pathval package json dependency hierarchy chai tgz root library x pathval tgz vulnerable library found in head commit a href found in base branch master vulnerability details pathval before version is vulnerable to prototype pollution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution pathval direct dependency fix resolution chai step up your open source security game with mend
0
7,821
5,225,534,787
IssuesEvent
2017-01-27 18:35:10
VenturaFranklin/ThetaTauAnnualReport
https://api.github.com/repos/VenturaFranklin/ThetaTauAnnualReport
closed
Really Long Same Names
Usability
Really long names means that the attendance sheet is not clear which member eg. Christopher
True
Really Long Same Names - Really long names means that the attendance sheet is not clear which member eg. Christopher
usab
really long same names really long names means that the attendance sheet is not clear which member eg christopher
1
142,266
11,461,922,435
IssuesEvent
2020-02-07 13:05:30
elastic/elasticsearch
https://api.github.com/repos/elastic/elasticsearch
opened
[CI] ArraySearchPhaseResults shardIndex is already set
:Search/Search >test-failure
I've come across various apparently unrelated integration tests with the following error stacktrace: ``` Caused by: java.lang.AssertionError: shardIndex: 3 is already set at __randomizedtesting.SeedInfo.seed([A373DD6CE0DE449A]:0) at org.elasticsearch.action.search.ArraySearchPhaseResults.consumeResult(ArraySearchPhaseResults.java:43) at org.elasticsearch.action.search.SearchPhaseController$1.consumeResult(SearchPhaseController.java:745) at org.elasticsearch.action.search.AbstractSearchAsyncAction.onShardResult(AbstractSearchAsyncAction.java:471) at org.elasticsearch.action.search.AbstractSearchAsyncAction.access$000(AbstractSearchAsyncAction.java:67) at org.elasticsearch.action.search.AbstractSearchAsyncAction$1.innerOnResponse(AbstractSearchAsyncAction.java:235) ``` Example build scans: 7.x DateHistogramIT https://gradle-enterprise.elastic.co/s/wgy33s2eh6emy 7.x FieldSortIT https://gradle-enterprise.elastic.co/s/nwzskgzmeycmq 7.x MachineLearningLicensingTests https://gradle-enterprise.elastic.co/s/twukyytwyk2vg It's tedious to find all occurrences of it as this part of the stacktrace is not indexed in build-stats .
1.0
[CI] ArraySearchPhaseResults shardIndex is already set - I've come across various apparently unrelated integration tests with the following error stacktrace: ``` Caused by: java.lang.AssertionError: shardIndex: 3 is already set at __randomizedtesting.SeedInfo.seed([A373DD6CE0DE449A]:0) at org.elasticsearch.action.search.ArraySearchPhaseResults.consumeResult(ArraySearchPhaseResults.java:43) at org.elasticsearch.action.search.SearchPhaseController$1.consumeResult(SearchPhaseController.java:745) at org.elasticsearch.action.search.AbstractSearchAsyncAction.onShardResult(AbstractSearchAsyncAction.java:471) at org.elasticsearch.action.search.AbstractSearchAsyncAction.access$000(AbstractSearchAsyncAction.java:67) at org.elasticsearch.action.search.AbstractSearchAsyncAction$1.innerOnResponse(AbstractSearchAsyncAction.java:235) ``` Example build scans: 7.x DateHistogramIT https://gradle-enterprise.elastic.co/s/wgy33s2eh6emy 7.x FieldSortIT https://gradle-enterprise.elastic.co/s/nwzskgzmeycmq 7.x MachineLearningLicensingTests https://gradle-enterprise.elastic.co/s/twukyytwyk2vg It's tedious to find all occurrences of it as this part of the stacktrace is not indexed in build-stats .
non_usab
arraysearchphaseresults shardindex is already set i ve come across various apparently unrelated integration tests with the following error stacktrace caused by java lang assertionerror shardindex is already set at randomizedtesting seedinfo seed at org elasticsearch action search arraysearchphaseresults consumeresult arraysearchphaseresults java at org elasticsearch action search searchphasecontroller consumeresult searchphasecontroller java at org elasticsearch action search abstractsearchasyncaction onshardresult abstractsearchasyncaction java at org elasticsearch action search abstractsearchasyncaction access abstractsearchasyncaction java at org elasticsearch action search abstractsearchasyncaction inneronresponse abstractsearchasyncaction java example build scans x datehistogramit x fieldsortit x machinelearninglicensingtests it s tedious to find all occurrences of it as this part of the stacktrace is not indexed in build stats
0
26,957
27,428,239,003
IssuesEvent
2023-03-01 22:14:23
facebook/RapiD
https://api.github.com/repos/facebook/RapiD
closed
New Data should not be abide by same rules of edition than ID, before being uploaded to the OSM Database
feature-usability
### Description One of the problems that I ever encounted with the AI Data suggestion is that several magenta lines once accepted as highway=residential (despite what later will become) are too big to be moved, adjusted or otherwise edited, that produce an unnessesary burden for the mapper to be splitting the line and adjust move or offset chunck by chunck. This is totally ilogic to me, we should be able to move or adjust the whole line created independently of the size or zoom, because that line is not yet in the Database of OSM. Mappers are being restricted, by an ID rule that is perhaps Ok for EXISTING DATA, but not ok for data that is not YET part of the Database, as is the data suggested by RAPID AI.
True
New Data should not be abide by same rules of edition than ID, before being uploaded to the OSM Database - ### Description One of the problems that I ever encounted with the AI Data suggestion is that several magenta lines once accepted as highway=residential (despite what later will become) are too big to be moved, adjusted or otherwise edited, that produce an unnessesary burden for the mapper to be splitting the line and adjust move or offset chunck by chunck. This is totally ilogic to me, we should be able to move or adjust the whole line created independently of the size or zoom, because that line is not yet in the Database of OSM. Mappers are being restricted, by an ID rule that is perhaps Ok for EXISTING DATA, but not ok for data that is not YET part of the Database, as is the data suggested by RAPID AI.
usab
new data should not be abide by same rules of edition than id before being uploaded to the osm database description one of the problems that i ever encounted with the ai data suggestion is that several magenta lines once accepted as highway residential despite what later will become are too big to be moved adjusted or otherwise edited that produce an unnessesary burden for the mapper to be splitting the line and adjust move or offset chunck by chunck this is totally ilogic to me we should be able to move or adjust the whole line created independently of the size or zoom because that line is not yet in the database of osm mappers are being restricted by an id rule that is perhaps ok for existing data but not ok for data that is not yet part of the database as is the data suggested by rapid ai
1
53,089
13,260,881,444
IssuesEvent
2020-08-20 18:55:25
icecube-trac/tix4
https://api.github.com/repos/icecube-trac/tix4
closed
lhapdf_5.8.7 Portfile bugfix (Trac #683)
Migrated from Trac defect tools/ports
This patch fixes a bug that appears when "with_python" is not set. A patch against the current Portfile is attached. <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/683">https://code.icecube.wisc.edu/projects/icecube/ticket/683</a>, reported by claudio.kopperand owned by nega</em></summary> <p> ```json { "status": "closed", "changetime": "2012-06-03T02:04:24", "_ts": "1338689064000000", "description": "This patch fixes a bug that appears when \"with_python\" is not set. A patch against the current Portfile is attached.", "reporter": "claudio.kopper", "cc": "", "resolution": "fixed", "time": "2012-06-02T23:00:01", "component": "tools/ports", "summary": "lhapdf_5.8.7 Portfile bugfix", "priority": "normal", "keywords": "lhapdf 5.8.7", "milestone": "", "owner": "nega", "type": "defect" } ``` </p> </details>
1.0
lhapdf_5.8.7 Portfile bugfix (Trac #683) - This patch fixes a bug that appears when "with_python" is not set. A patch against the current Portfile is attached. <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/683">https://code.icecube.wisc.edu/projects/icecube/ticket/683</a>, reported by claudio.kopperand owned by nega</em></summary> <p> ```json { "status": "closed", "changetime": "2012-06-03T02:04:24", "_ts": "1338689064000000", "description": "This patch fixes a bug that appears when \"with_python\" is not set. A patch against the current Portfile is attached.", "reporter": "claudio.kopper", "cc": "", "resolution": "fixed", "time": "2012-06-02T23:00:01", "component": "tools/ports", "summary": "lhapdf_5.8.7 Portfile bugfix", "priority": "normal", "keywords": "lhapdf 5.8.7", "milestone": "", "owner": "nega", "type": "defect" } ``` </p> </details>
non_usab
lhapdf portfile bugfix trac this patch fixes a bug that appears when with python is not set a patch against the current portfile is attached migrated from json status closed changetime ts description this patch fixes a bug that appears when with python is not set a patch against the current portfile is attached reporter claudio kopper cc resolution fixed time component tools ports summary lhapdf portfile bugfix priority normal keywords lhapdf milestone owner nega type defect
0
308,709
23,262,946,815
IssuesEvent
2022-08-04 14:52:35
Kitware/dive
https://api.github.com/repos/Kitware/dive
opened
Update Admin Documentation
Type: documentation Type: Feature Request
Administrative Documentation needs to be updated. Specifically: - Addons installing and tools - Admin Panel information - Admin Jobs Panel - Admin Branding panel
1.0
Update Admin Documentation - Administrative Documentation needs to be updated. Specifically: - Addons installing and tools - Admin Panel information - Admin Jobs Panel - Admin Branding panel
non_usab
update admin documentation administrative documentation needs to be updated specifically addons installing and tools admin panel information admin jobs panel admin branding panel
0
22,702
20,017,491,484
IssuesEvent
2022-02-01 13:32:27
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
closed
Client: long queries are not removed when navigating through history
usability
**How to reproduce:** 1. Run several long queries in `clickhouse-client` such that query does not fit into one line in terminal 2. Try to navigate through history using "up" and "down" keys 3. You will see something like this: ![Screenshot from 2021-12-08 16-16-06](https://user-images.githubusercontent.com/14847450/145214824-6100431e-f8c5-41e6-8f5f-26449e650f64.png) It makes query history almost impossible to use. **Expected behavior:** Client should remove previous query from terminal before printing the next one (just like it worked in older versions and how it works now if query fits into one line) ![Screenshot from 2021-12-08 16-20-59](https://user-images.githubusercontent.com/14847450/145215435-19951d95-f26f-4e78-9b53-bd23bb82959f.png) ![Screenshot from 2021-12-08 16-21-26](https://user-images.githubusercontent.com/14847450/145215454-ca691a3d-1dfc-4df4-ab17-66486da3ff55.png)
True
Client: long queries are not removed when navigating through history - **How to reproduce:** 1. Run several long queries in `clickhouse-client` such that query does not fit into one line in terminal 2. Try to navigate through history using "up" and "down" keys 3. You will see something like this: ![Screenshot from 2021-12-08 16-16-06](https://user-images.githubusercontent.com/14847450/145214824-6100431e-f8c5-41e6-8f5f-26449e650f64.png) It makes query history almost impossible to use. **Expected behavior:** Client should remove previous query from terminal before printing the next one (just like it worked in older versions and how it works now if query fits into one line) ![Screenshot from 2021-12-08 16-20-59](https://user-images.githubusercontent.com/14847450/145215435-19951d95-f26f-4e78-9b53-bd23bb82959f.png) ![Screenshot from 2021-12-08 16-21-26](https://user-images.githubusercontent.com/14847450/145215454-ca691a3d-1dfc-4df4-ab17-66486da3ff55.png)
usab
client long queries are not removed when navigating through history how to reproduce run several long queries in clickhouse client such that query does not fit into one line in terminal try to navigate through history using up and down keys you will see something like this it makes query history almost impossible to use expected behavior client should remove previous query from terminal before printing the next one just like it worked in older versions and how it works now if query fits into one line
1
188,679
15,167,626,394
IssuesEvent
2021-02-12 18:05:02
KadTheHunter/CityPlans
https://api.github.com/repos/KadTheHunter/CityPlans
opened
[To-Do List] Tree Repository
documentation enhancement
- [x] Create Tree Repository Portal at Hub - [ ] Upload tree files to here - [ ] Create Tree Repository world - [ ] Paste in trees - [ ] Label pasted in Trees - [ ] Rename tree files accordingly
1.0
[To-Do List] Tree Repository - - [x] Create Tree Repository Portal at Hub - [ ] Upload tree files to here - [ ] Create Tree Repository world - [ ] Paste in trees - [ ] Label pasted in Trees - [ ] Rename tree files accordingly
non_usab
tree repository create tree repository portal at hub upload tree files to here create tree repository world paste in trees label pasted in trees rename tree files accordingly
0
27,932
12,737,522,475
IssuesEvent
2020-06-25 18:55:39
cityofaustin/atd-data-tech
https://api.github.com/repos/cityofaustin/atd-data-tech
closed
Create and publish Crowdsource Polling App to collect feedback on Congress Ave Temporary Protected Bike Lanes
Impact: 2-Major Need: 1-Must Have Service: Geo Type: Map Request Workgroup: ATSD
ATD is installing temporary protected bike lanes on Congress Ave between from Riverside to 11th St. This issue creates a crowdsource polling app to collect public feedback, and it will essentially mimic the app for [Reviewing Current Healthy Streets](https://austin.maps.arcgis.com/apps/CrowdsourcePolling/index.html?appid=87a64b5983e84cb5a84b9628d84f122d).
1.0
Create and publish Crowdsource Polling App to collect feedback on Congress Ave Temporary Protected Bike Lanes - ATD is installing temporary protected bike lanes on Congress Ave between from Riverside to 11th St. This issue creates a crowdsource polling app to collect public feedback, and it will essentially mimic the app for [Reviewing Current Healthy Streets](https://austin.maps.arcgis.com/apps/CrowdsourcePolling/index.html?appid=87a64b5983e84cb5a84b9628d84f122d).
non_usab
create and publish crowdsource polling app to collect feedback on congress ave temporary protected bike lanes atd is installing temporary protected bike lanes on congress ave between from riverside to st this issue creates a crowdsource polling app to collect public feedback and it will essentially mimic the app for
0
59,375
6,649,422,371
IssuesEvent
2017-09-28 13:11:53
cuberite/cuberite
https://api.github.com/repos/cuberite/cuberite
closed
Hoppers copied with Worldedit are messed up.
status/ingame-testing-needed
They do not accept items, and feeding another item into them via another hopper floods the console with this: ``` [c3785733e78bcae8|22:08:42] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:42] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:42] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:42] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:42] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} ```
1.0
Hoppers copied with Worldedit are messed up. - They do not accept items, and feeding another item into them via another hopper floods the console with this: ``` [c3785733e78bcae8|22:08:42] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:42] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:42] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:42] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:42] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} [c3785733e78bcae8|22:08:43] MoveItemsOut: A block entity was not found where expected at {405, 120, 231} ```
non_usab
hoppers copied with worldedit are messed up they do not accept items and feeding another item into them via another hopper floods the console with this moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at moveitemsout a block entity was not found where expected at
0
87,745
17,368,938,675
IssuesEvent
2021-07-30 11:18:03
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
[4.0] Unable to add module class suffix
No Code Attached Yet
### Steps to reproduce the issue Try to add the module class suffix to the modules (backend and frontend). ### Expected result Can add the module class suffix. ### Actual result Unable to add the module class suffix. ### System information (as much as possible) Joomla 4 ### Additional comments Missing of: `$moduleclass_sfx = htmlspecialchars($params->get('moduleclass_sfx'), ENT_COMPAT, 'UTF-8');` `class="mod-custom custom<?php echo $moduleclass_sfx; ?>`
1.0
[4.0] Unable to add module class suffix - ### Steps to reproduce the issue Try to add the module class suffix to the modules (backend and frontend). ### Expected result Can add the module class suffix. ### Actual result Unable to add the module class suffix. ### System information (as much as possible) Joomla 4 ### Additional comments Missing of: `$moduleclass_sfx = htmlspecialchars($params->get('moduleclass_sfx'), ENT_COMPAT, 'UTF-8');` `class="mod-custom custom<?php echo $moduleclass_sfx; ?>`
non_usab
unable to add module class suffix steps to reproduce the issue try to add the module class suffix to the modules backend and frontend expected result can add the module class suffix actual result unable to add the module class suffix system information as much as possible joomla additional comments missing of moduleclass sfx htmlspecialchars params get moduleclass sfx ent compat utf class mod custom custom
0
3,076
2,733,986,778
IssuesEvent
2015-04-17 17:04:10
stealjs/steal
https://api.github.com/repos/stealjs/steal
closed
system-bower support for bowerIgnore
feature needs documentation
This is mainly for tracking the milestone, upstream pr: https://github.com/stealjs/system-bower/pull/14
1.0
system-bower support for bowerIgnore - This is mainly for tracking the milestone, upstream pr: https://github.com/stealjs/system-bower/pull/14
non_usab
system bower support for bowerignore this is mainly for tracking the milestone upstream pr
0
283,568
24,553,312,015
IssuesEvent
2022-10-12 14:08:11
marklogic/java-client-api
https://api.github.com/repos/marklogic/java-client-api
closed
op.sampleBy misses the 0 parameter overloaded method
Bug minor test
In PlanBuilder.java, we only have public abstract ModifyPlan sampleBy(PlanSampleByOptions option); while missing public abstract ModifyPlan sampleBy(); Updated the server code src/makefiles/optic/optic-defs.json to regenerate PlanBuilder.java So we can address your issue, please include the following: ### Version of MarkLogic Java Client API See Readme.txt ### Version of MarkLogic Server See admin gui on port 8001 or run xdmp:version() in Query Console - port 8000) ### Java version Run `java -version` ### OS and version For MAC, run `sw_vers`. \ For Windows, run `systeminfo | findstr /B /C:"OS Name" /C:"OS Version"`\ For Linux, run `cat /etc/os-release` and `uname -r` ### Input: Some code to illustrate the problem, preferably in a state that can be independently reproduced on our end ### Actual output: What did you observe? What errors did you see? Can you attach the logs? (Java logs, MarkLogic logs) ### Expected output: What specifically did you expect to happen? ### Alternatives: What else have you tried, actual/expected?
1.0
op.sampleBy misses the 0 parameter overloaded method - In PlanBuilder.java, we only have public abstract ModifyPlan sampleBy(PlanSampleByOptions option); while missing public abstract ModifyPlan sampleBy(); Updated the server code src/makefiles/optic/optic-defs.json to regenerate PlanBuilder.java So we can address your issue, please include the following: ### Version of MarkLogic Java Client API See Readme.txt ### Version of MarkLogic Server See admin gui on port 8001 or run xdmp:version() in Query Console - port 8000) ### Java version Run `java -version` ### OS and version For MAC, run `sw_vers`. \ For Windows, run `systeminfo | findstr /B /C:"OS Name" /C:"OS Version"`\ For Linux, run `cat /etc/os-release` and `uname -r` ### Input: Some code to illustrate the problem, preferably in a state that can be independently reproduced on our end ### Actual output: What did you observe? What errors did you see? Can you attach the logs? (Java logs, MarkLogic logs) ### Expected output: What specifically did you expect to happen? ### Alternatives: What else have you tried, actual/expected?
non_usab
op sampleby misses the parameter overloaded method in planbuilder java we only have public abstract modifyplan sampleby plansamplebyoptions option while missing public abstract modifyplan sampleby updated the server code src makefiles optic optic defs json to regenerate planbuilder java so we can address your issue please include the following version of marklogic java client api see readme txt version of marklogic server see admin gui on port or run xdmp version in query console port java version run java version os and version for mac run sw vers for windows run systeminfo findstr b c os name c os version for linux run cat etc os release and uname r input some code to illustrate the problem preferably in a state that can be independently reproduced on our end actual output what did you observe what errors did you see can you attach the logs java logs marklogic logs expected output what specifically did you expect to happen alternatives what else have you tried actual expected
0
36,574
12,417,832,537
IssuesEvent
2020-05-22 21:48:51
TIBCOSoftware/labs-air
https://api.github.com/repos/TIBCOSoftware/labs-air
closed
CVE-2017-16129 (Medium) detected in superagent-0.17.0.tgz
security vulnerability
## CVE-2017-16129 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>superagent-0.17.0.tgz</b></p></summary> <p>elegant & feature rich browser / node HTTP with a fluent API</p> <p>Library home page: <a href="https://registry.npmjs.org/superagent/-/superagent-0.17.0.tgz">https://registry.npmjs.org/superagent/-/superagent-0.17.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/labs-air/ui/ProjectAir/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/labs-air/ui/ProjectAir/node_modules/superagent/package.json</p> <p> Dependency Hierarchy: - component-1.1.0.tgz (Root Library) - :x: **superagent-0.17.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/TIBCOSoftware/labs-air/commit/91b4245b987bd63abaeb49223360180947327d49">91b4245b987bd63abaeb49223360180947327d49</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16129>CVE-2017-16129</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-16129">https://nvd.nist.gov/vuln/detail/CVE-2017-16129</a></p> <p>Release Date: 2019-04-08</p> <p>Fix Resolution: 3.7.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"superagent","packageVersion":"0.17.0","isTransitiveDependency":true,"dependencyTree":"component:1.1.0;superagent:0.17.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.7.0"}],"vulnerabilityIdentifier":"CVE-2017-16129","vulnerabilityDetails":"The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16129","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2017-16129 (Medium) detected in superagent-0.17.0.tgz - ## CVE-2017-16129 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>superagent-0.17.0.tgz</b></p></summary> <p>elegant & feature rich browser / node HTTP with a fluent API</p> <p>Library home page: <a href="https://registry.npmjs.org/superagent/-/superagent-0.17.0.tgz">https://registry.npmjs.org/superagent/-/superagent-0.17.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/labs-air/ui/ProjectAir/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/labs-air/ui/ProjectAir/node_modules/superagent/package.json</p> <p> Dependency Hierarchy: - component-1.1.0.tgz (Root Library) - :x: **superagent-0.17.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/TIBCOSoftware/labs-air/commit/91b4245b987bd63abaeb49223360180947327d49">91b4245b987bd63abaeb49223360180947327d49</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16129>CVE-2017-16129</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-16129">https://nvd.nist.gov/vuln/detail/CVE-2017-16129</a></p> <p>Release Date: 2019-04-08</p> <p>Fix Resolution: 3.7.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"superagent","packageVersion":"0.17.0","isTransitiveDependency":true,"dependencyTree":"component:1.1.0;superagent:0.17.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.7.0"}],"vulnerabilityIdentifier":"CVE-2017-16129","vulnerabilityDetails":"The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16129","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_usab
cve medium detected in superagent tgz cve medium severity vulnerability vulnerable library superagent tgz elegant feature rich browser node http with a fluent api library home page a href path to dependency file tmp ws scm labs air ui projectair package json path to vulnerable library tmp ws scm labs air ui projectair node modules superagent package json dependency hierarchy component tgz root library x superagent tgz vulnerable library found in head commit a href vulnerability details the http client module superagent is vulnerable to zip bomb attacks in a zip bomb attack the http server replies with a compressed response that becomes several magnitudes larger once uncompressed if a client does not take special care when processing such responses it may result in excessive cpu and or memory consumption an attacker might exploit such a weakness for a dos attack to exploit this the attacker must control the location url that superagent makes a request to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails the http client module superagent is vulnerable to zip bomb attacks in a zip bomb attack the http server replies with a compressed response that becomes several magnitudes larger once uncompressed if a client does not take special care when processing such responses it may result in excessive cpu and or memory consumption an attacker might exploit such a weakness for a dos attack to exploit this the attacker must control the location url that superagent makes a request to vulnerabilityurl
0
24,807
24,310,262,130
IssuesEvent
2022-09-29 21:28:54
DCS-LCSR/SignStream3
https://api.github.com/repos/DCS-LCSR/SignStream3
opened
Audio Files and Visualization
usability concern severity NONE
Code is completed which allows the selection of audio files to be annotated in SignStream. An audio file waveform is displayed in a zoomable window along with a visual spectrogram and the calculated pitch values of that audio. Mouse hovering displays values within the audio at the hovered time and mouse selection of times allows the setting of start and end time of annotations. Absolute time is displayed in the window. Typical player functionality (play, stop, faster, slower) is implemented in the audio window. Playing is synchronized to the other media files and a green bar progresses through the display window similar in behavior to the utterance view's annotation panels. Pitch is adjusted when playing slowed to speed up to sound appropriately. This code is implemented, but is not included in the latest SignStream release. This is a placeholder to indicate that it exists if this feature was desired again.
True
Audio Files and Visualization - Code is completed which allows the selection of audio files to be annotated in SignStream. An audio file waveform is displayed in a zoomable window along with a visual spectrogram and the calculated pitch values of that audio. Mouse hovering displays values within the audio at the hovered time and mouse selection of times allows the setting of start and end time of annotations. Absolute time is displayed in the window. Typical player functionality (play, stop, faster, slower) is implemented in the audio window. Playing is synchronized to the other media files and a green bar progresses through the display window similar in behavior to the utterance view's annotation panels. Pitch is adjusted when playing slowed to speed up to sound appropriately. This code is implemented, but is not included in the latest SignStream release. This is a placeholder to indicate that it exists if this feature was desired again.
usab
audio files and visualization code is completed which allows the selection of audio files to be annotated in signstream an audio file waveform is displayed in a zoomable window along with a visual spectrogram and the calculated pitch values of that audio mouse hovering displays values within the audio at the hovered time and mouse selection of times allows the setting of start and end time of annotations absolute time is displayed in the window typical player functionality play stop faster slower is implemented in the audio window playing is synchronized to the other media files and a green bar progresses through the display window similar in behavior to the utterance view s annotation panels pitch is adjusted when playing slowed to speed up to sound appropriately this code is implemented but is not included in the latest signstream release this is a placeholder to indicate that it exists if this feature was desired again
1
241,091
7,808,813,320
IssuesEvent
2018-06-11 21:27:31
zephyrproject-rtos/zephyr
https://api.github.com/repos/zephyrproject-rtos/zephyr
closed
DHCP client does not notice missing link
area: Debugging area: Networking bug priority: medium
The current DHCP implementation seems not to be able to detect link changes (on my Nucleo-F429ZI board). After pulling the cable the interface status remains bound: ``` shell> net iface Interface 0x2000a140 (Ethernet) [0] =================================== Link addr : 00:80:E1:3A:A5:26 MTU : 1500 IPv4 unicast addresses (max 5): 10.0.0.107 DHCP preferred IPv4 multicast addresses (max 5): <none> IPv4 gateway : 10.0.0.5 IPv4 netmask : 255.255.255.0 DHCPv4 lease time : 259200 DHCPv4 renew time : 0 DHCPv4 server : 10.0.0.5 DHCPv4 requested : 10.0.0.107 DHCPv4 state : bound DHCPv4 attempts : 1 ``` I would expect that the interface recognizes its link state and attempts a RENEW of the lease (if not already expired) as soon as the link is reestablished. This ensures that the network has not changed and the IP address is still available.
1.0
DHCP client does not notice missing link - The current DHCP implementation seems not to be able to detect link changes (on my Nucleo-F429ZI board). After pulling the cable the interface status remains bound: ``` shell> net iface Interface 0x2000a140 (Ethernet) [0] =================================== Link addr : 00:80:E1:3A:A5:26 MTU : 1500 IPv4 unicast addresses (max 5): 10.0.0.107 DHCP preferred IPv4 multicast addresses (max 5): <none> IPv4 gateway : 10.0.0.5 IPv4 netmask : 255.255.255.0 DHCPv4 lease time : 259200 DHCPv4 renew time : 0 DHCPv4 server : 10.0.0.5 DHCPv4 requested : 10.0.0.107 DHCPv4 state : bound DHCPv4 attempts : 1 ``` I would expect that the interface recognizes its link state and attempts a RENEW of the lease (if not already expired) as soon as the link is reestablished. This ensures that the network has not changed and the IP address is still available.
non_usab
dhcp client does not notice missing link the current dhcp implementation seems not to be able to detect link changes on my nucleo board after pulling the cable the interface status remains bound shell net iface interface ethernet link addr mtu unicast addresses max dhcp preferred multicast addresses max gateway netmask lease time renew time server requested state bound attempts i would expect that the interface recognizes its link state and attempts a renew of the lease if not already expired as soon as the link is reestablished this ensures that the network has not changed and the ip address is still available
0
357
2,524,590,407
IssuesEvent
2015-01-20 18:47:33
SemanticMediaWiki/SemanticMediaWiki
https://api.github.com/repos/SemanticMediaWiki/SemanticMediaWiki
opened
CacheableResultCollector::findPropertyTableByType uses undefined field
code quality
It accessed a $store field, which is not defined in the class itself. It implicitly relies on the deriving classes to define one.
1.0
CacheableResultCollector::findPropertyTableByType uses undefined field - It accessed a $store field, which is not defined in the class itself. It implicitly relies on the deriving classes to define one.
non_usab
cacheableresultcollector findpropertytablebytype uses undefined field it accessed a store field which is not defined in the class itself it implicitly relies on the deriving classes to define one
0
3,927
3,614,361,495
IssuesEvent
2016-02-06 01:06:25
tgstation/-tg-station
https://api.github.com/repos/tgstation/-tg-station
reopened
SPIDER POPUP WINDOWS
Not a bug UI Usability
>spiders lay eggs >no end of popup windows and beeps asking if you want to be a spider >you think it's stopped finally >they lay eggs again Absolutely critical issue
True
SPIDER POPUP WINDOWS - >spiders lay eggs >no end of popup windows and beeps asking if you want to be a spider >you think it's stopped finally >they lay eggs again Absolutely critical issue
usab
spider popup windows spiders lay eggs no end of popup windows and beeps asking if you want to be a spider you think it s stopped finally they lay eggs again absolutely critical issue
1
280,220
30,807,791,868
IssuesEvent
2023-08-01 08:23:47
momo-tong/jackson-databind-2.8.11.4
https://api.github.com/repos/momo-tong/jackson-databind-2.8.11.4
opened
jackson-databind-2.8.11.4.jar: 49 vulnerabilities (highest severity is: 9.8)
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (jackson-databind version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2019-14540](https://www.mend.io/vulnerability-database/CVE-2019-14540) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-17531](https://www.mend.io/vulnerability-database/CVE-2019-17531) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.1 | &#10060; | | [CVE-2019-16335](https://www.mend.io/vulnerability-database/CVE-2019-16335) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-17267](https://www.mend.io/vulnerability-database/CVE-2019-17267) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2020-8840](https://www.mend.io/vulnerability-database/CVE-2020-8840) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-16942](https://www.mend.io/vulnerability-database/CVE-2019-16942) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-16943](https://www.mend.io/vulnerability-database/CVE-2019-16943) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-10202](https://www.mend.io/vulnerability-database/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.9 | &#10060; | | [CVE-2019-14893](https://www.mend.io/vulnerability-database/CVE-2019-14893) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-14892](https://www.mend.io/vulnerability-database/CVE-2019-14892) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2020-9546](https://www.mend.io/vulnerability-database/CVE-2020-9546) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-9547](https://www.mend.io/vulnerability-database/CVE-2020-9547) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-9548](https://www.mend.io/vulnerability-database/CVE-2020-9548) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2019-20330](https://www.mend.io/vulnerability-database/CVE-2019-20330) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2020-10968](https://www.mend.io/vulnerability-database/CVE-2020-10968) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-10969](https://www.mend.io/vulnerability-database/CVE-2020-10969) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-11111](https://www.mend.io/vulnerability-database/CVE-2020-11111) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-11113](https://www.mend.io/vulnerability-database/CVE-2020-11113) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-11112](https://www.mend.io/vulnerability-database/CVE-2020-11112) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-10672](https://www.mend.io/vulnerability-database/CVE-2020-10672) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-10673](https://www.mend.io/vulnerability-database/CVE-2020-10673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-11619](https://www.mend.io/vulnerability-database/CVE-2020-11619) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-35728](https://www.mend.io/vulnerability-database/CVE-2020-35728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-36189](https://www.mend.io/vulnerability-database/CVE-2020-36189) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36188](https://www.mend.io/vulnerability-database/CVE-2020-36188) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-11620](https://www.mend.io/vulnerability-database/CVE-2020-11620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-10650](https://www.mend.io/vulnerability-database/CVE-2020-10650) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-36181](https://www.mend.io/vulnerability-database/CVE-2020-36181) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36180](https://www.mend.io/vulnerability-database/CVE-2020-36180) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-35490](https://www.mend.io/vulnerability-database/CVE-2020-35490) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-36183](https://www.mend.io/vulnerability-database/CVE-2020-36183) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36182](https://www.mend.io/vulnerability-database/CVE-2020-36182) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36185](https://www.mend.io/vulnerability-database/CVE-2020-36185) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36184](https://www.mend.io/vulnerability-database/CVE-2020-36184) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-35491](https://www.mend.io/vulnerability-database/CVE-2020-35491) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-36187](https://www.mend.io/vulnerability-database/CVE-2020-36187) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36186](https://www.mend.io/vulnerability-database/CVE-2020-36186) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2021-20190](https://www.mend.io/vulnerability-database/CVE-2021-20190) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.7 | &#10060; | | [CVE-2020-36179](https://www.mend.io/vulnerability-database/CVE-2020-36179) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-24616](https://www.mend.io/vulnerability-database/CVE-2020-24616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-14060](https://www.mend.io/vulnerability-database/CVE-2020-14060) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-14061](https://www.mend.io/vulnerability-database/CVE-2020-14061) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-14062](https://www.mend.io/vulnerability-database/CVE-2020-14062) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-24750](https://www.mend.io/vulnerability-database/CVE-2020-24750) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-14195](https://www.mend.io/vulnerability-database/CVE-2020-14195) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2019-14439](https://www.mend.io/vulnerability-database/CVE-2019-14439) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2022-42004](https://www.mend.io/vulnerability-database/CVE-2022-42004) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | jackson-databind-2.8.11.4.jar | Direct | 2.12.7.1 | &#10060; | | [CVE-2022-42003](https://www.mend.io/vulnerability-database/CVE-2022-42003) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | jackson-databind-2.8.11.4.jar | Direct | 2.12.7.1 | &#10060; | | [CVE-2020-36518](https://www.mend.io/vulnerability-database/CVE-2020-36518) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | jackson-databind-2.8.11.4.jar | Direct | 2.12.6.1 | &#10060; | ## Details > Partial details (23 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-14540</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14540>CVE-2019-14540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-17531</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-10-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17531>CVE-2019-17531</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p> <p>Release Date: 2019-10-12</p> <p>Fix Resolution: 2.9.10.1</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-16335</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16335>CVE-2019-16335</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-17267</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup. <p>Publish Date: 2019-10-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17267>CVE-2019-17267</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-10-07</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-8840</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. <p>Publish Date: 2020-02-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-8840>CVE-2020-8840</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-02-10</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-16942</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16942>CVE-2019-16942</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-16943</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16943>CVE-2019-16943</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-10202</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10202>CVE-2019-10202</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4">https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.9.9</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-14893</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14893>CVE-2019-14893</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-14892</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14892>CVE-2019-14892</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-9546</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9546>CVE-2020-9546</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.8.11.6</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-9547</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9547>CVE-2020-9547</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-9548</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9548>CVE-2020-9548</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.8.11.6</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-20330</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. <p>Publish Date: 2020-01-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20330>CVE-2019-20330</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-01-03</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-10968</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy). <p>Publish Date: 2020-03-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-10968>CVE-2020-10968</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10968">https://nvd.nist.gov/vuln/detail/CVE-2020-10968</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-10969</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane. <p>Publish Date: 2020-03-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-10969>CVE-2020-10969</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-11111</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11111>CVE-2020-11111</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-11113</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11113>CVE-2020-11113</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-11112</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11112>CVE-2020-11112</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-10672</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms). <p>Publish Date: 2020-03-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-10672>CVE-2020-10672</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10672">https://nvd.nist.gov/vuln/detail/CVE-2020-10672</a></p> <p>Release Date: 2020-03-18</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-10673</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus). <p>Publish Date: 2020-03-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-10673>CVE-2020-10673</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-03-18</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-11619</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop). <p>Publish Date: 2020-04-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11619>CVE-2020-11619</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619</a></p> <p>Release Date: 2020-04-07</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-35728</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl). <p>Publish Date: 2020-12-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-35728>CVE-2020-35728</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35728">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35728</a></p> <p>Release Date: 2020-12-27</p> <p>Fix Resolution: 2.8.11.6</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
True
jackson-databind-2.8.11.4.jar: 49 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (jackson-databind version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2019-14540](https://www.mend.io/vulnerability-database/CVE-2019-14540) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-17531](https://www.mend.io/vulnerability-database/CVE-2019-17531) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.1 | &#10060; | | [CVE-2019-16335](https://www.mend.io/vulnerability-database/CVE-2019-16335) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-17267](https://www.mend.io/vulnerability-database/CVE-2019-17267) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2020-8840](https://www.mend.io/vulnerability-database/CVE-2020-8840) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-16942](https://www.mend.io/vulnerability-database/CVE-2019-16942) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-16943](https://www.mend.io/vulnerability-database/CVE-2019-16943) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-10202](https://www.mend.io/vulnerability-database/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.9 | &#10060; | | [CVE-2019-14893](https://www.mend.io/vulnerability-database/CVE-2019-14893) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2019-14892](https://www.mend.io/vulnerability-database/CVE-2019-14892) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2020-9546](https://www.mend.io/vulnerability-database/CVE-2020-9546) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-9547](https://www.mend.io/vulnerability-database/CVE-2020-9547) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-9548](https://www.mend.io/vulnerability-database/CVE-2020-9548) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2019-20330](https://www.mend.io/vulnerability-database/CVE-2019-20330) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2020-10968](https://www.mend.io/vulnerability-database/CVE-2020-10968) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-10969](https://www.mend.io/vulnerability-database/CVE-2020-10969) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-11111](https://www.mend.io/vulnerability-database/CVE-2020-11111) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-11113](https://www.mend.io/vulnerability-database/CVE-2020-11113) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-11112](https://www.mend.io/vulnerability-database/CVE-2020-11112) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-10672](https://www.mend.io/vulnerability-database/CVE-2020-10672) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-10673](https://www.mend.io/vulnerability-database/CVE-2020-10673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-11619](https://www.mend.io/vulnerability-database/CVE-2020-11619) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-35728](https://www.mend.io/vulnerability-database/CVE-2020-35728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-36189](https://www.mend.io/vulnerability-database/CVE-2020-36189) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36188](https://www.mend.io/vulnerability-database/CVE-2020-36188) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-11620](https://www.mend.io/vulnerability-database/CVE-2020-11620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-10650](https://www.mend.io/vulnerability-database/CVE-2020-10650) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.4 | &#10060; | | [CVE-2020-36181](https://www.mend.io/vulnerability-database/CVE-2020-36181) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36180](https://www.mend.io/vulnerability-database/CVE-2020-36180) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-35490](https://www.mend.io/vulnerability-database/CVE-2020-35490) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-36183](https://www.mend.io/vulnerability-database/CVE-2020-36183) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36182](https://www.mend.io/vulnerability-database/CVE-2020-36182) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36185](https://www.mend.io/vulnerability-database/CVE-2020-36185) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36184](https://www.mend.io/vulnerability-database/CVE-2020-36184) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-35491](https://www.mend.io/vulnerability-database/CVE-2020-35491) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-36187](https://www.mend.io/vulnerability-database/CVE-2020-36187) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-36186](https://www.mend.io/vulnerability-database/CVE-2020-36186) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2021-20190](https://www.mend.io/vulnerability-database/CVE-2021-20190) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.7 | &#10060; | | [CVE-2020-36179](https://www.mend.io/vulnerability-database/CVE-2020-36179) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.9.10.8 | &#10060; | | [CVE-2020-24616](https://www.mend.io/vulnerability-database/CVE-2020-24616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-14060](https://www.mend.io/vulnerability-database/CVE-2020-14060) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-14061](https://www.mend.io/vulnerability-database/CVE-2020-14061) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-14062](https://www.mend.io/vulnerability-database/CVE-2020-14062) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-24750](https://www.mend.io/vulnerability-database/CVE-2020-24750) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2020-14195](https://www.mend.io/vulnerability-database/CVE-2020-14195) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.1 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.6 | &#10060; | | [CVE-2019-14439](https://www.mend.io/vulnerability-database/CVE-2019-14439) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | jackson-databind-2.8.11.4.jar | Direct | 2.8.11.5 | &#10060; | | [CVE-2022-42004](https://www.mend.io/vulnerability-database/CVE-2022-42004) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | jackson-databind-2.8.11.4.jar | Direct | 2.12.7.1 | &#10060; | | [CVE-2022-42003](https://www.mend.io/vulnerability-database/CVE-2022-42003) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | jackson-databind-2.8.11.4.jar | Direct | 2.12.7.1 | &#10060; | | [CVE-2020-36518](https://www.mend.io/vulnerability-database/CVE-2020-36518) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | jackson-databind-2.8.11.4.jar | Direct | 2.12.6.1 | &#10060; | ## Details > Partial details (23 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-14540</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14540>CVE-2019-14540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-17531</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-10-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17531>CVE-2019-17531</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p> <p>Release Date: 2019-10-12</p> <p>Fix Resolution: 2.9.10.1</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-16335</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16335>CVE-2019-16335</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-17267</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup. <p>Publish Date: 2019-10-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17267>CVE-2019-17267</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-10-07</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-8840</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. <p>Publish Date: 2020-02-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-8840>CVE-2020-8840</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-02-10</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-16942</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16942>CVE-2019-16942</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-16943</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16943>CVE-2019-16943</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-10202</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10202>CVE-2019-10202</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4">https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: 2.9.9</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-14893</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14893>CVE-2019-14893</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-14892</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14892>CVE-2019-14892</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-9546</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9546>CVE-2020-9546</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.8.11.6</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-9547</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9547>CVE-2020-9547</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-9548</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9548>CVE-2020-9548</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: 2.8.11.6</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-20330</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. <p>Publish Date: 2020-01-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20330>CVE-2019-20330</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-01-03</p> <p>Fix Resolution: 2.8.11.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-10968</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy). <p>Publish Date: 2020-03-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-10968>CVE-2020-10968</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10968">https://nvd.nist.gov/vuln/detail/CVE-2020-10968</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-10969</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane. <p>Publish Date: 2020-03-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-10969>CVE-2020-10969</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969</a></p> <p>Release Date: 2020-03-26</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-11111</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11111>CVE-2020-11111</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-11113</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11113>CVE-2020-11113</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-11112</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11112>CVE-2020-11112</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-10672</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms). <p>Publish Date: 2020-03-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-10672>CVE-2020-10672</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10672">https://nvd.nist.gov/vuln/detail/CVE-2020-10672</a></p> <p>Release Date: 2020-03-18</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-10673</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus). <p>Publish Date: 2020-03-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-10673>CVE-2020-10673</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-03-18</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-11619</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop). <p>Publish Date: 2020-04-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-11619>CVE-2020-11619</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619</a></p> <p>Release Date: 2020-04-07</p> <p>Fix Resolution: 2.9.10.4</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-35728</summary> ### Vulnerable Library - <b>jackson-databind-2.8.11.4.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.4/jackson-databind-2.8.11.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.11.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/momo-tong/jackson-databind-2.8.11.4/commit/a9eb87519b3586b69f14742edd8714282d5826d3">a9eb87519b3586b69f14742edd8714282d5826d3</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl). <p>Publish Date: 2020-12-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-35728>CVE-2020-35728</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35728">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35728</a></p> <p>Release Date: 2020-12-27</p> <p>Fix Resolution: 2.8.11.6</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
non_usab
jackson databind jar vulnerabilities highest severity is vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in jackson databind version remediation available critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct critical jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct high jackson databind jar direct details partial details vulnerabilities are displayed below due to a content size limitation in github to view information on the remaining vulnerabilities navigate to the mend application cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to com zaxxer hikari hikariconfig publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the apache extra version x jar in the classpath and an attacker can provide a jndi service to access it is possible to make the service execute a malicious payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to com zaxxer hikari hikaridatasource this is a different vulnerability than cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to net sf ehcache hibernate ehcachejtatransactionmanagerlookup publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind through lacks certain xbean reflect jndi blocking as demonstrated by org apache xbean propertyeditor jndiconverter publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the commons dbcp jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of org apache commons dbcp datasources sharedpooldatasource and org apache commons dbcp datasources peruserpooldatasource mishandling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of com engine spy mishandling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a series of deserialization vulnerabilities have been discovered in codehaus x implemented in eap this cve fixes cve cve cve cve cve cve cve reported for fasterxml jackson databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was discovered in fasterxml jackson databind in all versions before and where it would permit polymorphic deserialization of malicious objects using the xalan jndi gadget when used in conjunction with polymorphic type handling methods such as enabledefaulttyping or when jsontypeinfo is using id class or id minimal class or in any other way which objectmapper readvalue might instantiate objects from unsafe sources an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was discovered in jackson databind in versions before and where it would permit polymorphic deserialization of a malicious object using commons configuration and jndi classes an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache hadoop shaded com zaxxer hikari hikariconfig aka shaded hikari config publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com ibatis sqlmap engine transaction jta jtatransactionconfig aka ibatis sqlmap publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to br com anteros dbcp anterosdbcpconfig aka anteros core publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before lacks certain net sf ehcache blocking publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org aoju bus proxy provider remoting rmiprovider aka bus proxy publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to javax swing jeditorpane publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache activemq aka activemq jms activemq core activemq pool and activemq pool jms publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache openjpa ee wasregistrymanagedruntime aka openjpa publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache commons proxy provider remoting rmiprovider aka apache commons proxy publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache aries transaction jms internal xapooledconnectionfactory aka aries transaction jms publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com caucho config types resourceref aka caucho quercus publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org springframework aop config methodlocatingfactorybean aka spring aop publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com oracle wls shaded org apache xalan lib sql jndiconnectionpool aka embedded xalan in org glassfish web javax servlet jsp jstl publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
418,782
28,127,301,230
IssuesEvent
2023-03-31 18:56:49
InstituteforDiseaseModeling/idmtools
https://api.github.com/repos/InstituteforDiseaseModeling/idmtools
closed
slurm commission take too much memory which can exceeds head node's max memory
High priority Core CLI Documentation SLURM Priority: high
<!-- START doctoc generated TOC please keep comment here to allow auto update --> <!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE --> **Table of Contents** - [Description](#description) - [What I Did](#what-i-did) - [Extras](#extras) <!-- END doctoc generated TOC please keep comment here to allow auto update --> ### Description Currently Annie from Northwestern U can not run serialized simulations (after burnin). It always "Killed" with 800 simulations. ### What I Did I can repro her error in QUEST. when simulations > 400(maybe less) with her script, program got "Killed" from console without even start initialization yet(not hit "Initializing objects for creation ..." message from batch_create_items function. the error message sometime print error code 137 ### Extras Quest login node only have 4G memory. using memory profiler you can tell experiment.run(wait_until_done=True) can exceed 4G with over 400 simulations. This is print out when you login to Quest: "You can use up to 4 cores and 4GB of memory on Quest's login nodes for all the commands and code you run there. We encourage you to submit jobs to Quest's compute nodes instead of running jobs on login nodes, as compute nodes provide access to significantly more resources. Please see https://services.northwestern.edu/TDClient/30/Portal/KB/ArticleDet?ID=1964. "
1.0
slurm commission take too much memory which can exceeds head node's max memory - <!-- START doctoc generated TOC please keep comment here to allow auto update --> <!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE --> **Table of Contents** - [Description](#description) - [What I Did](#what-i-did) - [Extras](#extras) <!-- END doctoc generated TOC please keep comment here to allow auto update --> ### Description Currently Annie from Northwestern U can not run serialized simulations (after burnin). It always "Killed" with 800 simulations. ### What I Did I can repro her error in QUEST. when simulations > 400(maybe less) with her script, program got "Killed" from console without even start initialization yet(not hit "Initializing objects for creation ..." message from batch_create_items function. the error message sometime print error code 137 ### Extras Quest login node only have 4G memory. using memory profiler you can tell experiment.run(wait_until_done=True) can exceed 4G with over 400 simulations. This is print out when you login to Quest: "You can use up to 4 cores and 4GB of memory on Quest's login nodes for all the commands and code you run there. We encourage you to submit jobs to Quest's compute nodes instead of running jobs on login nodes, as compute nodes provide access to significantly more resources. Please see https://services.northwestern.edu/TDClient/30/Portal/KB/ArticleDet?ID=1964. "
non_usab
slurm commission take too much memory which can exceeds head node s max memory table of contents description what i did extras description currently annie from northwestern u can not run serialized simulations after burnin it always killed with simulations what i did i can repro her error in quest when simulations maybe less with her script program got killed from console without even start initialization yet not hit initializing objects for creation message from batch create items function the error message sometime print error code extras quest login node only have memory using memory profiler you can tell experiment run wait until done true can exceed with over simulations this is print out when you login to quest you can use up to cores and of memory on quest s login nodes for all the commands and code you run there we encourage you to submit jobs to quest s compute nodes instead of running jobs on login nodes as compute nodes provide access to significantly more resources please see  
0
1,840
3,488,487,129
IssuesEvent
2016-01-03 00:44:23
ZahlGraf/mySafeCore
https://api.github.com/repos/ZahlGraf/mySafeCore
closed
[mySafeDB] Add compatibility tests for different systems
security feature
Test: Store Database with Passwords => must be byte equal to a given array Test: Load a given byte array => must be readable and contain a given Password
True
[mySafeDB] Add compatibility tests for different systems - Test: Store Database with Passwords => must be byte equal to a given array Test: Load a given byte array => must be readable and contain a given Password
non_usab
add compatibility tests for different systems test store database with passwords must be byte equal to a given array test load a given byte array must be readable and contain a given password
0
392,593
26,949,767,320
IssuesEvent
2023-02-08 10:47:01
oras-project/oras-go
https://api.github.com/repos/oras-project/oras-go
closed
Example not working
documentation
Example provided in the doc https://oras.land/client_libraries/go/ is not working ``` package main import ( "context" "fmt" "github.com/containerd/containerd/remotes/docker" ocispec "github.com/opencontainers/image-spec/specs-go/v1" "oras.land/oras-go/pkg/content" "oras.land/oras-go/pkg/oras" ) func check(e error) { if e != nil { panic(e) } } func main() { ref := "localhost:5000/oras:test" fileName := "hello.txt" fileContent := []byte("Hello World!\n") customMediaType := "my.custom.media.type" ctx := context.Background() resolver := docker.NewResolver(docker.ResolverOptions{}) // Push file(s) w custom mediatype to registry memoryStore := content.NewMemoryStore() desc := memoryStore.Add(fileName, customMediaType, fileContent) pushContents := []ocispec.Descriptor{desc} fmt.Printf("Pushing %s to %s...\n", fileName, ref) desc, err := oras.Push(ctx, resolver, ref, memoryStore, pushContents) check(err) fmt.Printf("Pushed to %s with digest %s\n", ref, desc.Digest) // Pull file(s) from registry and save to disk fmt.Printf("Pulling from %s and saving to %s...\n", ref, fileName) fileStore := content.NewFileStore("") defer fileStore.Close() allowedMediaTypes := []string{customMediaType} desc, _, err = oras.Pull(ctx, resolver, ref, fileStore, oras.WithAllowedMediaTypes(allowedMediaTypes)) check(err) fmt.Printf("Pulled from %s with digest %s\n", ref, desc.Digest) fmt.Printf("Try running 'cat %s'\n", fileName) } ``` output : ``` ./oras-push.go:30:28: undefined: content.NewMemoryStore ./oras-push.go:34:23: undefined: oras.Push ./oras-push.go:40:26: undefined: content.NewFileStore ./oras-push.go:43:25: undefined: oras.Pull ``` do we have any working example or I'm doing something wrong?
1.0
Example not working - Example provided in the doc https://oras.land/client_libraries/go/ is not working ``` package main import ( "context" "fmt" "github.com/containerd/containerd/remotes/docker" ocispec "github.com/opencontainers/image-spec/specs-go/v1" "oras.land/oras-go/pkg/content" "oras.land/oras-go/pkg/oras" ) func check(e error) { if e != nil { panic(e) } } func main() { ref := "localhost:5000/oras:test" fileName := "hello.txt" fileContent := []byte("Hello World!\n") customMediaType := "my.custom.media.type" ctx := context.Background() resolver := docker.NewResolver(docker.ResolverOptions{}) // Push file(s) w custom mediatype to registry memoryStore := content.NewMemoryStore() desc := memoryStore.Add(fileName, customMediaType, fileContent) pushContents := []ocispec.Descriptor{desc} fmt.Printf("Pushing %s to %s...\n", fileName, ref) desc, err := oras.Push(ctx, resolver, ref, memoryStore, pushContents) check(err) fmt.Printf("Pushed to %s with digest %s\n", ref, desc.Digest) // Pull file(s) from registry and save to disk fmt.Printf("Pulling from %s and saving to %s...\n", ref, fileName) fileStore := content.NewFileStore("") defer fileStore.Close() allowedMediaTypes := []string{customMediaType} desc, _, err = oras.Pull(ctx, resolver, ref, fileStore, oras.WithAllowedMediaTypes(allowedMediaTypes)) check(err) fmt.Printf("Pulled from %s with digest %s\n", ref, desc.Digest) fmt.Printf("Try running 'cat %s'\n", fileName) } ``` output : ``` ./oras-push.go:30:28: undefined: content.NewMemoryStore ./oras-push.go:34:23: undefined: oras.Push ./oras-push.go:40:26: undefined: content.NewFileStore ./oras-push.go:43:25: undefined: oras.Pull ``` do we have any working example or I'm doing something wrong?
non_usab
example not working example provided in the doc is not working package main import context fmt github com containerd containerd remotes docker ocispec github com opencontainers image spec specs go oras land oras go pkg content oras land oras go pkg oras func check e error if e nil panic e func main ref localhost oras test filename hello txt filecontent byte hello world n custommediatype my custom media type ctx context background resolver docker newresolver docker resolveroptions push file s w custom mediatype to registry memorystore content newmemorystore desc memorystore add filename custommediatype filecontent pushcontents ocispec descriptor desc fmt printf pushing s to s n filename ref desc err oras push ctx resolver ref memorystore pushcontents check err fmt printf pushed to s with digest s n ref desc digest pull file s from registry and save to disk fmt printf pulling from s and saving to s n ref filename filestore content newfilestore defer filestore close allowedmediatypes string custommediatype desc err oras pull ctx resolver ref filestore oras withallowedmediatypes allowedmediatypes check err fmt printf pulled from s with digest s n ref desc digest fmt printf try running cat s n filename output oras push go undefined content newmemorystore oras push go undefined oras push oras push go undefined content newfilestore oras push go undefined oras pull do we have any working example or i m doing something wrong
0
29,895
2,718,336,704
IssuesEvent
2015-04-12 06:33:27
codenameone/CodenameOne
https://api.github.com/repos/codenameone/CodenameOne
closed
Add A Build Release Option That will build all targets
Priority-Medium Type-Enhancement wontfix
Original [issue 38](https://code.google.com/p/codenameone/issues/detail?id=38) created by codenameone on 2012-02-18T14:00:40.000Z: For simplified release updates, ideally it should also increment the version number where appropriate.
1.0
Add A Build Release Option That will build all targets - Original [issue 38](https://code.google.com/p/codenameone/issues/detail?id=38) created by codenameone on 2012-02-18T14:00:40.000Z: For simplified release updates, ideally it should also increment the version number where appropriate.
non_usab
add a build release option that will build all targets original created by codenameone on for simplified release updates ideally it should also increment the version number where appropriate
0
18,663
13,150,585,218
IssuesEvent
2020-08-09 12:24:02
rugk/awesome-emoji-picker
https://api.github.com/repos/rugk/awesome-emoji-picker
closed
RTL: overlap in bottom panel/skin selector
UI/usability/UX bug i18n/l10n
## Bug description <!-- A short summary of the issue. You can also explain how it affected you or explain some background of the story. --> As reported by @shanirub in https://github.com/rugk/awesome-emoji-picker/pull/62#issue-329930736: > The small circle that represents the skin tone overlaps the text "Awesome Emoji" [in a RTL language]. ## Steps to reproduce <!-- Describe what steps you did/can do to reproduce the problem. Also mention if it is not always reproducible. If applicable, add screenshots to help explain your problem. --> 1. (Use a version with the Hebrew or another RTL language translation.) 2. Choose that language in the settings of Firefox. 3. Restart Firefox. 4. Open emoji picker. ### Actual behavior <!-- The behavior you experienced. --> ![awesome-emoji-picker-display-bug](https://user-images.githubusercontent.com/43911148/67129359-c32cef80-f1fe-11e9-9555-65ab60c7f57a.png) ![emoji](https://user-images.githubusercontent.com/11966684/67146613-28c7bd00-f28d-11e9-88db-434691a69ee0.png) ### Expected behavior <!-- A clear and concise description of what you expected to happen. --> * emoji should be at the right * skin selector should be on the left ## System <!-- Add some information about your system. You can omit values if you think they are really not necessary. --> Operating system and version: Fedora 30 Browser and version: Firefox 69 Add-on version: dev (master) ## Possible solution <!-- Add references to other issues/docs/websites here or look into the code to find the potential causes of the problem or how to fix it. Omit this, if you don't know what to write here. --> likely CSS Related issue: https://github.com/rugk/awesome-emoji-picker/issues/64
True
RTL: overlap in bottom panel/skin selector - ## Bug description <!-- A short summary of the issue. You can also explain how it affected you or explain some background of the story. --> As reported by @shanirub in https://github.com/rugk/awesome-emoji-picker/pull/62#issue-329930736: > The small circle that represents the skin tone overlaps the text "Awesome Emoji" [in a RTL language]. ## Steps to reproduce <!-- Describe what steps you did/can do to reproduce the problem. Also mention if it is not always reproducible. If applicable, add screenshots to help explain your problem. --> 1. (Use a version with the Hebrew or another RTL language translation.) 2. Choose that language in the settings of Firefox. 3. Restart Firefox. 4. Open emoji picker. ### Actual behavior <!-- The behavior you experienced. --> ![awesome-emoji-picker-display-bug](https://user-images.githubusercontent.com/43911148/67129359-c32cef80-f1fe-11e9-9555-65ab60c7f57a.png) ![emoji](https://user-images.githubusercontent.com/11966684/67146613-28c7bd00-f28d-11e9-88db-434691a69ee0.png) ### Expected behavior <!-- A clear and concise description of what you expected to happen. --> * emoji should be at the right * skin selector should be on the left ## System <!-- Add some information about your system. You can omit values if you think they are really not necessary. --> Operating system and version: Fedora 30 Browser and version: Firefox 69 Add-on version: dev (master) ## Possible solution <!-- Add references to other issues/docs/websites here or look into the code to find the potential causes of the problem or how to fix it. Omit this, if you don't know what to write here. --> likely CSS Related issue: https://github.com/rugk/awesome-emoji-picker/issues/64
usab
rtl overlap in bottom panel skin selector bug description as reported by shanirub in the small circle that represents the skin tone overlaps the text awesome emoji steps to reproduce use a version with the hebrew or another rtl language translation choose that language in the settings of firefox restart firefox open emoji picker actual behavior expected behavior emoji should be at the right skin selector should be on the left system operating system and version fedora browser and version firefox add on version dev master possible solution likely css related issue
1
775,033
27,216,001,045
IssuesEvent
2023-02-20 21:55:22
GoogleCloudPlatform/cloud-sql-python-connector
https://api.github.com/repos/GoogleCloudPlatform/cloud-sql-python-connector
closed
system.test_asyncpg_connection: test_connection_with_asyncpg failed
type: bug priority: p2 flakybot: issue
Note: #597 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky. ---- commit: 79d227784531f61cca70ebbaa8e9c75c438fd4f4 buildURL: https://github.com/GoogleCloudPlatform/cloud-sql-python-connector/actions/runs/4227214516 status: failed <details><summary>Test output</summary><br><pre>@pytest.fixture(name="conn") async def setup() -> AsyncGenerator: # initialize Cloud SQL Python Connector object connector = await create_async_connector() > conn: asyncpg.Connection = await connector.connect_async( os.environ["POSTGRES_CONNECTION_NAME"], "asyncpg", user=os.environ["POSTGRES_USER"], password=os.environ["POSTGRES_PASS"], db=os.environ["POSTGRES_DB"], ) tests/system/test_asyncpg_connection.py:31: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ google/cloud/sql/connector/connector.py:261: in connect_async return await asyncio.wait_for(get_connection(), timeout) ../../../hostedtoolcache/Python/3.8.16/x64/lib/python3.8/asyncio/tasks.py:494: in wait_for return fut.result() google/cloud/sql/connector/connector.py:237: in get_connection instance_data, ip_address = await instance.connect_info(ip_type) google/cloud/sql/connector/instance.py:445: in connect_info instance_data = await self._current google/cloud/sql/connector/instance.py:388: in _refresh_task refresh_data = await refresh_task google/cloud/sql/connector/instance.py:325: in _perform_refresh ephemeral_cert = await ephemeral_task google/cloud/sql/connector/refresh_utils.py:191: in _get_ephemeral resp = await client_session.post( .nox/system-3-8/lib/python3.8/site-packages/aiohttp/client.py:643: in _request resp.raise_for_status() _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = <ClientResponse(https://sqladmin.googleapis.com/sql/v1beta4/projects/cloud-sql-connector-testing/instances/postgres-pr...ype-Options': 'nosniff', 'Alt-Svc': 'h3=":443"; ma=2592000,h3-29=":443"; ma=2592000', 'Transfer-Encoding': 'chunked')> def raise_for_status(self) -> None: if not self.ok: # reason should always be not None for a started response assert self.reason is not None self.release() > raise ClientResponseError( self.request_info, self.history, status=self.status, message=self.reason, headers=self.headers, ) E aiohttp.client_exceptions.ClientResponseError: 429, message='Too Many Requests', url=URL('https://sqladmin.googleapis.com/sql/v1beta4/projects/cloud-sql-connector-testing/instances/postgres-proxy-testing:generateEphemeralCert') .nox/system-3-8/lib/python3.8/site-packages/aiohttp/client_reqrep.py:1005: ClientResponseError</pre></details>
1.0
system.test_asyncpg_connection: test_connection_with_asyncpg failed - Note: #597 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky. ---- commit: 79d227784531f61cca70ebbaa8e9c75c438fd4f4 buildURL: https://github.com/GoogleCloudPlatform/cloud-sql-python-connector/actions/runs/4227214516 status: failed <details><summary>Test output</summary><br><pre>@pytest.fixture(name="conn") async def setup() -> AsyncGenerator: # initialize Cloud SQL Python Connector object connector = await create_async_connector() > conn: asyncpg.Connection = await connector.connect_async( os.environ["POSTGRES_CONNECTION_NAME"], "asyncpg", user=os.environ["POSTGRES_USER"], password=os.environ["POSTGRES_PASS"], db=os.environ["POSTGRES_DB"], ) tests/system/test_asyncpg_connection.py:31: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ google/cloud/sql/connector/connector.py:261: in connect_async return await asyncio.wait_for(get_connection(), timeout) ../../../hostedtoolcache/Python/3.8.16/x64/lib/python3.8/asyncio/tasks.py:494: in wait_for return fut.result() google/cloud/sql/connector/connector.py:237: in get_connection instance_data, ip_address = await instance.connect_info(ip_type) google/cloud/sql/connector/instance.py:445: in connect_info instance_data = await self._current google/cloud/sql/connector/instance.py:388: in _refresh_task refresh_data = await refresh_task google/cloud/sql/connector/instance.py:325: in _perform_refresh ephemeral_cert = await ephemeral_task google/cloud/sql/connector/refresh_utils.py:191: in _get_ephemeral resp = await client_session.post( .nox/system-3-8/lib/python3.8/site-packages/aiohttp/client.py:643: in _request resp.raise_for_status() _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = <ClientResponse(https://sqladmin.googleapis.com/sql/v1beta4/projects/cloud-sql-connector-testing/instances/postgres-pr...ype-Options': 'nosniff', 'Alt-Svc': 'h3=":443"; ma=2592000,h3-29=":443"; ma=2592000', 'Transfer-Encoding': 'chunked')> def raise_for_status(self) -> None: if not self.ok: # reason should always be not None for a started response assert self.reason is not None self.release() > raise ClientResponseError( self.request_info, self.history, status=self.status, message=self.reason, headers=self.headers, ) E aiohttp.client_exceptions.ClientResponseError: 429, message='Too Many Requests', url=URL('https://sqladmin.googleapis.com/sql/v1beta4/projects/cloud-sql-connector-testing/instances/postgres-proxy-testing:generateEphemeralCert') .nox/system-3-8/lib/python3.8/site-packages/aiohttp/client_reqrep.py:1005: ClientResponseError</pre></details>
non_usab
system test asyncpg connection test connection with asyncpg failed note was also for this test but it was closed more than days ago so i didn t mark it flaky commit buildurl status failed test output pytest fixture name conn async def setup asyncgenerator initialize cloud sql python connector object connector await create async connector conn asyncpg connection await connector connect async os environ asyncpg user os environ password os environ db os environ tests system test asyncpg connection py google cloud sql connector connector py in connect async return await asyncio wait for get connection timeout hostedtoolcache python lib asyncio tasks py in wait for return fut result google cloud sql connector connector py in get connection instance data ip address await instance connect info ip type google cloud sql connector instance py in connect info instance data await self current google cloud sql connector instance py in refresh task refresh data await refresh task google cloud sql connector instance py in perform refresh ephemeral cert await ephemeral task google cloud sql connector refresh utils py in get ephemeral resp await client session post nox system lib site packages aiohttp client py in request resp raise for status self def raise for status self none if not self ok reason should always be not none for a started response assert self reason is not none self release raise clientresponseerror self request info self history status self status message self reason headers self headers e aiohttp client exceptions clientresponseerror message too many requests url url nox system lib site packages aiohttp client reqrep py clientresponseerror
0
206,613
16,047,797,448
IssuesEvent
2021-04-22 15:26:13
Valheim-Modding/Jotunn
https://api.github.com/repos/Valheim-Modding/Jotunn
reopened
Add transition documents for current JotunnLib/ValheimLib users
documentation
We should add a section to the documentation, with code examples, that explains how to transition existing mods from ValheimLib and JotunnLib to the new combined Jotunn lib. Requirements: - [ ] Transition guide for JotunnLib - [ ] Transition guide for ValheimLib
1.0
Add transition documents for current JotunnLib/ValheimLib users - We should add a section to the documentation, with code examples, that explains how to transition existing mods from ValheimLib and JotunnLib to the new combined Jotunn lib. Requirements: - [ ] Transition guide for JotunnLib - [ ] Transition guide for ValheimLib
non_usab
add transition documents for current jotunnlib valheimlib users we should add a section to the documentation with code examples that explains how to transition existing mods from valheimlib and jotunnlib to the new combined jotunn lib requirements transition guide for jotunnlib transition guide for valheimlib
0
789,555
27,795,321,572
IssuesEvent
2023-03-17 12:06:03
svthalia/concrexit
https://api.github.com/repos/svthalia/concrexit
opened
Move from Nix to docker only
priority: high request-for-comments server nix
None of use can work with Nix, and the current state of stuff doesn't really seem to allow us to even release a new version (i.e. we could probably manage to replace the docker image but not the nginx configs). We should change our server stuff such that anyone can understand and maintain it: docker compose on a simple linux instance. I'm not entirely sure about the details but I'm thinking: - Terraform config staying mostly the same but: not NixOS but just e.g. debian/ubuntu server. We can probably also switch to a t4g instance. - On that instance just install docker and run a docker compose thing. deploying = updating the docker compose file (and optionally a .env) to pull new images. CI can build and push (concrexit-web and concrexit-nginx) images, perhaps to githubs registry? So the steps to do so I think are: - [ ] Add a Dockerfile for nginx - [ ] Create a working docker compose file for production - [ ] Run cronjobs within the concrexit web container - [ ] Update terraform config - [ ] Figure out how exactly to install stuff on a fresh ec2 instance. Ideally this would be pretty much automatic. I guess we can make an install script - [ ] Add/update workflows to build and deploy - [ ] Document all of this so that anyone can use it
1.0
Move from Nix to docker only - None of use can work with Nix, and the current state of stuff doesn't really seem to allow us to even release a new version (i.e. we could probably manage to replace the docker image but not the nginx configs). We should change our server stuff such that anyone can understand and maintain it: docker compose on a simple linux instance. I'm not entirely sure about the details but I'm thinking: - Terraform config staying mostly the same but: not NixOS but just e.g. debian/ubuntu server. We can probably also switch to a t4g instance. - On that instance just install docker and run a docker compose thing. deploying = updating the docker compose file (and optionally a .env) to pull new images. CI can build and push (concrexit-web and concrexit-nginx) images, perhaps to githubs registry? So the steps to do so I think are: - [ ] Add a Dockerfile for nginx - [ ] Create a working docker compose file for production - [ ] Run cronjobs within the concrexit web container - [ ] Update terraform config - [ ] Figure out how exactly to install stuff on a fresh ec2 instance. Ideally this would be pretty much automatic. I guess we can make an install script - [ ] Add/update workflows to build and deploy - [ ] Document all of this so that anyone can use it
non_usab
move from nix to docker only none of use can work with nix and the current state of stuff doesn t really seem to allow us to even release a new version i e we could probably manage to replace the docker image but not the nginx configs we should change our server stuff such that anyone can understand and maintain it docker compose on a simple linux instance i m not entirely sure about the details but i m thinking terraform config staying mostly the same but not nixos but just e g debian ubuntu server we can probably also switch to a instance on that instance just install docker and run a docker compose thing deploying updating the docker compose file and optionally a env to pull new images ci can build and push concrexit web and concrexit nginx images perhaps to githubs registry so the steps to do so i think are add a dockerfile for nginx create a working docker compose file for production run cronjobs within the concrexit web container update terraform config figure out how exactly to install stuff on a fresh instance ideally this would be pretty much automatic i guess we can make an install script add update workflows to build and deploy document all of this so that anyone can use it
0
5,323
7,835,601,693
IssuesEvent
2018-06-17 08:36:52
hugomd/parrot.live
https://api.github.com/repos/hugomd/parrot.live
closed
ASCII escape characters do not work on Windows
compatibility windows
Despite some other posts saying Windows doesn't come with `curl` pre-installed or whatever, it works fine on my machine, and it's definitely not something I've added myself. For some reason though, my PC won't print it in colors (or with the `cls` or `clear` that makes it actually look animated by resetting the screen before each next parrot). Is a fix for this possible? More technical specs or details available as necessary... Sceenshot below: ![image](https://user-images.githubusercontent.com/31360103/38907586-5c304dc4-428a-11e8-8bfc-6ba5c13588c0.png)
True
ASCII escape characters do not work on Windows - Despite some other posts saying Windows doesn't come with `curl` pre-installed or whatever, it works fine on my machine, and it's definitely not something I've added myself. For some reason though, my PC won't print it in colors (or with the `cls` or `clear` that makes it actually look animated by resetting the screen before each next parrot). Is a fix for this possible? More technical specs or details available as necessary... Sceenshot below: ![image](https://user-images.githubusercontent.com/31360103/38907586-5c304dc4-428a-11e8-8bfc-6ba5c13588c0.png)
non_usab
ascii escape characters do not work on windows despite some other posts saying windows doesn t come with curl pre installed or whatever it works fine on my machine and it s definitely not something i ve added myself for some reason though my pc won t print it in colors or with the cls or clear that makes it actually look animated by resetting the screen before each next parrot is a fix for this possible more technical specs or details available as necessary sceenshot below
0
17,386
11,965,308,342
IssuesEvent
2020-04-05 22:51:10
openstreetmap/iD
https://api.github.com/repos/openstreetmap/iD
reopened
Use new preset browser for changing presets
iD v3 usability
The new toolbar preset browser can be used for adding features, but the old browser is still required for changing presets or setting a preset after drawing. This results in twice the number of UIs for a user to learn and twice the amount of development work to maintain them. We should completely replace the old browser with the new one. The new popover browser has a number of advantages: - Displays more results at once - Usable anywhere, not just in a sidebar - Can display mixed point, line, and area results Naturally, we would hide presets with incompatible geometry. Rough mockup: ![Screen Shot 2019-05-31 at 11 58 06 AM](https://user-images.githubusercontent.com/2046746/58718907-7e620280-839c-11e9-88fc-20606515fb76.png)
True
Use new preset browser for changing presets - The new toolbar preset browser can be used for adding features, but the old browser is still required for changing presets or setting a preset after drawing. This results in twice the number of UIs for a user to learn and twice the amount of development work to maintain them. We should completely replace the old browser with the new one. The new popover browser has a number of advantages: - Displays more results at once - Usable anywhere, not just in a sidebar - Can display mixed point, line, and area results Naturally, we would hide presets with incompatible geometry. Rough mockup: ![Screen Shot 2019-05-31 at 11 58 06 AM](https://user-images.githubusercontent.com/2046746/58718907-7e620280-839c-11e9-88fc-20606515fb76.png)
usab
use new preset browser for changing presets the new toolbar preset browser can be used for adding features but the old browser is still required for changing presets or setting a preset after drawing this results in twice the number of uis for a user to learn and twice the amount of development work to maintain them we should completely replace the old browser with the new one the new popover browser has a number of advantages displays more results at once usable anywhere not just in a sidebar can display mixed point line and area results naturally we would hide presets with incompatible geometry rough mockup
1
351,676
10,521,971,268
IssuesEvent
2019-09-30 07:37:41
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
login.live.com - desktop site instead of mobile site
browser-firefox engine-gecko priority-critical
<!-- @browser: Firefox 70.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:70.0) Gecko/20100101 Firefox/70.0 --> <!-- @reported_with: desktop-reporter --> **URL**: https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt= **Browser / Version**: Firefox 70.0 **Operating System**: Windows 10 **Tested Another Browser**: No **Problem type**: Desktop site instead of mobile site **Description**: Clicked sign into "Microsoft account" and the Auth just stayed blank. **Steps to Reproduce**: The only thing I was trying to do was login to my account. Pop-up blocker etc. are all turned off. [![Screenshot Description](https://webcompat.com/uploads/2019/9/c76e4897-4ed9-442e-9749-3ea305b53ff9-thumb.jpeg)](https://webcompat.com/uploads/2019/9/c76e4897-4ed9-442e-9749-3ea305b53ff9.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20190923154733</li><li>channel: beta</li><li>hasTouchScreen: false</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> <p>Console Messages:</p> <pre> [{'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://logincdn.msauth.net/16.000/Converged_v21033_WxEHoN1EKgnBBEbhm200rw2.css. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://logincdn.msauth.net/16.000/Converged_v21033_WxEHoN1EKgnBBEbhm200rw2.css. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://logincdn.msauth.net/16.000/ConvergedLoginPaginatedStrings.en_yAG-DxXSQ3MIzboTMRgb-w2.js. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'error', 'log': ['None of the sha384 hashes in the integrity attribute match the content of the subresource.'], 'uri': 'https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt=', 'pos': '0:0'}, {'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://logincdn.msauth.net/16.000/Converged_v21033_WxEHoN1EKgnBBEbhm200rw2.css. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://lgincdnvzeuno.azureedge.net/16.000/ConvergedLoginPaginatedStrings.en_yAG-DxXSQ3MIzboTMRgb-w2.js. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'error', 'log': ['None of the sha384 hashes in the integrity attribute match the content of the subresource.'], 'uri': 'https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt=', 'pos': '0:0'}, {'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://lgincdnmsftuswe2.azureedge.net/16.000/ConvergedLoginPaginatedStrings.en_yAG-DxXSQ3MIzboTMRgb-w2.js. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'error', 'log': ['None of the sha384 hashes in the integrity attribute match the content of the subresource.'], 'uri': 'https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt=', 'pos': '0:0'}, {'level': 'warn', 'log': ['onmozfullscreenchange is deprecated.'], 'uri': 'https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt=', 'pos': '0:0'}, {'level': 'warn', 'log': ['onmozfullscreenerror is deprecated.'], 'uri': 'https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt=', 'pos': '0:0'}] </pre> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
login.live.com - desktop site instead of mobile site - <!-- @browser: Firefox 70.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:70.0) Gecko/20100101 Firefox/70.0 --> <!-- @reported_with: desktop-reporter --> **URL**: https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt= **Browser / Version**: Firefox 70.0 **Operating System**: Windows 10 **Tested Another Browser**: No **Problem type**: Desktop site instead of mobile site **Description**: Clicked sign into "Microsoft account" and the Auth just stayed blank. **Steps to Reproduce**: The only thing I was trying to do was login to my account. Pop-up blocker etc. are all turned off. [![Screenshot Description](https://webcompat.com/uploads/2019/9/c76e4897-4ed9-442e-9749-3ea305b53ff9-thumb.jpeg)](https://webcompat.com/uploads/2019/9/c76e4897-4ed9-442e-9749-3ea305b53ff9.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20190923154733</li><li>channel: beta</li><li>hasTouchScreen: false</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> <p>Console Messages:</p> <pre> [{'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://logincdn.msauth.net/16.000/Converged_v21033_WxEHoN1EKgnBBEbhm200rw2.css. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://logincdn.msauth.net/16.000/Converged_v21033_WxEHoN1EKgnBBEbhm200rw2.css. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://logincdn.msauth.net/16.000/ConvergedLoginPaginatedStrings.en_yAG-DxXSQ3MIzboTMRgb-w2.js. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'error', 'log': ['None of the sha384 hashes in the integrity attribute match the content of the subresource.'], 'uri': 'https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt=', 'pos': '0:0'}, {'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://logincdn.msauth.net/16.000/Converged_v21033_WxEHoN1EKgnBBEbhm200rw2.css. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://lgincdnvzeuno.azureedge.net/16.000/ConvergedLoginPaginatedStrings.en_yAG-DxXSQ3MIzboTMRgb-w2.js. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'error', 'log': ['None of the sha384 hashes in the integrity attribute match the content of the subresource.'], 'uri': 'https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt=', 'pos': '0:0'}, {'level': 'warn', 'log': ['Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://lgincdnmsftuswe2.azureedge.net/16.000/ConvergedLoginPaginatedStrings.en_yAG-DxXSQ3MIzboTMRgb-w2.js. (Reason: CORS request did not succeed).'], 'uri': '', 'pos': '0:0'}, {'level': 'error', 'log': ['None of the sha384 hashes in the integrity attribute match the content of the subresource.'], 'uri': 'https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt=', 'pos': '0:0'}, {'level': 'warn', 'log': ['onmozfullscreenchange is deprecated.'], 'uri': 'https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt=', 'pos': '0:0'}, {'level': 'warn', 'log': ['onmozfullscreenerror is deprecated.'], 'uri': 'https://login.live.com/oauth20_authorize.srf?lw=1&fl=dob&cobrandid=90011&client_id=00000000401B4D20&response_type=token&response_mode=fragment&redirect_uri=https%3A%2F%2Fmixer.com%2Fapi%2Fv1%2Foauth%2Fmsa%2Fcheckv2&scope=Xboxlive.signin&prompt=', 'pos': '0:0'}] </pre> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
non_usab
login live com desktop site instead of mobile site url browser version firefox operating system windows tested another browser no problem type desktop site instead of mobile site description clicked sign into microsoft account and the auth just stayed blank steps to reproduce the only thing i was trying to do was login to my account pop up blocker etc are all turned off browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel beta hastouchscreen false mixed active content blocked false mixed passive content blocked false tracking content blocked false console messages uri pos level warn log uri pos level warn log uri pos level error log uri pos level warn log uri pos level warn log uri pos level error log uri pos level warn log uri pos level error log uri pos level warn log uri pos level warn log uri pos from with ❤️
0
20,184
15,103,311,869
IssuesEvent
2021-02-08 10:08:50
zaproxy/zaproxy
https://api.github.com/repos/zaproxy/zaproxy
closed
Can't send Manual Request with ZAP vD-2021-01-20
Component-UI OpSys-OSX Usability
I was trying to test to verify issue #6045 was fixed properly (and I think it has been). To do this I was trying to replay the request to the very first test case, which is: ```http POST https://localhost:8443/benchmark/pathtraver-00/BenchmarkTest00001 HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0 Pragma: no-cache Cache-Control: no-cache Content-Length: 0 Accept: text/html Cookie: BenchmarkTest00001=JohnDoe Host: localhost:8443 ``` And I noticed 2 problems: 1) In the Manual Request editor, with the above in the window, when I hit 'Request' nothing happens. And I see nothing in the console explaining why. 2) So I also tried changing the HTTP Method just to make sure something worked in that dialog. And after trying to change it to a few different HTTP methods, the dialog just died, with some kind of warning about 'is the request' valid or something. Once, I also got this stream of errors in the console, so this might be a clue as to what is the problem is: <details> <summary>Log of requests that failed to parse. (Click the triangle/control to expand.)</summary> ``` 1511262 [AWT-EventQueue-0] ERROR org.parosproxy.paros.network.HttpRequestHeader - Failed to parse: GET https HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0 Pragma: no-cache Cache-Control: no-cache Content-Length: 0 Accept: text/html Cookie: BenchmarkTest00001=JohnDoe Host: localhost:8443 org.apache.commons.httpclient.URIException: invalid port number at org.apache.commons.httpclient.URI.parseAuthority(URI.java:2269) ~[zap-D-2021-01-20.jar:?] at org.apache.commons.httpclient.URI.parseUriReference(URI.java:1999) ~[zap-D-2021-01-20.jar:?] at org.apache.commons.httpclient.URI.<init>(URI.java:181) ~[zap-D-2021-01-20.jar:?] at org.parosproxy.paros.network.HttpRequestHeader.parse(HttpRequestHeader.java:474) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:290) [zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:313) [zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpMessage.mutateHttpMethod(HttpMessage.java:1047) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanelRequest$1.actionPerformed(HttpPanelRequest.java:116) [zap-D-2021-01-20.jar:D-2021-01-20] at javax.swing.JComboBox.fireActionEvent(JComboBox.java:1264) [?:?] at javax.swing.JComboBox.setSelectedItem(JComboBox.java:589) [?:?] at javax.swing.JComboBox.setSelectedIndex(JComboBox.java:624) [?:?] at javax.swing.plaf.basic.BasicComboPopup$Handler.mouseReleased(BasicComboPopup.java:907) [?:?] at java.awt.AWTEventMulticaster.mouseReleased(AWTEventMulticaster.java:298) [?:?] at java.awt.Component.processMouseEvent(Component.java:6632) [?:?] at javax.swing.JComponent.processMouseEvent(JComponent.java:3342) [?:?] at com.apple.laf.AquaComboBoxPopup$1.processMouseEvent(AquaComboBoxPopup.java:178) [?:?] at java.awt.Component.processEvent(Component.java:6397) [?:?] at java.awt.Container.processEvent(Container.java:2263) [?:?] at java.awt.Component.dispatchEventImpl(Component.java:5008) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2321) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:4918) [?:?] at java.awt.LightweightDispatcher.processMouseEvent(Container.java:4547) [?:?] at java.awt.LightweightDispatcher.dispatchEvent(Container.java:4488) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2307) [?:?] at java.awt.Window.dispatchEventImpl(Window.java:2772) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.EventQueue.dispatchEventImpl(EventQueue.java:772) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:721) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:715) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:95) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:745) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:743) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.awt.EventQueue.dispatchEvent(EventQueue.java:742) [?:?] at java.awt.EventDispatchThread.pumpOneEventForFilters(EventDispatchThread.java:203) [?:?] at java.awt.EventDispatchThread.pumpEventsForFilter(EventDispatchThread.java:124) [?:?] at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:113) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:109) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:101) [?:?] at java.awt.EventDispatchThread.run(EventDispatchThread.java:90) [?:?] 1511281 [AWT-EventQueue-0] ERROR org.parosproxy.paros.network.HttpMessage - invalid port number org.parosproxy.paros.network.HttpMalformedHeaderException: invalid port number at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:303) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:313) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpMessage.mutateHttpMethod(HttpMessage.java:1047) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanelRequest$1.actionPerformed(HttpPanelRequest.java:116) [zap-D-2021-01-20.jar:D-2021-01-20] at javax.swing.JComboBox.fireActionEvent(JComboBox.java:1264) [?:?] at javax.swing.JComboBox.setSelectedItem(JComboBox.java:589) [?:?] at javax.swing.JComboBox.setSelectedIndex(JComboBox.java:624) [?:?] at javax.swing.plaf.basic.BasicComboPopup$Handler.mouseReleased(BasicComboPopup.java:907) [?:?] at java.awt.AWTEventMulticaster.mouseReleased(AWTEventMulticaster.java:298) [?:?] at java.awt.Component.processMouseEvent(Component.java:6632) [?:?] at javax.swing.JComponent.processMouseEvent(JComponent.java:3342) [?:?] at com.apple.laf.AquaComboBoxPopup$1.processMouseEvent(AquaComboBoxPopup.java:178) [?:?] at java.awt.Component.processEvent(Component.java:6397) [?:?] at java.awt.Container.processEvent(Container.java:2263) [?:?] at java.awt.Component.dispatchEventImpl(Component.java:5008) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2321) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:4918) [?:?] at java.awt.LightweightDispatcher.processMouseEvent(Container.java:4547) [?:?] at java.awt.LightweightDispatcher.dispatchEvent(Container.java:4488) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2307) [?:?] at java.awt.Window.dispatchEventImpl(Window.java:2772) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.EventQueue.dispatchEventImpl(EventQueue.java:772) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:721) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:715) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:95) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:745) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:743) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.awt.EventQueue.dispatchEvent(EventQueue.java:742) [?:?] at java.awt.EventDispatchThread.pumpOneEventForFilters(EventDispatchThread.java:203) [?:?] at java.awt.EventDispatchThread.pumpEventsForFilter(EventDispatchThread.java:124) [?:?] at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:113) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:109) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:101) [?:?] at java.awt.EventDispatchThread.run(EventDispatchThread.java:90) [?:?] 1513317 [AWT-EventQueue-0] ERROR org.parosproxy.paros.network.HttpRequestHeader - Failed to parse: GET https HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0 Pragma: no-cache Cache-Control: no-cache Content-Length: 0 Accept: text/html Cookie: BenchmarkTest00001=JohnDoe Host: localhost:8443 org.apache.commons.httpclient.URIException: invalid port number at org.apache.commons.httpclient.URI.parseAuthority(URI.java:2269) ~[zap-D-2021-01-20.jar:?] at org.apache.commons.httpclient.URI.parseUriReference(URI.java:1999) ~[zap-D-2021-01-20.jar:?] at org.apache.commons.httpclient.URI.<init>(URI.java:181) ~[zap-D-2021-01-20.jar:?] at org.parosproxy.paros.network.HttpRequestHeader.parse(HttpRequestHeader.java:474) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:290) [zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:313) [zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.<init>(HttpRequestHeader.java:185) [zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpMessage.setRequestHeader(HttpMessage.java:400) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.view.impl.models.http.request.RequestStringHttpPanelViewModel.setData(RequestStringHttpPanelViewModel.java:56) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.view.syntaxhighlight.HttpPanelSyntaxHighlightTextView.save(HttpPanelSyntaxHighlightTextView.java:185) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.component.HttpPanelComponentViewsManager.save(HttpPanelComponentViewsManager.java:300) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.component.all.request.RequestAllComponent.save(RequestAllComponent.java:162) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanel.saveData(HttpPanel.java:361) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanelRequest$1.actionPerformed(HttpPanelRequest.java:97) [zap-D-2021-01-20.jar:D-2021-01-20] at javax.swing.JComboBox.fireActionEvent(JComboBox.java:1264) [?:?] at javax.swing.JComboBox.setSelectedItem(JComboBox.java:589) [?:?] at javax.swing.JComboBox.setSelectedIndex(JComboBox.java:624) [?:?] at javax.swing.plaf.basic.BasicComboPopup$Handler.mouseReleased(BasicComboPopup.java:907) [?:?] at java.awt.AWTEventMulticaster.mouseReleased(AWTEventMulticaster.java:298) [?:?] at java.awt.Component.processMouseEvent(Component.java:6632) [?:?] at javax.swing.JComponent.processMouseEvent(JComponent.java:3342) [?:?] at com.apple.laf.AquaComboBoxPopup$1.processMouseEvent(AquaComboBoxPopup.java:178) [?:?] at java.awt.Component.processEvent(Component.java:6397) [?:?] at java.awt.Container.processEvent(Container.java:2263) [?:?] at java.awt.Component.dispatchEventImpl(Component.java:5008) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2321) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:4918) [?:?] at java.awt.LightweightDispatcher.processMouseEvent(Container.java:4547) [?:?] at java.awt.LightweightDispatcher.dispatchEvent(Container.java:4488) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2307) [?:?] at java.awt.Window.dispatchEventImpl(Window.java:2772) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.EventQueue.dispatchEventImpl(EventQueue.java:772) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:721) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:715) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:95) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:745) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:743) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.awt.EventQueue.dispatchEvent(EventQueue.java:742) [?:?] at java.awt.EventDispatchThread.pumpOneEventForFilters(EventDispatchThread.java:203) [?:?] at java.awt.EventDispatchThread.pumpEventsForFilter(EventDispatchThread.java:124) [?:?] at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:113) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:109) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:101) [?:?] at java.awt.EventDispatchThread.run(EventDispatchThread.java:90) [?:?] 1513318 [AWT-EventQueue-0] WARN org.zaproxy.zap.extension.httppanel.view.impl.models.http.request.RequestStringHttpPanelViewModel - Could not Save Header: GET https HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0 Pragma: no-cache Cache-Control: no-cache Content-Length: 0 Accept: text/html Cookie: BenchmarkTest00001=JohnDoe Host: localhost:8443 org.parosproxy.paros.network.HttpMalformedHeaderException: invalid port number at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:303) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:313) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.<init>(HttpRequestHeader.java:185) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpMessage.setRequestHeader(HttpMessage.java:400) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.view.impl.models.http.request.RequestStringHttpPanelViewModel.setData(RequestStringHttpPanelViewModel.java:56) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.view.syntaxhighlight.HttpPanelSyntaxHighlightTextView.save(HttpPanelSyntaxHighlightTextView.java:185) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.component.HttpPanelComponentViewsManager.save(HttpPanelComponentViewsManager.java:300) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.component.all.request.RequestAllComponent.save(RequestAllComponent.java:162) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanel.saveData(HttpPanel.java:361) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanelRequest$1.actionPerformed(HttpPanelRequest.java:97) [zap-D-2021-01-20.jar:D-2021-01-20] at javax.swing.JComboBox.fireActionEvent(JComboBox.java:1264) [?:?] at javax.swing.JComboBox.setSelectedItem(JComboBox.java:589) [?:?] at javax.swing.JComboBox.setSelectedIndex(JComboBox.java:624) [?:?] at javax.swing.plaf.basic.BasicComboPopup$Handler.mouseReleased(BasicComboPopup.java:907) [?:?] at java.awt.AWTEventMulticaster.mouseReleased(AWTEventMulticaster.java:298) [?:?] at java.awt.Component.processMouseEvent(Component.java:6632) [?:?] at javax.swing.JComponent.processMouseEvent(JComponent.java:3342) [?:?] at com.apple.laf.AquaComboBoxPopup$1.processMouseEvent(AquaComboBoxPopup.java:178) [?:?] at java.awt.Component.processEvent(Component.java:6397) [?:?] at java.awt.Container.processEvent(Container.java:2263) [?:?] at java.awt.Component.dispatchEventImpl(Component.java:5008) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2321) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:4918) [?:?] at java.awt.LightweightDispatcher.processMouseEvent(Container.java:4547) [?:?] at java.awt.LightweightDispatcher.dispatchEvent(Container.java:4488) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2307) [?:?] at java.awt.Window.dispatchEventImpl(Window.java:2772) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.EventQueue.dispatchEventImpl(EventQueue.java:772) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:721) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:715) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:95) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:745) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:743) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.awt.EventQueue.dispatchEvent(EventQueue.java:742) [?:?] at java.awt.EventDispatchThread.pumpOneEventForFilters(EventDispatchThread.java:203) [?:?] at java.awt.EventDispatchThread.pumpEventsForFilter(EventDispatchThread.java:124) [?:?] at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:113) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:109) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:101) [?:?] at java.awt.EventDispatchThread.run(EventDispatchThread.java:90) [?:?] ``` </details>
True
Can't send Manual Request with ZAP vD-2021-01-20 - I was trying to test to verify issue #6045 was fixed properly (and I think it has been). To do this I was trying to replay the request to the very first test case, which is: ```http POST https://localhost:8443/benchmark/pathtraver-00/BenchmarkTest00001 HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0 Pragma: no-cache Cache-Control: no-cache Content-Length: 0 Accept: text/html Cookie: BenchmarkTest00001=JohnDoe Host: localhost:8443 ``` And I noticed 2 problems: 1) In the Manual Request editor, with the above in the window, when I hit 'Request' nothing happens. And I see nothing in the console explaining why. 2) So I also tried changing the HTTP Method just to make sure something worked in that dialog. And after trying to change it to a few different HTTP methods, the dialog just died, with some kind of warning about 'is the request' valid or something. Once, I also got this stream of errors in the console, so this might be a clue as to what is the problem is: <details> <summary>Log of requests that failed to parse. (Click the triangle/control to expand.)</summary> ``` 1511262 [AWT-EventQueue-0] ERROR org.parosproxy.paros.network.HttpRequestHeader - Failed to parse: GET https HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0 Pragma: no-cache Cache-Control: no-cache Content-Length: 0 Accept: text/html Cookie: BenchmarkTest00001=JohnDoe Host: localhost:8443 org.apache.commons.httpclient.URIException: invalid port number at org.apache.commons.httpclient.URI.parseAuthority(URI.java:2269) ~[zap-D-2021-01-20.jar:?] at org.apache.commons.httpclient.URI.parseUriReference(URI.java:1999) ~[zap-D-2021-01-20.jar:?] at org.apache.commons.httpclient.URI.<init>(URI.java:181) ~[zap-D-2021-01-20.jar:?] at org.parosproxy.paros.network.HttpRequestHeader.parse(HttpRequestHeader.java:474) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:290) [zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:313) [zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpMessage.mutateHttpMethod(HttpMessage.java:1047) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanelRequest$1.actionPerformed(HttpPanelRequest.java:116) [zap-D-2021-01-20.jar:D-2021-01-20] at javax.swing.JComboBox.fireActionEvent(JComboBox.java:1264) [?:?] at javax.swing.JComboBox.setSelectedItem(JComboBox.java:589) [?:?] at javax.swing.JComboBox.setSelectedIndex(JComboBox.java:624) [?:?] at javax.swing.plaf.basic.BasicComboPopup$Handler.mouseReleased(BasicComboPopup.java:907) [?:?] at java.awt.AWTEventMulticaster.mouseReleased(AWTEventMulticaster.java:298) [?:?] at java.awt.Component.processMouseEvent(Component.java:6632) [?:?] at javax.swing.JComponent.processMouseEvent(JComponent.java:3342) [?:?] at com.apple.laf.AquaComboBoxPopup$1.processMouseEvent(AquaComboBoxPopup.java:178) [?:?] at java.awt.Component.processEvent(Component.java:6397) [?:?] at java.awt.Container.processEvent(Container.java:2263) [?:?] at java.awt.Component.dispatchEventImpl(Component.java:5008) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2321) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:4918) [?:?] at java.awt.LightweightDispatcher.processMouseEvent(Container.java:4547) [?:?] at java.awt.LightweightDispatcher.dispatchEvent(Container.java:4488) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2307) [?:?] at java.awt.Window.dispatchEventImpl(Window.java:2772) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.EventQueue.dispatchEventImpl(EventQueue.java:772) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:721) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:715) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:95) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:745) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:743) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.awt.EventQueue.dispatchEvent(EventQueue.java:742) [?:?] at java.awt.EventDispatchThread.pumpOneEventForFilters(EventDispatchThread.java:203) [?:?] at java.awt.EventDispatchThread.pumpEventsForFilter(EventDispatchThread.java:124) [?:?] at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:113) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:109) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:101) [?:?] at java.awt.EventDispatchThread.run(EventDispatchThread.java:90) [?:?] 1511281 [AWT-EventQueue-0] ERROR org.parosproxy.paros.network.HttpMessage - invalid port number org.parosproxy.paros.network.HttpMalformedHeaderException: invalid port number at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:303) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:313) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpMessage.mutateHttpMethod(HttpMessage.java:1047) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanelRequest$1.actionPerformed(HttpPanelRequest.java:116) [zap-D-2021-01-20.jar:D-2021-01-20] at javax.swing.JComboBox.fireActionEvent(JComboBox.java:1264) [?:?] at javax.swing.JComboBox.setSelectedItem(JComboBox.java:589) [?:?] at javax.swing.JComboBox.setSelectedIndex(JComboBox.java:624) [?:?] at javax.swing.plaf.basic.BasicComboPopup$Handler.mouseReleased(BasicComboPopup.java:907) [?:?] at java.awt.AWTEventMulticaster.mouseReleased(AWTEventMulticaster.java:298) [?:?] at java.awt.Component.processMouseEvent(Component.java:6632) [?:?] at javax.swing.JComponent.processMouseEvent(JComponent.java:3342) [?:?] at com.apple.laf.AquaComboBoxPopup$1.processMouseEvent(AquaComboBoxPopup.java:178) [?:?] at java.awt.Component.processEvent(Component.java:6397) [?:?] at java.awt.Container.processEvent(Container.java:2263) [?:?] at java.awt.Component.dispatchEventImpl(Component.java:5008) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2321) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:4918) [?:?] at java.awt.LightweightDispatcher.processMouseEvent(Container.java:4547) [?:?] at java.awt.LightweightDispatcher.dispatchEvent(Container.java:4488) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2307) [?:?] at java.awt.Window.dispatchEventImpl(Window.java:2772) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.EventQueue.dispatchEventImpl(EventQueue.java:772) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:721) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:715) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:95) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:745) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:743) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.awt.EventQueue.dispatchEvent(EventQueue.java:742) [?:?] at java.awt.EventDispatchThread.pumpOneEventForFilters(EventDispatchThread.java:203) [?:?] at java.awt.EventDispatchThread.pumpEventsForFilter(EventDispatchThread.java:124) [?:?] at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:113) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:109) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:101) [?:?] at java.awt.EventDispatchThread.run(EventDispatchThread.java:90) [?:?] 1513317 [AWT-EventQueue-0] ERROR org.parosproxy.paros.network.HttpRequestHeader - Failed to parse: GET https HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0 Pragma: no-cache Cache-Control: no-cache Content-Length: 0 Accept: text/html Cookie: BenchmarkTest00001=JohnDoe Host: localhost:8443 org.apache.commons.httpclient.URIException: invalid port number at org.apache.commons.httpclient.URI.parseAuthority(URI.java:2269) ~[zap-D-2021-01-20.jar:?] at org.apache.commons.httpclient.URI.parseUriReference(URI.java:1999) ~[zap-D-2021-01-20.jar:?] at org.apache.commons.httpclient.URI.<init>(URI.java:181) ~[zap-D-2021-01-20.jar:?] at org.parosproxy.paros.network.HttpRequestHeader.parse(HttpRequestHeader.java:474) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:290) [zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:313) [zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.<init>(HttpRequestHeader.java:185) [zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpMessage.setRequestHeader(HttpMessage.java:400) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.view.impl.models.http.request.RequestStringHttpPanelViewModel.setData(RequestStringHttpPanelViewModel.java:56) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.view.syntaxhighlight.HttpPanelSyntaxHighlightTextView.save(HttpPanelSyntaxHighlightTextView.java:185) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.component.HttpPanelComponentViewsManager.save(HttpPanelComponentViewsManager.java:300) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.component.all.request.RequestAllComponent.save(RequestAllComponent.java:162) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanel.saveData(HttpPanel.java:361) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanelRequest$1.actionPerformed(HttpPanelRequest.java:97) [zap-D-2021-01-20.jar:D-2021-01-20] at javax.swing.JComboBox.fireActionEvent(JComboBox.java:1264) [?:?] at javax.swing.JComboBox.setSelectedItem(JComboBox.java:589) [?:?] at javax.swing.JComboBox.setSelectedIndex(JComboBox.java:624) [?:?] at javax.swing.plaf.basic.BasicComboPopup$Handler.mouseReleased(BasicComboPopup.java:907) [?:?] at java.awt.AWTEventMulticaster.mouseReleased(AWTEventMulticaster.java:298) [?:?] at java.awt.Component.processMouseEvent(Component.java:6632) [?:?] at javax.swing.JComponent.processMouseEvent(JComponent.java:3342) [?:?] at com.apple.laf.AquaComboBoxPopup$1.processMouseEvent(AquaComboBoxPopup.java:178) [?:?] at java.awt.Component.processEvent(Component.java:6397) [?:?] at java.awt.Container.processEvent(Container.java:2263) [?:?] at java.awt.Component.dispatchEventImpl(Component.java:5008) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2321) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:4918) [?:?] at java.awt.LightweightDispatcher.processMouseEvent(Container.java:4547) [?:?] at java.awt.LightweightDispatcher.dispatchEvent(Container.java:4488) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2307) [?:?] at java.awt.Window.dispatchEventImpl(Window.java:2772) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.EventQueue.dispatchEventImpl(EventQueue.java:772) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:721) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:715) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:95) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:745) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:743) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.awt.EventQueue.dispatchEvent(EventQueue.java:742) [?:?] at java.awt.EventDispatchThread.pumpOneEventForFilters(EventDispatchThread.java:203) [?:?] at java.awt.EventDispatchThread.pumpEventsForFilter(EventDispatchThread.java:124) [?:?] at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:113) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:109) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:101) [?:?] at java.awt.EventDispatchThread.run(EventDispatchThread.java:90) [?:?] 1513318 [AWT-EventQueue-0] WARN org.zaproxy.zap.extension.httppanel.view.impl.models.http.request.RequestStringHttpPanelViewModel - Could not Save Header: GET https HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0 Pragma: no-cache Cache-Control: no-cache Content-Length: 0 Accept: text/html Cookie: BenchmarkTest00001=JohnDoe Host: localhost:8443 org.parosproxy.paros.network.HttpMalformedHeaderException: invalid port number at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:303) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.setMessage(HttpRequestHeader.java:313) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpRequestHeader.<init>(HttpRequestHeader.java:185) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.parosproxy.paros.network.HttpMessage.setRequestHeader(HttpMessage.java:400) ~[zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.view.impl.models.http.request.RequestStringHttpPanelViewModel.setData(RequestStringHttpPanelViewModel.java:56) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.view.syntaxhighlight.HttpPanelSyntaxHighlightTextView.save(HttpPanelSyntaxHighlightTextView.java:185) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.component.HttpPanelComponentViewsManager.save(HttpPanelComponentViewsManager.java:300) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.component.all.request.RequestAllComponent.save(RequestAllComponent.java:162) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanel.saveData(HttpPanel.java:361) [zap-D-2021-01-20.jar:D-2021-01-20] at org.zaproxy.zap.extension.httppanel.HttpPanelRequest$1.actionPerformed(HttpPanelRequest.java:97) [zap-D-2021-01-20.jar:D-2021-01-20] at javax.swing.JComboBox.fireActionEvent(JComboBox.java:1264) [?:?] at javax.swing.JComboBox.setSelectedItem(JComboBox.java:589) [?:?] at javax.swing.JComboBox.setSelectedIndex(JComboBox.java:624) [?:?] at javax.swing.plaf.basic.BasicComboPopup$Handler.mouseReleased(BasicComboPopup.java:907) [?:?] at java.awt.AWTEventMulticaster.mouseReleased(AWTEventMulticaster.java:298) [?:?] at java.awt.Component.processMouseEvent(Component.java:6632) [?:?] at javax.swing.JComponent.processMouseEvent(JComponent.java:3342) [?:?] at com.apple.laf.AquaComboBoxPopup$1.processMouseEvent(AquaComboBoxPopup.java:178) [?:?] at java.awt.Component.processEvent(Component.java:6397) [?:?] at java.awt.Container.processEvent(Container.java:2263) [?:?] at java.awt.Component.dispatchEventImpl(Component.java:5008) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2321) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:4918) [?:?] at java.awt.LightweightDispatcher.processMouseEvent(Container.java:4547) [?:?] at java.awt.LightweightDispatcher.dispatchEvent(Container.java:4488) [?:?] at java.awt.Container.dispatchEventImpl(Container.java:2307) [?:?] at java.awt.Window.dispatchEventImpl(Window.java:2772) [?:?] at java.awt.Component.dispatchEvent(Component.java:4840) [?:?] at java.awt.EventQueue.dispatchEventImpl(EventQueue.java:772) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:721) [?:?] at java.awt.EventQueue$4.run(EventQueue.java:715) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:95) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:745) [?:?] at java.awt.EventQueue$5.run(EventQueue.java:743) [?:?] at java.security.AccessController.doPrivileged(Native Method) ~[?:?] at java.security.ProtectionDomain$JavaSecurityAccessImpl.doIntersectionPrivilege(ProtectionDomain.java:85) [?:?] at java.awt.EventQueue.dispatchEvent(EventQueue.java:742) [?:?] at java.awt.EventDispatchThread.pumpOneEventForFilters(EventDispatchThread.java:203) [?:?] at java.awt.EventDispatchThread.pumpEventsForFilter(EventDispatchThread.java:124) [?:?] at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:113) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:109) [?:?] at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:101) [?:?] at java.awt.EventDispatchThread.run(EventDispatchThread.java:90) [?:?] ``` </details>
usab
can t send manual request with zap vd i was trying to test to verify issue was fixed properly and i think it has been to do this i was trying to replay the request to the very first test case which is http post http user agent mozilla windows nt rv gecko firefox pragma no cache cache control no cache content length accept text html cookie johndoe host localhost and i noticed problems in the manual request editor with the above in the window when i hit request nothing happens and i see nothing in the console explaining why so i also tried changing the http method just to make sure something worked in that dialog and after trying to change it to a few different http methods the dialog just died with some kind of warning about is the request valid or something once i also got this stream of errors in the console so this might be a clue as to what is the problem is log of requests that failed to parse click the triangle control to expand error org parosproxy paros network httprequestheader failed to parse get https http user agent mozilla windows nt rv gecko firefox pragma no cache cache control no cache content length accept text html cookie johndoe host localhost org apache commons httpclient uriexception invalid port number at org apache commons httpclient uri parseauthority uri java at org apache commons httpclient uri parseurireference uri java at org apache commons httpclient uri uri java at org parosproxy paros network httprequestheader parse httprequestheader java at org parosproxy paros network httprequestheader setmessage httprequestheader java at org parosproxy paros network httprequestheader setmessage httprequestheader java at org parosproxy paros network httpmessage mutatehttpmethod httpmessage java at org zaproxy zap extension httppanel httppanelrequest actionperformed httppanelrequest java at javax swing jcombobox fireactionevent jcombobox java at javax swing jcombobox setselecteditem jcombobox java at javax swing jcombobox setselectedindex jcombobox java at javax swing plaf basic basiccombopopup handler mousereleased basiccombopopup java at java awt awteventmulticaster mousereleased awteventmulticaster java at java awt component processmouseevent component java at javax swing jcomponent processmouseevent jcomponent java at com apple laf aquacomboboxpopup processmouseevent aquacomboboxpopup java at java awt component processevent component java at java awt container processevent container java at java awt component dispatcheventimpl component java at java awt container dispatcheventimpl container java at java awt component dispatchevent component java at java awt lightweightdispatcher retargetmouseevent container java at java awt lightweightdispatcher processmouseevent container java at java awt lightweightdispatcher dispatchevent container java at java awt container dispatcheventimpl container java at java awt window dispatcheventimpl window java at java awt component dispatchevent component java at java awt eventqueue dispatcheventimpl eventqueue java at java awt eventqueue run eventqueue java at java awt eventqueue run eventqueue java at java security accesscontroller doprivileged native method at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java awt eventqueue run eventqueue java at java awt eventqueue run eventqueue java at java security accesscontroller doprivileged native method at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java awt eventqueue dispatchevent eventqueue java at java awt eventdispatchthread pumponeeventforfilters eventdispatchthread java at java awt eventdispatchthread pumpeventsforfilter eventdispatchthread java at java awt eventdispatchthread pumpeventsforhierarchy eventdispatchthread java at java awt eventdispatchthread pumpevents eventdispatchthread java at java awt eventdispatchthread pumpevents eventdispatchthread java at java awt eventdispatchthread run eventdispatchthread java error org parosproxy paros network httpmessage invalid port number org parosproxy paros network httpmalformedheaderexception invalid port number at org parosproxy paros network httprequestheader setmessage httprequestheader java at org parosproxy paros network httprequestheader setmessage httprequestheader java at org parosproxy paros network httpmessage mutatehttpmethod httpmessage java at org zaproxy zap extension httppanel httppanelrequest actionperformed httppanelrequest java at javax swing jcombobox fireactionevent jcombobox java at javax swing jcombobox setselecteditem jcombobox java at javax swing jcombobox setselectedindex jcombobox java at javax swing plaf basic basiccombopopup handler mousereleased basiccombopopup java at java awt awteventmulticaster mousereleased awteventmulticaster java at java awt component processmouseevent component java at javax swing jcomponent processmouseevent jcomponent java at com apple laf aquacomboboxpopup processmouseevent aquacomboboxpopup java at java awt component processevent component java at java awt container processevent container java at java awt component dispatcheventimpl component java at java awt container dispatcheventimpl container java at java awt component dispatchevent component java at java awt lightweightdispatcher retargetmouseevent container java at java awt lightweightdispatcher processmouseevent container java at java awt lightweightdispatcher dispatchevent container java at java awt container dispatcheventimpl container java at java awt window dispatcheventimpl window java at java awt component dispatchevent component java at java awt eventqueue dispatcheventimpl eventqueue java at java awt eventqueue run eventqueue java at java awt eventqueue run eventqueue java at java security accesscontroller doprivileged native method at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java awt eventqueue run eventqueue java at java awt eventqueue run eventqueue java at java security accesscontroller doprivileged native method at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java awt eventqueue dispatchevent eventqueue java at java awt eventdispatchthread pumponeeventforfilters eventdispatchthread java at java awt eventdispatchthread pumpeventsforfilter eventdispatchthread java at java awt eventdispatchthread pumpeventsforhierarchy eventdispatchthread java at java awt eventdispatchthread pumpevents eventdispatchthread java at java awt eventdispatchthread pumpevents eventdispatchthread java at java awt eventdispatchthread run eventdispatchthread java error org parosproxy paros network httprequestheader failed to parse get https http user agent mozilla windows nt rv gecko firefox pragma no cache cache control no cache content length accept text html cookie johndoe host localhost org apache commons httpclient uriexception invalid port number at org apache commons httpclient uri parseauthority uri java at org apache commons httpclient uri parseurireference uri java at org apache commons httpclient uri uri java at org parosproxy paros network httprequestheader parse httprequestheader java at org parosproxy paros network httprequestheader setmessage httprequestheader java at org parosproxy paros network httprequestheader setmessage httprequestheader java at org parosproxy paros network httprequestheader httprequestheader java at org parosproxy paros network httpmessage setrequestheader httpmessage java at org zaproxy zap extension httppanel view impl models http request requeststringhttppanelviewmodel setdata requeststringhttppanelviewmodel java at org zaproxy zap extension httppanel view syntaxhighlight httppanelsyntaxhighlighttextview save httppanelsyntaxhighlighttextview java at org zaproxy zap extension httppanel component httppanelcomponentviewsmanager save httppanelcomponentviewsmanager java at org zaproxy zap extension httppanel component all request requestallcomponent save requestallcomponent java at org zaproxy zap extension httppanel httppanel savedata httppanel java at org zaproxy zap extension httppanel httppanelrequest actionperformed httppanelrequest java at javax swing jcombobox fireactionevent jcombobox java at javax swing jcombobox setselecteditem jcombobox java at javax swing jcombobox setselectedindex jcombobox java at javax swing plaf basic basiccombopopup handler mousereleased basiccombopopup java at java awt awteventmulticaster mousereleased awteventmulticaster java at java awt component processmouseevent component java at javax swing jcomponent processmouseevent jcomponent java at com apple laf aquacomboboxpopup processmouseevent aquacomboboxpopup java at java awt component processevent component java at java awt container processevent container java at java awt component dispatcheventimpl component java at java awt container dispatcheventimpl container java at java awt component dispatchevent component java at java awt lightweightdispatcher retargetmouseevent container java at java awt lightweightdispatcher processmouseevent container java at java awt lightweightdispatcher dispatchevent container java at java awt container dispatcheventimpl container java at java awt window dispatcheventimpl window java at java awt component dispatchevent component java at java awt eventqueue dispatcheventimpl eventqueue java at java awt eventqueue run eventqueue java at java awt eventqueue run eventqueue java at java security accesscontroller doprivileged native method at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java awt eventqueue run eventqueue java at java awt eventqueue run eventqueue java at java security accesscontroller doprivileged native method at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java awt eventqueue dispatchevent eventqueue java at java awt eventdispatchthread pumponeeventforfilters eventdispatchthread java at java awt eventdispatchthread pumpeventsforfilter eventdispatchthread java at java awt eventdispatchthread pumpeventsforhierarchy eventdispatchthread java at java awt eventdispatchthread pumpevents eventdispatchthread java at java awt eventdispatchthread pumpevents eventdispatchthread java at java awt eventdispatchthread run eventdispatchthread java warn org zaproxy zap extension httppanel view impl models http request requeststringhttppanelviewmodel could not save header get https http user agent mozilla windows nt rv gecko firefox pragma no cache cache control no cache content length accept text html cookie johndoe host localhost org parosproxy paros network httpmalformedheaderexception invalid port number at org parosproxy paros network httprequestheader setmessage httprequestheader java at org parosproxy paros network httprequestheader setmessage httprequestheader java at org parosproxy paros network httprequestheader httprequestheader java at org parosproxy paros network httpmessage setrequestheader httpmessage java at org zaproxy zap extension httppanel view impl models http request requeststringhttppanelviewmodel setdata requeststringhttppanelviewmodel java at org zaproxy zap extension httppanel view syntaxhighlight httppanelsyntaxhighlighttextview save httppanelsyntaxhighlighttextview java at org zaproxy zap extension httppanel component httppanelcomponentviewsmanager save httppanelcomponentviewsmanager java at org zaproxy zap extension httppanel component all request requestallcomponent save requestallcomponent java at org zaproxy zap extension httppanel httppanel savedata httppanel java at org zaproxy zap extension httppanel httppanelrequest actionperformed httppanelrequest java at javax swing jcombobox fireactionevent jcombobox java at javax swing jcombobox setselecteditem jcombobox java at javax swing jcombobox setselectedindex jcombobox java at javax swing plaf basic basiccombopopup handler mousereleased basiccombopopup java at java awt awteventmulticaster mousereleased awteventmulticaster java at java awt component processmouseevent component java at javax swing jcomponent processmouseevent jcomponent java at com apple laf aquacomboboxpopup processmouseevent aquacomboboxpopup java at java awt component processevent component java at java awt container processevent container java at java awt component dispatcheventimpl component java at java awt container dispatcheventimpl container java at java awt component dispatchevent component java at java awt lightweightdispatcher retargetmouseevent container java at java awt lightweightdispatcher processmouseevent container java at java awt lightweightdispatcher dispatchevent container java at java awt container dispatcheventimpl container java at java awt window dispatcheventimpl window java at java awt component dispatchevent component java at java awt eventqueue dispatcheventimpl eventqueue java at java awt eventqueue run eventqueue java at java awt eventqueue run eventqueue java at java security accesscontroller doprivileged native method at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java awt eventqueue run eventqueue java at java awt eventqueue run eventqueue java at java security accesscontroller doprivileged native method at java security protectiondomain javasecurityaccessimpl dointersectionprivilege protectiondomain java at java awt eventqueue dispatchevent eventqueue java at java awt eventdispatchthread pumponeeventforfilters eventdispatchthread java at java awt eventdispatchthread pumpeventsforfilter eventdispatchthread java at java awt eventdispatchthread pumpeventsforhierarchy eventdispatchthread java at java awt eventdispatchthread pumpevents eventdispatchthread java at java awt eventdispatchthread pumpevents eventdispatchthread java at java awt eventdispatchthread run eventdispatchthread java
1
155,087
19,765,664,862
IssuesEvent
2022-01-17 01:41:19
tuanducdesign/view-book
https://api.github.com/repos/tuanducdesign/view-book
closed
CVE-2021-23382 (Medium) detected in postcss-7.0.21.tgz, postcss-7.0.35.tgz - autoclosed
security vulnerability
## CVE-2021-23382 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>postcss-7.0.21.tgz</b>, <b>postcss-7.0.35.tgz</b></p></summary> <p> <details><summary><b>postcss-7.0.21.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.21.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.21.tgz</a></p> <p>Path to dependency file: /client/package.json</p> <p>Path to vulnerable library: /client/node_modules/resolve-url-loader/node_modules/postcss/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.3.tgz (Root Library) - resolve-url-loader-3.1.1.tgz - :x: **postcss-7.0.21.tgz** (Vulnerable Library) </details> <details><summary><b>postcss-7.0.35.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz</a></p> <p>Path to dependency file: /client/package.json</p> <p>Path to vulnerable library: /client/node_modules/postcss/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.3.tgz (Root Library) - postcss-safe-parser-4.0.1.tgz - :x: **postcss-7.0.35.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/tuanducdesign/view-book/commit/9ded07d0a086810334dca905dcd662e3ac24c7ba">9ded07d0a086810334dca905dcd662e3ac24c7ba</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*). <p>Publish Date: 2021-04-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23382>CVE-2021-23382</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382</a></p> <p>Release Date: 2021-04-26</p> <p>Fix Resolution: postcss - 8.2.13</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23382 (Medium) detected in postcss-7.0.21.tgz, postcss-7.0.35.tgz - autoclosed - ## CVE-2021-23382 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>postcss-7.0.21.tgz</b>, <b>postcss-7.0.35.tgz</b></p></summary> <p> <details><summary><b>postcss-7.0.21.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.21.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.21.tgz</a></p> <p>Path to dependency file: /client/package.json</p> <p>Path to vulnerable library: /client/node_modules/resolve-url-loader/node_modules/postcss/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.3.tgz (Root Library) - resolve-url-loader-3.1.1.tgz - :x: **postcss-7.0.21.tgz** (Vulnerable Library) </details> <details><summary><b>postcss-7.0.35.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz</a></p> <p>Path to dependency file: /client/package.json</p> <p>Path to vulnerable library: /client/node_modules/postcss/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.3.tgz (Root Library) - postcss-safe-parser-4.0.1.tgz - :x: **postcss-7.0.35.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/tuanducdesign/view-book/commit/9ded07d0a086810334dca905dcd662e3ac24c7ba">9ded07d0a086810334dca905dcd662e3ac24c7ba</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*). <p>Publish Date: 2021-04-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23382>CVE-2021-23382</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382</a></p> <p>Release Date: 2021-04-26</p> <p>Fix Resolution: postcss - 8.2.13</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve medium detected in postcss tgz postcss tgz autoclosed cve medium severity vulnerability vulnerable libraries postcss tgz postcss tgz postcss tgz tool for transforming styles with js plugins library home page a href path to dependency file client package json path to vulnerable library client node modules resolve url loader node modules postcss package json dependency hierarchy react scripts tgz root library resolve url loader tgz x postcss tgz vulnerable library postcss tgz tool for transforming styles with js plugins library home page a href path to dependency file client package json path to vulnerable library client node modules postcss package json dependency hierarchy react scripts tgz root library postcss safe parser tgz x postcss tgz vulnerable library found in head commit a href found in base branch master vulnerability details the package postcss before are vulnerable to regular expression denial of service redos via getannotationurl and loadannotation in lib previous map js the vulnerable regexes are caused mainly by the sub pattern s sourcemappingurl publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution postcss step up your open source security game with whitesource
0
24,170
12,037,046,623
IssuesEvent
2020-04-13 21:00:22
emergenzeHack/covid19gr_issues
https://api.github.com/repos/emergenzeHack/covid19gr_issues
opened
goods donation and services offering
Missing position form goods donation and services offering
<pre><yamldata> Beneficiaries: Παιδιά και γονείς Description: Το Εθνικό Θέατρο ψηφιοποίησε το αρχείο του, το οποίο περιλαμβάνει μία μεγάλη συλλογή από βιντεοσκοπημένες παραστάσεις όλων των σκηνών του. Μία καλή ευκαιρία να παρακολουθήσετε μαζί με τα παιδιά σας αγαπημένες, κλασικές θεατρικές παραστάσεις από το Παιδικό Στέκι του Εθνικού Θεάτρου. Institution: Εθνικό Θέατρο Legal: OK Link: http://www.nt-archive.gr/theaters.aspx?company=10 Location: 37.984775 23.725214 0 0 Title: Παιδικό στέκι του Εθνικού Θεάτρου </yamldata></pre>
1.0
goods donation and services offering - <pre><yamldata> Beneficiaries: Παιδιά και γονείς Description: Το Εθνικό Θέατρο ψηφιοποίησε το αρχείο του, το οποίο περιλαμβάνει μία μεγάλη συλλογή από βιντεοσκοπημένες παραστάσεις όλων των σκηνών του. Μία καλή ευκαιρία να παρακολουθήσετε μαζί με τα παιδιά σας αγαπημένες, κλασικές θεατρικές παραστάσεις από το Παιδικό Στέκι του Εθνικού Θεάτρου. Institution: Εθνικό Θέατρο Legal: OK Link: http://www.nt-archive.gr/theaters.aspx?company=10 Location: 37.984775 23.725214 0 0 Title: Παιδικό στέκι του Εθνικού Θεάτρου </yamldata></pre>
non_usab
goods donation and services offering beneficiaries παιδιά και γονείς description το εθνικό θέατρο ψηφιοποίησε το αρχείο του το οποίο περιλαμβάνει μία μεγάλη συλλογή από βιντεοσκοπημένες παραστάσεις όλων των σκηνών του μία καλή ευκαιρία να παρακολουθήσετε μαζί με τα παιδιά σας αγαπημένες κλασικές θεατρικές παραστάσεις από το παιδικό στέκι του εθνικού θεάτρου institution εθνικό θέατρο legal ok link location title παιδικό στέκι του εθνικού θεάτρου
0
25,353
25,038,563,980
IssuesEvent
2022-11-04 18:16:41
godotengine/godot
https://api.github.com/repos/godotengine/godot
opened
Nothing happens when trying to add characters to font prerendering if no configuration is created
enhancement usability topic:gui
### Godot version 4.0.beta (282e50ac8) ### System information Fedora 36, AMD Radeon RX 6900 XT ### Issue description In the advanced import settings for a font, you can enable prerendering. However, when you click **Shape Text and Add Glyphs** in the **Glyphs from the Text**, nothing happens unless you already created a configuration beforehand: ![image](https://user-images.githubusercontent.com/180032/200046759-4638f455-9605-4f42-a5bb-a5000b9a4c22.png) This also occurs when double-clicking one of the checkboxes on the right in the **Glyphs from the Character Map** tab: ![image](https://user-images.githubusercontent.com/180032/200046790-b5ac1641-d760-4cf0-b16d-f3bdf1c5067f.png) I suggest automatically creating a configuration when you click **Shape Text and Add Glyphs** in the **Glyphs from the Text** tab, or double-click one of the checkboxes on the right in the **Glyphs from the Character Map** tab. ### Steps to reproduce - Double-click a font file to access its advanced import settings. - Try to add glyphs from text or the character map without adding a configuration beforehand. - Notice how nothing occurs. ### Minimal reproduction project [test_using_fonts.zip](https://github.com/godotengine/godot/files/9941048/test_using_fonts.zip)
True
Nothing happens when trying to add characters to font prerendering if no configuration is created - ### Godot version 4.0.beta (282e50ac8) ### System information Fedora 36, AMD Radeon RX 6900 XT ### Issue description In the advanced import settings for a font, you can enable prerendering. However, when you click **Shape Text and Add Glyphs** in the **Glyphs from the Text**, nothing happens unless you already created a configuration beforehand: ![image](https://user-images.githubusercontent.com/180032/200046759-4638f455-9605-4f42-a5bb-a5000b9a4c22.png) This also occurs when double-clicking one of the checkboxes on the right in the **Glyphs from the Character Map** tab: ![image](https://user-images.githubusercontent.com/180032/200046790-b5ac1641-d760-4cf0-b16d-f3bdf1c5067f.png) I suggest automatically creating a configuration when you click **Shape Text and Add Glyphs** in the **Glyphs from the Text** tab, or double-click one of the checkboxes on the right in the **Glyphs from the Character Map** tab. ### Steps to reproduce - Double-click a font file to access its advanced import settings. - Try to add glyphs from text or the character map without adding a configuration beforehand. - Notice how nothing occurs. ### Minimal reproduction project [test_using_fonts.zip](https://github.com/godotengine/godot/files/9941048/test_using_fonts.zip)
usab
nothing happens when trying to add characters to font prerendering if no configuration is created godot version beta system information fedora amd radeon rx xt issue description in the advanced import settings for a font you can enable prerendering however when you click shape text and add glyphs in the glyphs from the text nothing happens unless you already created a configuration beforehand this also occurs when double clicking one of the checkboxes on the right in the glyphs from the character map tab i suggest automatically creating a configuration when you click shape text and add glyphs in the glyphs from the text tab or double click one of the checkboxes on the right in the glyphs from the character map tab steps to reproduce double click a font file to access its advanced import settings try to add glyphs from text or the character map without adding a configuration beforehand notice how nothing occurs minimal reproduction project
1
266,225
23,226,664,019
IssuesEvent
2022-08-03 01:24:16
MPMG-DCC-UFMG/F01
https://api.github.com/repos/MPMG-DCC-UFMG/F01
closed
Teste de generalizacao para a tag Servidores - Relatório mensal da despesa com pessoal - Divisa Alegre
generalization test development template-Síntese tecnologia informatica subtag-Relatórios Despesas com Pessoal tag-Servidores
DoD: Realizar o teste de Generalização do validador da tag Servidores - Relatório mensal da despesa com pessoal para o Município de Divisa Alegre.
1.0
Teste de generalizacao para a tag Servidores - Relatório mensal da despesa com pessoal - Divisa Alegre - DoD: Realizar o teste de Generalização do validador da tag Servidores - Relatório mensal da despesa com pessoal para o Município de Divisa Alegre.
non_usab
teste de generalizacao para a tag servidores relatório mensal da despesa com pessoal divisa alegre dod realizar o teste de generalização do validador da tag servidores relatório mensal da despesa com pessoal para o município de divisa alegre
0
19,008
13,536,101,761
IssuesEvent
2020-09-16 08:33:57
topcoder-platform/qa-fun
https://api.github.com/repos/topcoder-platform/qa-fun
closed
Incorrect selection of list & grid icons
UX/Usability
Steps:- 1. Enter the URL : topcoder.com 2. Click on More >> Resources . 3. Click on Press Releases . 4. Click on Grid & list icon Actual Result : When Grid icon is ON List page is displayed & when List is ON Grid page is displayed Expected Result : When Grid icon is clicked - Grid page should display viceversa ![image](https://user-images.githubusercontent.com/61318135/81498735-466d7a00-92e4-11ea-89f1-3c242147459a.png) ![image](https://user-images.githubusercontent.com/61318135/81498775-6ef57400-92e4-11ea-878e-511ac50eb9dc.png) Browser : Chrome ,Windows 10 - OS
True
Incorrect selection of list & grid icons - Steps:- 1. Enter the URL : topcoder.com 2. Click on More >> Resources . 3. Click on Press Releases . 4. Click on Grid & list icon Actual Result : When Grid icon is ON List page is displayed & when List is ON Grid page is displayed Expected Result : When Grid icon is clicked - Grid page should display viceversa ![image](https://user-images.githubusercontent.com/61318135/81498735-466d7a00-92e4-11ea-89f1-3c242147459a.png) ![image](https://user-images.githubusercontent.com/61318135/81498775-6ef57400-92e4-11ea-878e-511ac50eb9dc.png) Browser : Chrome ,Windows 10 - OS
usab
incorrect selection of list grid icons steps enter the url topcoder com click on more resources click on press releases click on grid list icon actual result when grid icon is on list page is displayed when list is on grid page is displayed expected result when grid icon is clicked grid page should display viceversa browser chrome windows os
1
27,299
28,058,335,304
IssuesEvent
2023-03-29 10:53:51
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
closed
Strange exception while INSERT INTO FUNCTION file(...) PARTITION BY ...
usability st-need-repro
**Describe the issue** ``` ip-172-31-22-38.eu-central-1.compute.internal :) INSERT INTO FUNCTION file('wikistat{_partition_id}.native.zst', Native, 'time DateTime, project LowCardinality(String), subproject LowCardinality(String), path String, hits UInt64') PARTITION BY toYYYYMM(time) SELECT * FROM wikistat INSERT INTO FUNCTION file('wikistat{_partition_id}.native.zst', Native, 'time DateTime, project LowCardinality(String), subproject LowCardinality(String), path String, hits UInt64') PARTITION BY toYYYYMM(time) SELECT * FROM wikistat Query id: aded985c-cb9d-4d8b-a613-14666bb95681 0 rows in set. Elapsed: 0.051 sec. Received exception from server (version 22.2.1): Code: 1001. DB::Exception: Received from localhost:9000. DB::Exception: std::__1::__fs::filesystem::filesystem_error: filesystem error: in create_directory: No such file or directory [""]. (STD_EXCEPTION) ```
True
Strange exception while INSERT INTO FUNCTION file(...) PARTITION BY ... - **Describe the issue** ``` ip-172-31-22-38.eu-central-1.compute.internal :) INSERT INTO FUNCTION file('wikistat{_partition_id}.native.zst', Native, 'time DateTime, project LowCardinality(String), subproject LowCardinality(String), path String, hits UInt64') PARTITION BY toYYYYMM(time) SELECT * FROM wikistat INSERT INTO FUNCTION file('wikistat{_partition_id}.native.zst', Native, 'time DateTime, project LowCardinality(String), subproject LowCardinality(String), path String, hits UInt64') PARTITION BY toYYYYMM(time) SELECT * FROM wikistat Query id: aded985c-cb9d-4d8b-a613-14666bb95681 0 rows in set. Elapsed: 0.051 sec. Received exception from server (version 22.2.1): Code: 1001. DB::Exception: Received from localhost:9000. DB::Exception: std::__1::__fs::filesystem::filesystem_error: filesystem error: in create_directory: No such file or directory [""]. (STD_EXCEPTION) ```
usab
strange exception while insert into function file partition by describe the issue ip eu central compute internal insert into function file wikistat partition id native zst native time datetime project lowcardinality string subproject lowcardinality string path string hits partition by toyyyymm time select from wikistat insert into function file wikistat partition id native zst native time datetime project lowcardinality string subproject lowcardinality string path string hits partition by toyyyymm time select from wikistat query id rows in set elapsed sec received exception from server version code db exception received from localhost db exception std fs filesystem filesystem error filesystem error in create directory no such file or directory std exception
1
3,995
3,644,417,833
IssuesEvent
2016-02-15 09:49:37
rabbitmq/rabbitmq-stomp
https://api.github.com/repos/rabbitmq/rabbitmq-stomp
closed
Support both persistent and durable headers for UNSUBSCRIBE frames
bug effort-tiny usability
See [this rabbitmq-users thread](https://groups.google.com/d/msg/rabbitmq-users/bLarEeYnfCg/59iziWjJBQAJ). When `durable` was introduced as an alias for `persistent`, we [didn't update UNSUBSCRIBE frame handler to support both](https://github.com/rabbitmq/rabbitmq-stomp/blob/master/src/rabbit_stomp_processor.erl#L456).
True
Support both persistent and durable headers for UNSUBSCRIBE frames - See [this rabbitmq-users thread](https://groups.google.com/d/msg/rabbitmq-users/bLarEeYnfCg/59iziWjJBQAJ). When `durable` was introduced as an alias for `persistent`, we [didn't update UNSUBSCRIBE frame handler to support both](https://github.com/rabbitmq/rabbitmq-stomp/blob/master/src/rabbit_stomp_processor.erl#L456).
usab
support both persistent and durable headers for unsubscribe frames see when durable was introduced as an alias for persistent we
1
2,658
3,102,849,400
IssuesEvent
2015-08-31 04:26:17
OctopusDeploy/Issues
https://api.github.com/repos/OctopusDeploy/Issues
closed
Detect unsaved changes when editing step templates
bug in progress usability
As one can spend quite a bit of time editing templates, detecting unsaved changes when navigating away is important. <!--- @huboard:{"milestone_order":320.5,"order":932} -->
True
Detect unsaved changes when editing step templates - As one can spend quite a bit of time editing templates, detecting unsaved changes when navigating away is important. <!--- @huboard:{"milestone_order":320.5,"order":932} -->
usab
detect unsaved changes when editing step templates as one can spend quite a bit of time editing templates detecting unsaved changes when navigating away is important huboard milestone order order
1
625,352
19,726,171,580
IssuesEvent
2022-01-13 20:11:54
MatthewSpofford/Multiscale-Statistical-Analysis
https://api.github.com/repos/MatthewSpofford/Multiscale-Statistical-Analysis
closed
Implement efficient management of datasets contained within a workbook
enhancement priority medium
User should be able to add, reorder, rename, and delete datasets that were added to the workbook as freely as they choose. Maybe add a "Dataset" section to the tree menu underneath each workbook.
1.0
Implement efficient management of datasets contained within a workbook - User should be able to add, reorder, rename, and delete datasets that were added to the workbook as freely as they choose. Maybe add a "Dataset" section to the tree menu underneath each workbook.
non_usab
implement efficient management of datasets contained within a workbook user should be able to add reorder rename and delete datasets that were added to the workbook as freely as they choose maybe add a dataset section to the tree menu underneath each workbook
0
27,311
28,086,205,172
IssuesEvent
2023-03-30 09:56:23
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
opened
Not host info for "Connection refused" error
usability
**Describe the issue** Not host info for "Connection refused" error **How to reproduce** (version 23.2.4.12 (official build)) **Expected behavior** Need add host-port info to understand to which server click couldn't connect **Error message and/or stacktrace** ``` 2023.03.30 09:49:33.702993 [ 67 ] {} <Error> default.`.inner_id.4fb0450c-fc77-46c3-ac69-fb3952a7b8bb` (82f85e94-5c09-48a2-90ae-3d3a7e9fc902): auto DB::StorageReplicatedMergeTree::processQueueEntry(ReplicatedMergeTreeQueue::SelectedEntryPtr)::(anonymous class)::operator()(DB::StorageReplicatedMergeTree::LogEntryPtr &) const: Poco::Exception. Code: 1000, e.code() = 111, Connection refused, Stack trace (when copying this message, always include the lines below): 0. Poco::Net::ConnectionRefusedException::ConnectionRefusedException(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, int) @ 0x1760bb69 in /usr/bin/clickhouse 1. Poco::Net::SocketImpl::error(int, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&) @ 0x176160b4 in /usr/bin/clickhouse 2. Poco::Net::SocketImpl::connect(Poco::Net::SocketAddress const&, Poco::Timespan const&) @ 0x17616e23 in /usr/bin/clickhouse 3. Poco::Net::HTTPSession::connect(Poco::Net::SocketAddress const&) @ 0x175fbc56 in /usr/bin/clickhouse 4. Poco::Net::HTTPClientSession::reconnect() @ 0x175ed961 in /usr/bin/clickhouse 5. Poco::Net::HTTPClientSession::sendRequest(Poco::Net::HTTPRequest&) @ 0x175ecb03 in /usr/bin/clickhouse 6. ? @ 0x1419f718 in /usr/bin/clickhouse 7. ? @ 0x1419d2c8 in /usr/bin/clickhouse 8. ? @ 0x1419bca3 in /usr/bin/clickhouse 9. ? @ 0x1418f200 in /usr/bin/clickhouse 10. DB::DataPartsExchange::Fetcher::fetchSelectedPart(std::__1::shared_ptr<DB::StorageInMemoryMetadata const> const&, std::__1::shared_ptr<DB::Context const>, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, int, DB::ConnectionTimeouts const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::shared_ptr<DB::Throttler>, bool, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::optional<DB::CurrentlySubmergingEmergingTagger>*, bool, std::__1::shared_ptr<DB::IDisk>) @ 0x141885dd in /usr/bin/clickhouse 11. ? @ 0x13f88430 in /usr/bin/clickhouse 12. DB::StorageReplicatedMergeTree::fetchPart(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::shared_ptr<DB::StorageInMemoryMetadata const> const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, bool, unsigned long, std::__1::shared_ptr<zkutil::ZooKeeper>, bool) @ 0x13ec11c3 in /usr/bin/clickhouse 13. DB::StorageReplicatedMergeTree::executeFetch(DB::ReplicatedMergeTreeLogEntry&, bool) @ 0x13eb25e9 in /usr/bin/clickhouse 14. DB::StorageReplicatedMergeTree::executeLogEntry(DB::ReplicatedMergeTreeLogEntry&) @ 0x13ea03b9 in /usr/bin/clickhouse 15. ? @ 0x13f85c7f in /usr/bin/clickhouse 16. DB::ReplicatedMergeTreeQueue::processEntry(std::__1::function<std::__1::shared_ptr<zkutil::ZooKeeper> ()>, std::__1::shared_ptr<DB::ReplicatedMergeTreeLogEntry>&, std::__1::function<bool (std::__1::shared_ptr<DB::ReplicatedMergeTreeLogEntry>&)>) @ 0x14519426 in /usr/bin/clickhouse 17. DB::StorageReplicatedMergeTree::processQueueEntry(std::__1::shared_ptr<DB::ReplicatedMergeTreeQueue::SelectedEntry>) @ 0x13ee31dc in /usr/bin/clickhouse 18. ? @ 0x13f869f1 in /usr/bin/clickhouse 19. DB::MergeTreeBackgroundExecutor<DB::RoundRobinRuntimeQueue>::routine(std::__1::shared_ptr<DB::TaskRuntimeData>) @ 0x8921aec in /usr/bin/clickhouse 20. DB::MergeTreeBackgroundExecutor<DB::RoundRobinRuntimeQueue>::threadFunction() @ 0x89217c0 in /usr/bin/clickhouse 21. ThreadPoolImpl<ThreadFromGlobalPoolImpl<false>>::worker(std::__1::__list_iterator<ThreadFromGlobalPoolImpl<false>, void*>) @ 0xe19acaa in /usr/bin/clickhouse 22. void std::__1::__function::__policy_invoker<void ()>::__call_impl<std::__1::__function::__default_alloc_func<ThreadFromGlobalPoolImpl<false>::ThreadFromGlobalPoolImpl<void ThreadPoolImpl<ThreadFromGlobalPoolImpl<false>>::scheduleImpl<void>(std::__1::function<void ()>, long, std::__1::optional<unsigned long>, bool)::'lambda0'()>(void&&)::'lambda'(), void ()>>(std::__1::__function::__policy_storage const*) @ 0xe19d577 in /usr/bin/clickhouse 23. ThreadPoolImpl<std::__1::thread>::worker(std::__1::__list_iterator<std::__1::thread, void*>) @ 0xe196e6a in /usr/bin/clickhouse 24. ? @ 0xe19c521 in /usr/bin/clickhouse 25. ? @ 0x7fc7f30ff609 in ? 26. __clone @ 0x7fc7f3024133 in ? (version 23.2.4.12 (official build)) ``` **Additional context**
True
Not host info for "Connection refused" error - **Describe the issue** Not host info for "Connection refused" error **How to reproduce** (version 23.2.4.12 (official build)) **Expected behavior** Need add host-port info to understand to which server click couldn't connect **Error message and/or stacktrace** ``` 2023.03.30 09:49:33.702993 [ 67 ] {} <Error> default.`.inner_id.4fb0450c-fc77-46c3-ac69-fb3952a7b8bb` (82f85e94-5c09-48a2-90ae-3d3a7e9fc902): auto DB::StorageReplicatedMergeTree::processQueueEntry(ReplicatedMergeTreeQueue::SelectedEntryPtr)::(anonymous class)::operator()(DB::StorageReplicatedMergeTree::LogEntryPtr &) const: Poco::Exception. Code: 1000, e.code() = 111, Connection refused, Stack trace (when copying this message, always include the lines below): 0. Poco::Net::ConnectionRefusedException::ConnectionRefusedException(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, int) @ 0x1760bb69 in /usr/bin/clickhouse 1. Poco::Net::SocketImpl::error(int, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&) @ 0x176160b4 in /usr/bin/clickhouse 2. Poco::Net::SocketImpl::connect(Poco::Net::SocketAddress const&, Poco::Timespan const&) @ 0x17616e23 in /usr/bin/clickhouse 3. Poco::Net::HTTPSession::connect(Poco::Net::SocketAddress const&) @ 0x175fbc56 in /usr/bin/clickhouse 4. Poco::Net::HTTPClientSession::reconnect() @ 0x175ed961 in /usr/bin/clickhouse 5. Poco::Net::HTTPClientSession::sendRequest(Poco::Net::HTTPRequest&) @ 0x175ecb03 in /usr/bin/clickhouse 6. ? @ 0x1419f718 in /usr/bin/clickhouse 7. ? @ 0x1419d2c8 in /usr/bin/clickhouse 8. ? @ 0x1419bca3 in /usr/bin/clickhouse 9. ? @ 0x1418f200 in /usr/bin/clickhouse 10. DB::DataPartsExchange::Fetcher::fetchSelectedPart(std::__1::shared_ptr<DB::StorageInMemoryMetadata const> const&, std::__1::shared_ptr<DB::Context const>, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, int, DB::ConnectionTimeouts const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::shared_ptr<DB::Throttler>, bool, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::optional<DB::CurrentlySubmergingEmergingTagger>*, bool, std::__1::shared_ptr<DB::IDisk>) @ 0x141885dd in /usr/bin/clickhouse 11. ? @ 0x13f88430 in /usr/bin/clickhouse 12. DB::StorageReplicatedMergeTree::fetchPart(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, std::__1::shared_ptr<DB::StorageInMemoryMetadata const> const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, bool, unsigned long, std::__1::shared_ptr<zkutil::ZooKeeper>, bool) @ 0x13ec11c3 in /usr/bin/clickhouse 13. DB::StorageReplicatedMergeTree::executeFetch(DB::ReplicatedMergeTreeLogEntry&, bool) @ 0x13eb25e9 in /usr/bin/clickhouse 14. DB::StorageReplicatedMergeTree::executeLogEntry(DB::ReplicatedMergeTreeLogEntry&) @ 0x13ea03b9 in /usr/bin/clickhouse 15. ? @ 0x13f85c7f in /usr/bin/clickhouse 16. DB::ReplicatedMergeTreeQueue::processEntry(std::__1::function<std::__1::shared_ptr<zkutil::ZooKeeper> ()>, std::__1::shared_ptr<DB::ReplicatedMergeTreeLogEntry>&, std::__1::function<bool (std::__1::shared_ptr<DB::ReplicatedMergeTreeLogEntry>&)>) @ 0x14519426 in /usr/bin/clickhouse 17. DB::StorageReplicatedMergeTree::processQueueEntry(std::__1::shared_ptr<DB::ReplicatedMergeTreeQueue::SelectedEntry>) @ 0x13ee31dc in /usr/bin/clickhouse 18. ? @ 0x13f869f1 in /usr/bin/clickhouse 19. DB::MergeTreeBackgroundExecutor<DB::RoundRobinRuntimeQueue>::routine(std::__1::shared_ptr<DB::TaskRuntimeData>) @ 0x8921aec in /usr/bin/clickhouse 20. DB::MergeTreeBackgroundExecutor<DB::RoundRobinRuntimeQueue>::threadFunction() @ 0x89217c0 in /usr/bin/clickhouse 21. ThreadPoolImpl<ThreadFromGlobalPoolImpl<false>>::worker(std::__1::__list_iterator<ThreadFromGlobalPoolImpl<false>, void*>) @ 0xe19acaa in /usr/bin/clickhouse 22. void std::__1::__function::__policy_invoker<void ()>::__call_impl<std::__1::__function::__default_alloc_func<ThreadFromGlobalPoolImpl<false>::ThreadFromGlobalPoolImpl<void ThreadPoolImpl<ThreadFromGlobalPoolImpl<false>>::scheduleImpl<void>(std::__1::function<void ()>, long, std::__1::optional<unsigned long>, bool)::'lambda0'()>(void&&)::'lambda'(), void ()>>(std::__1::__function::__policy_storage const*) @ 0xe19d577 in /usr/bin/clickhouse 23. ThreadPoolImpl<std::__1::thread>::worker(std::__1::__list_iterator<std::__1::thread, void*>) @ 0xe196e6a in /usr/bin/clickhouse 24. ? @ 0xe19c521 in /usr/bin/clickhouse 25. ? @ 0x7fc7f30ff609 in ? 26. __clone @ 0x7fc7f3024133 in ? (version 23.2.4.12 (official build)) ``` **Additional context**
usab
not host info for connection refused error describe the issue not host info for connection refused error how to reproduce version official build expected behavior need add host port info to understand to which server click couldn t connect error message and or stacktrace default inner id auto db storagereplicatedmergetree processqueueentry replicatedmergetreequeue selectedentryptr anonymous class operator db storagereplicatedmergetree logentryptr const poco exception code e code connection refused stack trace when copying this message always include the lines below poco net connectionrefusedexception connectionrefusedexception std basic string std allocator const int in usr bin clickhouse poco net socketimpl error int std basic string std allocator const in usr bin clickhouse poco net socketimpl connect poco net socketaddress const poco timespan const in usr bin clickhouse poco net httpsession connect poco net socketaddress const in usr bin clickhouse poco net httpclientsession reconnect in usr bin clickhouse poco net httpclientsession sendrequest poco net httprequest in usr bin clickhouse in usr bin clickhouse in usr bin clickhouse in usr bin clickhouse in usr bin clickhouse db datapartsexchange fetcher fetchselectedpart std shared ptr const std shared ptr std basic string std allocator const std basic string std allocator const std basic string std allocator const int db connectiontimeouts const std basic string std allocator const std basic string std allocator const std basic string std allocator const std shared ptr bool std basic string std allocator const std optional bool std shared ptr in usr bin clickhouse in usr bin clickhouse db storagereplicatedmergetree fetchpart std basic string std allocator const std shared ptr const std basic string std allocator const bool unsigned long std shared ptr bool in usr bin clickhouse db storagereplicatedmergetree executefetch db replicatedmergetreelogentry bool in usr bin clickhouse db storagereplicatedmergetree executelogentry db replicatedmergetreelogentry in usr bin clickhouse in usr bin clickhouse db replicatedmergetreequeue processentry std function std shared ptr std function in usr bin clickhouse db storagereplicatedmergetree processqueueentry std shared ptr in usr bin clickhouse in usr bin clickhouse db mergetreebackgroundexecutor routine std shared ptr in usr bin clickhouse db mergetreebackgroundexecutor threadfunction in usr bin clickhouse threadpoolimpl worker std list iterator void in usr bin clickhouse void std function policy invoker call impl threadfromglobalpoolimpl scheduleimpl std function long std optional bool void lambda void std function policy storage const in usr bin clickhouse threadpoolimpl worker std list iterator in usr bin clickhouse in usr bin clickhouse in clone in version official build additional context
1
20,565
15,700,572,407
IssuesEvent
2021-03-26 10:02:00
OpenOrienteering/mapper
https://api.github.com/repos/OpenOrienteering/mapper
closed
New cutout and cut away icon
usability
### Steps to reproduce Personally I struggle a lot with the iconography of the cutout and the cut away buttons. ![image](https://user-images.githubusercontent.com/15611653/111975790-4859b980-8b01-11eb-89b5-b77404b807ba.png) I mean, yes, rationally I see it. Purple marks the area you get rid of, but at the same time purple is usually used to mark what is important. Neither do I want do get rid of OOB areas, as these are crucial for orienteering. Thus having to choose between cutout and cut-away (yes, I am not that well in English neither) I end up just confused and usually carry on to a "just try one of them"- bingo. ### Expected behaviour I propose that we just leave away the purple hatch. ![image](https://user-images.githubusercontent.com/15611653/111976855-6378f900-8b02-11eb-952a-59f67f799603.png) or to make it even clearer even the grayed out content. ![image](https://user-images.githubusercontent.com/15611653/111976949-80adc780-8b02-11eb-917f-1a55cb54656b.png) or to make it even clearer try to avoid the control point association... ![image](https://user-images.githubusercontent.com/15611653/111977820-7b04b180-8b03-11eb-8438-3beddeb44c6e.png) What do you think? [Buttons.zip](https://github.com/OpenOrienteering/mapper/files/6181465/Buttons.zip) ### Configuration Mapper Version: 0.9.5. Operating System: Windows 7
True
New cutout and cut away icon - ### Steps to reproduce Personally I struggle a lot with the iconography of the cutout and the cut away buttons. ![image](https://user-images.githubusercontent.com/15611653/111975790-4859b980-8b01-11eb-89b5-b77404b807ba.png) I mean, yes, rationally I see it. Purple marks the area you get rid of, but at the same time purple is usually used to mark what is important. Neither do I want do get rid of OOB areas, as these are crucial for orienteering. Thus having to choose between cutout and cut-away (yes, I am not that well in English neither) I end up just confused and usually carry on to a "just try one of them"- bingo. ### Expected behaviour I propose that we just leave away the purple hatch. ![image](https://user-images.githubusercontent.com/15611653/111976855-6378f900-8b02-11eb-952a-59f67f799603.png) or to make it even clearer even the grayed out content. ![image](https://user-images.githubusercontent.com/15611653/111976949-80adc780-8b02-11eb-917f-1a55cb54656b.png) or to make it even clearer try to avoid the control point association... ![image](https://user-images.githubusercontent.com/15611653/111977820-7b04b180-8b03-11eb-8438-3beddeb44c6e.png) What do you think? [Buttons.zip](https://github.com/OpenOrienteering/mapper/files/6181465/Buttons.zip) ### Configuration Mapper Version: 0.9.5. Operating System: Windows 7
usab
new cutout and cut away icon steps to reproduce personally i struggle a lot with the iconography of the cutout and the cut away buttons i mean yes rationally i see it purple marks the area you get rid of but at the same time purple is usually used to mark what is important neither do i want do get rid of oob areas as these are crucial for orienteering thus having to choose between cutout and cut away yes i am not that well in english neither i end up just confused and usually carry on to a just try one of them bingo expected behaviour i propose that we just leave away the purple hatch or to make it even clearer even the grayed out content or to make it even clearer try to avoid the control point association what do you think configuration mapper version operating system windows
1
60,327
14,786,099,638
IssuesEvent
2021-01-12 04:35:08
nnstreamer/nnstreamer
https://api.github.com/repos/nnstreamer/nnstreamer
closed
Problems in the coexistence of TF 1.13.1 with the ProtoBuf 3.12.3
bug build/CI discussion
If there are v3.12.3 of the ProtoBuf libraries (i.e., libproto*.so.23) in the system, TF 1.13.1 tries to call those libraries' methods even if it is built with the bundled ProtoBuf (v3.6.1) sources or linked with the ProtoBuf (v3.6.1) libraries. IMO, this is because there are methods that have the same namespaces but different symbol visibilities in ProtoBuf v3.6.1 and v3.12.3. For example, the following logs are the backtraces from gdb; ``` [ OK ] test_tensor_filter.framework_auto_ext_tflite_wrong_inputtype_n (150 ms) [ RUN ] test_tensor_filter.framework_auto_ext_pb_01 Thread 1 "unittest_plugin" received signal SIGSEGV, Segmentation fault. 0x00007ffff3f1d064 in google::protobuf::internal::ReflectionOps::FindInitializationErrors(google::protobuf::Message const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::vector<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::allocator<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > >*) () from /usr/lib/x86_64-linux-gnu/libprotobuf.so.23 (gdb) bt #0 0x00007ffff3f1d064 in google::protobuf::internal::ReflectionOps::FindInitializationErrors(google::protobuf::Message const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::vector<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::allocator<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > >*) () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.23 #1 0x00007ffff3f14909 in google::protobuf::Message::FindInitializationErrors(std::vector<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::allocator<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > >*) const () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.23 #2 0x00007ffff3f149a9 in google::protobuf::Message::InitializationErrorString[abi:cxx11]() const () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.23 #3 0x00007fffb986d697 in google::protobuf::MessageLite::ParseFromArray(void const*, int) () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.17 #4 0x00007fffb98ac726 in google::protobuf::EncodedDescriptorDatabase::Add(void const*, int) () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.17 #5 0x00007fffb987dc8d in google::protobuf::DescriptorPool::InternalAddGeneratedFile(void const*, int) () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.17 #6 0x00007fffb98747aa in protobuf_google_2fprotobuf_2fany_2eproto::AddDescriptorsImpl() () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.17 #7 0x00007ffff68e3907 in __pthread_once_slow (once_control=0x7fffb9c28dd8, init_routine=0x7ffff6dc78a0 <__once_proxy>) at pthread_once.c:116 #8 0x00007fffb98756a5 in () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.17 #9 0x00007ffff7de38d3 in call_init (env=0x7fffffffda80, argv=0x7fffffffda68, argc=2, l=<optimized out>) at dl-init.c:72 #10 0x00007ffff7de38d3 in _dl_init (main_map=main_map@entry=0x555555c1b200, argc=2, argv=0x7fffffffda68, env=0x7fffffffda80) at dl-init.c:119 #11 0x00007ffff7de839f in dl_open_worker (a=a@entry=0x7fffffffb210) at dl-open.c:522 #12 0x00007ffff664a1ef in __GI__dl_catch_exception (exception=0x7fffffffb1f0, operate=0x7ffff7de7f60 <dl_open_worker>, args=0x7fffffffb210) at dl-error-skeleton.c:196 #13 0x00007ffff7de796a in _dl_open (file=0x555555bddf30 "/home/wook/Work/NNS/nnstreamer/build/ext/nnstreamer/tensor_filter/libnnstreamer_filter_tensorflow.so", mode=-2147483390, caller_dlopen=0x7ffff62e06d9 <g_module_open+265>, nsid=<optimized out>, argc=2, argv=<optimized out>, env=0x7fffffffda80) at dl-open.c:605 #14 0x00007ffff4ec4f96 in dlopen_doit (a=a@entry=0x7fffffffb440) at dlopen.c:66 #15 0x00007ffff664a1ef in __GI__dl_catch_exception (exception=exception@entry=0x7fffffffb3e0, operate=0x7ffff4ec4f40 <dlopen_doit>, args=0x7fffffffb440) at dl-error-skeleton.c:196 #16 0x00007ffff664a27f in __GI__dl_catch_error (objname=0x5555558da8b0, errstring=0x5555558da8b8, mallocedp=0x5555558da8a8, operate=<optimized out>, args=<optimized out>) at dl-error-skeleton.c:215 #17 0x00007ffff4ec5745 in _dlerror_run (operate=operate@entry=0x7ffff4ec4f40 <dlopen_doit>, args=args@entry=0x7fffffffb440) at dlerror.c:162 #18 0x00007ffff4ec5051 in __dlopen (file=<optimized out>, mode=<optimized out>) at dlopen.c:87 #19 0x00007ffff62e06d9 in g_module_open () at /usr/lib/x86_64-linux-gnu/libgmodule-2.0.so.0 #20 0x00007ffff7b786b2 in _search_subplugin (type=NNS_SUBPLUGIN_FILTER, name=0x555555be5e10 "tensorflow", path=0x555555b3cd20 "/home/wook/Work/NNS/nnstreamer/build/ext/nnstreamer/tensor_filter/libnnstreamer_filter_tensorflow.so") at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/nnstreamer_subplugin.c:112 #21 0x00007ffff7b788c1 in get_subplugin (type=NNS_SUBPLUGIN_FILTER, name=0x555555be5e10 "tensorflow") at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/nnstreamer_subplugin.c:161 #22 0x00007ffff7ba5831 in nnstreamer_filter_find (name=0x555555be5e10 "tensorflow") at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/tensor_filter/tensor_filter_common.c:698 #23 0x00007ffff7ba6e6f in gst_tensor_filter_get_available_framework (priv=0x555555c1f320, fw_name=0x7ffff7bc4419 "auto") at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/tensor_filter/tensor_filter_common.c:1246 #24 0x00007ffff7ba7312 in _gtfc_setprop_MODEL (priv=0x555555c1f320, prop=0x555555c1f328, value=0x7fffffffbd10) at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/tensor_filter/tensor_filter_common.c:1349 #25 0x00007ffff7ba86b7 in gst_tensor_filter_common_set_property (priv=0x555555c1f320, prop_id=3, value=0x7fffffffbd10, pspec=0x555555b3d9d0) at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/tensor_filter/tensor_filter_common.c:1830 #26 0x00007ffff7ba0fad in gst_tensor_filter_set_property (object=0x555555c1f0e0, prop_id=3, value=0x7fffffffbd10, pspec=0x555555b3d9d0) at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/tensor_filter/tensor_filter.c:297 #27 0x00007ffff72cdbae in g_object_setv () at /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0 #28 0x00007ffff72ceb3e in g_object_set_property () at /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0 #29 0x00007ffff75da36d in () at /usr/lib/x86_64-linux-gnu/libgstreamer-1.0.so.0 #30 0x00007ffff75dc238 in () at /usr/lib/x86_64-linux-gnu/libgstreamer-1.0.so.0 #31 0x00007ffff75dd118 in () at /usr/lib/x86_64-linux-gnu/libgstreamer-1.0.so.0 #32 0x00007ffff75d3e5f in gst_parse_launch_full () at /usr/lib/x86_64-linux-gnu/libgstreamer-1.0.so.0 #33 0x0000555555627177 in test_tensor_filter_framework_auto_ext_pb_01_Test::TestBody() (this=0x555555da5400) at ../tests/nnstreamer_plugins/unittest_plugins.cc:4391 #34 0x0000555555667865 in testing::internal::HandleSehExceptionsInMethodIfSupported<testing::Test, void>(testing::Test*, void (testing::Test::*)(), char const*) (object=0x555555da5400, method=&virtual testing::Test::TestBody(), location=0x55555567e2fb "the test body") at /usr/src/gtest/src/gtest.cc:2402 #35 0x00005555556619a3 in testing::internal::HandleExceptionsInMethodIfSupported<testing::Test, void>(testing::Test*, void (testing::Test::*)(), char const*) (object=0x555555da5400, method=&virtual testing::Test::TestBody(), location=0x55555567e2fb "the test body") at /usr/src/gtest/src/gtest.cc:2438 #36 0x000055555564592a in testing::Test::Run() (this=0x555555da5400) at /usr/src/gtest/src/gtest.cc:2474 #37 0x000055555564625a in testing::TestInfo::Run() (this=0x5555558d99a0) at /usr/src/gtest/src/gtest.cc:2656 #38 0x00005555556468e2 in testing::TestCase::Run() (this=0x5555558d7de0) at /usr/src/gtest/src/gtest.cc:2776 #39 0x000055555564d7b0 in testing::internal::UnitTestImpl::RunAllTests() (this=0x5555558d0200) at /usr/src/gtest/src/gtest.cc:4651 #40 0x00005555556689ec in testing::internal::HandleSehExceptionsInMethodIfSupported<testing::internal::UnitTestImpl, bool>(testing::internal::UnitTestImpl*, bool (testing::internal::UnitTestImpl::*)(), char const*) (object=0x5555558d0200, method=(bool (testing::internal::UnitTestImpl::*)(testing::internal::UnitTestImpl * const)) 0x55555564d4f0 <testing::internal::UnitTestImpl::RunAllTests()>, location=0x55555567eb38 "auxiliary test code (environments or event listeners)") at /usr/src/gtest/src/gtest.cc:2402 #41 0x00005555556627d7 in testing::internal::HandleExceptionsInMethodIfSupported<testing::internal::UnitTestImpl, bool>(testing::internal::UnitTestImpl*, bool (testing::internal::UnitTestImpl::*)(), char const*) (object=0x5555558d0200, method=(bool (testing::internal::UnitTestImpl::*)(testing::internal::UnitTestImpl * const)) 0x55555564d4f0 <testing::internal::UnitTestImpl::RunAllTests()>, location=0x55555567eb38 "auxiliary test code (environments or event listeners)") at /usr/src/gtest/src/gtest.cc:2438 #42 0x000055555564c370 in testing::UnitTest::Run() (this=0x5555558b06c0 <testing::UnitTest::GetInstance()::instance>) at /usr/src/gtest/src/gtest.cc:4259 #43 0x00005555556308ea in RUN_ALL_TESTS() () at /usr/src/gtest/include/gtest/gtest.h:2233 #44 0x000055555562a80c in main(int, char**) (argc=1, argv=0x7fffffffda68) at ../tests/nnstreamer_plugins/unittest_plugins.cc:4763 ``` As you can see, the method in ```/usr/lib/x86_64-linux-gnu/libprotobuf.so.17``` at 3 calls the method in ```/usr/lib/x86_64-linux-gnu/libprotobuf.so.23``` at 2. The result was not different even if it is built with the bundled ProtoBuf sources. ## Possible Soulutions #### 1. RollBack to v3.6.1 - Change our ProtoBuf v3.6.1 packages' names with a suffix, '17' (I've already done and tested this). - Let the NNS modules which require ProtoBuf use these packages #### 2. TF1.13.1 with ProtoBut v3.12.3 - Build TF1.13.1 with ProtoBut v3.12.3's shared libraries (I tried and I found that it works) - I also checked this version passed test cases related to ProtoBuf and TF. - However, I am not sure that TF1.13.1 with ProtoBut v3.12.3 has no problems at all.
1.0
Problems in the coexistence of TF 1.13.1 with the ProtoBuf 3.12.3 - If there are v3.12.3 of the ProtoBuf libraries (i.e., libproto*.so.23) in the system, TF 1.13.1 tries to call those libraries' methods even if it is built with the bundled ProtoBuf (v3.6.1) sources or linked with the ProtoBuf (v3.6.1) libraries. IMO, this is because there are methods that have the same namespaces but different symbol visibilities in ProtoBuf v3.6.1 and v3.12.3. For example, the following logs are the backtraces from gdb; ``` [ OK ] test_tensor_filter.framework_auto_ext_tflite_wrong_inputtype_n (150 ms) [ RUN ] test_tensor_filter.framework_auto_ext_pb_01 Thread 1 "unittest_plugin" received signal SIGSEGV, Segmentation fault. 0x00007ffff3f1d064 in google::protobuf::internal::ReflectionOps::FindInitializationErrors(google::protobuf::Message const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::vector<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::allocator<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > >*) () from /usr/lib/x86_64-linux-gnu/libprotobuf.so.23 (gdb) bt #0 0x00007ffff3f1d064 in google::protobuf::internal::ReflectionOps::FindInitializationErrors(google::protobuf::Message const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::vector<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::allocator<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > >*) () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.23 #1 0x00007ffff3f14909 in google::protobuf::Message::FindInitializationErrors(std::vector<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::allocator<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > >*) const () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.23 #2 0x00007ffff3f149a9 in google::protobuf::Message::InitializationErrorString[abi:cxx11]() const () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.23 #3 0x00007fffb986d697 in google::protobuf::MessageLite::ParseFromArray(void const*, int) () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.17 #4 0x00007fffb98ac726 in google::protobuf::EncodedDescriptorDatabase::Add(void const*, int) () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.17 #5 0x00007fffb987dc8d in google::protobuf::DescriptorPool::InternalAddGeneratedFile(void const*, int) () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.17 #6 0x00007fffb98747aa in protobuf_google_2fprotobuf_2fany_2eproto::AddDescriptorsImpl() () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.17 #7 0x00007ffff68e3907 in __pthread_once_slow (once_control=0x7fffb9c28dd8, init_routine=0x7ffff6dc78a0 <__once_proxy>) at pthread_once.c:116 #8 0x00007fffb98756a5 in () at /usr/lib/x86_64-linux-gnu/libprotobuf.so.17 #9 0x00007ffff7de38d3 in call_init (env=0x7fffffffda80, argv=0x7fffffffda68, argc=2, l=<optimized out>) at dl-init.c:72 #10 0x00007ffff7de38d3 in _dl_init (main_map=main_map@entry=0x555555c1b200, argc=2, argv=0x7fffffffda68, env=0x7fffffffda80) at dl-init.c:119 #11 0x00007ffff7de839f in dl_open_worker (a=a@entry=0x7fffffffb210) at dl-open.c:522 #12 0x00007ffff664a1ef in __GI__dl_catch_exception (exception=0x7fffffffb1f0, operate=0x7ffff7de7f60 <dl_open_worker>, args=0x7fffffffb210) at dl-error-skeleton.c:196 #13 0x00007ffff7de796a in _dl_open (file=0x555555bddf30 "/home/wook/Work/NNS/nnstreamer/build/ext/nnstreamer/tensor_filter/libnnstreamer_filter_tensorflow.so", mode=-2147483390, caller_dlopen=0x7ffff62e06d9 <g_module_open+265>, nsid=<optimized out>, argc=2, argv=<optimized out>, env=0x7fffffffda80) at dl-open.c:605 #14 0x00007ffff4ec4f96 in dlopen_doit (a=a@entry=0x7fffffffb440) at dlopen.c:66 #15 0x00007ffff664a1ef in __GI__dl_catch_exception (exception=exception@entry=0x7fffffffb3e0, operate=0x7ffff4ec4f40 <dlopen_doit>, args=0x7fffffffb440) at dl-error-skeleton.c:196 #16 0x00007ffff664a27f in __GI__dl_catch_error (objname=0x5555558da8b0, errstring=0x5555558da8b8, mallocedp=0x5555558da8a8, operate=<optimized out>, args=<optimized out>) at dl-error-skeleton.c:215 #17 0x00007ffff4ec5745 in _dlerror_run (operate=operate@entry=0x7ffff4ec4f40 <dlopen_doit>, args=args@entry=0x7fffffffb440) at dlerror.c:162 #18 0x00007ffff4ec5051 in __dlopen (file=<optimized out>, mode=<optimized out>) at dlopen.c:87 #19 0x00007ffff62e06d9 in g_module_open () at /usr/lib/x86_64-linux-gnu/libgmodule-2.0.so.0 #20 0x00007ffff7b786b2 in _search_subplugin (type=NNS_SUBPLUGIN_FILTER, name=0x555555be5e10 "tensorflow", path=0x555555b3cd20 "/home/wook/Work/NNS/nnstreamer/build/ext/nnstreamer/tensor_filter/libnnstreamer_filter_tensorflow.so") at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/nnstreamer_subplugin.c:112 #21 0x00007ffff7b788c1 in get_subplugin (type=NNS_SUBPLUGIN_FILTER, name=0x555555be5e10 "tensorflow") at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/nnstreamer_subplugin.c:161 #22 0x00007ffff7ba5831 in nnstreamer_filter_find (name=0x555555be5e10 "tensorflow") at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/tensor_filter/tensor_filter_common.c:698 #23 0x00007ffff7ba6e6f in gst_tensor_filter_get_available_framework (priv=0x555555c1f320, fw_name=0x7ffff7bc4419 "auto") at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/tensor_filter/tensor_filter_common.c:1246 #24 0x00007ffff7ba7312 in _gtfc_setprop_MODEL (priv=0x555555c1f320, prop=0x555555c1f328, value=0x7fffffffbd10) at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/tensor_filter/tensor_filter_common.c:1349 #25 0x00007ffff7ba86b7 in gst_tensor_filter_common_set_property (priv=0x555555c1f320, prop_id=3, value=0x7fffffffbd10, pspec=0x555555b3d9d0) at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/tensor_filter/tensor_filter_common.c:1830 #26 0x00007ffff7ba0fad in gst_tensor_filter_set_property (object=0x555555c1f0e0, prop_id=3, value=0x7fffffffbd10, pspec=0x555555b3d9d0) at /home/wook/Work/NNS/nnstreamer/gst/nnstreamer/tensor_filter/tensor_filter.c:297 #27 0x00007ffff72cdbae in g_object_setv () at /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0 #28 0x00007ffff72ceb3e in g_object_set_property () at /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0 #29 0x00007ffff75da36d in () at /usr/lib/x86_64-linux-gnu/libgstreamer-1.0.so.0 #30 0x00007ffff75dc238 in () at /usr/lib/x86_64-linux-gnu/libgstreamer-1.0.so.0 #31 0x00007ffff75dd118 in () at /usr/lib/x86_64-linux-gnu/libgstreamer-1.0.so.0 #32 0x00007ffff75d3e5f in gst_parse_launch_full () at /usr/lib/x86_64-linux-gnu/libgstreamer-1.0.so.0 #33 0x0000555555627177 in test_tensor_filter_framework_auto_ext_pb_01_Test::TestBody() (this=0x555555da5400) at ../tests/nnstreamer_plugins/unittest_plugins.cc:4391 #34 0x0000555555667865 in testing::internal::HandleSehExceptionsInMethodIfSupported<testing::Test, void>(testing::Test*, void (testing::Test::*)(), char const*) (object=0x555555da5400, method=&virtual testing::Test::TestBody(), location=0x55555567e2fb "the test body") at /usr/src/gtest/src/gtest.cc:2402 #35 0x00005555556619a3 in testing::internal::HandleExceptionsInMethodIfSupported<testing::Test, void>(testing::Test*, void (testing::Test::*)(), char const*) (object=0x555555da5400, method=&virtual testing::Test::TestBody(), location=0x55555567e2fb "the test body") at /usr/src/gtest/src/gtest.cc:2438 #36 0x000055555564592a in testing::Test::Run() (this=0x555555da5400) at /usr/src/gtest/src/gtest.cc:2474 #37 0x000055555564625a in testing::TestInfo::Run() (this=0x5555558d99a0) at /usr/src/gtest/src/gtest.cc:2656 #38 0x00005555556468e2 in testing::TestCase::Run() (this=0x5555558d7de0) at /usr/src/gtest/src/gtest.cc:2776 #39 0x000055555564d7b0 in testing::internal::UnitTestImpl::RunAllTests() (this=0x5555558d0200) at /usr/src/gtest/src/gtest.cc:4651 #40 0x00005555556689ec in testing::internal::HandleSehExceptionsInMethodIfSupported<testing::internal::UnitTestImpl, bool>(testing::internal::UnitTestImpl*, bool (testing::internal::UnitTestImpl::*)(), char const*) (object=0x5555558d0200, method=(bool (testing::internal::UnitTestImpl::*)(testing::internal::UnitTestImpl * const)) 0x55555564d4f0 <testing::internal::UnitTestImpl::RunAllTests()>, location=0x55555567eb38 "auxiliary test code (environments or event listeners)") at /usr/src/gtest/src/gtest.cc:2402 #41 0x00005555556627d7 in testing::internal::HandleExceptionsInMethodIfSupported<testing::internal::UnitTestImpl, bool>(testing::internal::UnitTestImpl*, bool (testing::internal::UnitTestImpl::*)(), char const*) (object=0x5555558d0200, method=(bool (testing::internal::UnitTestImpl::*)(testing::internal::UnitTestImpl * const)) 0x55555564d4f0 <testing::internal::UnitTestImpl::RunAllTests()>, location=0x55555567eb38 "auxiliary test code (environments or event listeners)") at /usr/src/gtest/src/gtest.cc:2438 #42 0x000055555564c370 in testing::UnitTest::Run() (this=0x5555558b06c0 <testing::UnitTest::GetInstance()::instance>) at /usr/src/gtest/src/gtest.cc:4259 #43 0x00005555556308ea in RUN_ALL_TESTS() () at /usr/src/gtest/include/gtest/gtest.h:2233 #44 0x000055555562a80c in main(int, char**) (argc=1, argv=0x7fffffffda68) at ../tests/nnstreamer_plugins/unittest_plugins.cc:4763 ``` As you can see, the method in ```/usr/lib/x86_64-linux-gnu/libprotobuf.so.17``` at 3 calls the method in ```/usr/lib/x86_64-linux-gnu/libprotobuf.so.23``` at 2. The result was not different even if it is built with the bundled ProtoBuf sources. ## Possible Soulutions #### 1. RollBack to v3.6.1 - Change our ProtoBuf v3.6.1 packages' names with a suffix, '17' (I've already done and tested this). - Let the NNS modules which require ProtoBuf use these packages #### 2. TF1.13.1 with ProtoBut v3.12.3 - Build TF1.13.1 with ProtoBut v3.12.3's shared libraries (I tried and I found that it works) - I also checked this version passed test cases related to ProtoBuf and TF. - However, I am not sure that TF1.13.1 with ProtoBut v3.12.3 has no problems at all.
non_usab
problems in the coexistence of tf with the protobuf if there are of the protobuf libraries i e libproto so in the system tf tries to call those libraries methods even if it is built with the bundled protobuf sources or linked with the protobuf libraries imo this is because there are methods that have the same namespaces but different symbol visibilities in protobuf and for example the following logs are the backtraces from gdb test tensor filter framework auto ext tflite wrong inputtype n ms test tensor filter framework auto ext pb thread unittest plugin received signal sigsegv segmentation fault in google protobuf internal reflectionops findinitializationerrors google protobuf message const std basic string std allocator const std vector std allocator std allocator std allocator from usr lib linux gnu libprotobuf so gdb bt in google protobuf internal reflectionops findinitializationerrors google protobuf message const std basic string std allocator const std vector std allocator std allocator std allocator at usr lib linux gnu libprotobuf so in google protobuf message findinitializationerrors std vector std allocator std allocator std allocator const at usr lib linux gnu libprotobuf so in google protobuf message initializationerrorstring const at usr lib linux gnu libprotobuf so in google protobuf messagelite parsefromarray void const int at usr lib linux gnu libprotobuf so in google protobuf encodeddescriptordatabase add void const int at usr lib linux gnu libprotobuf so in google protobuf descriptorpool internaladdgeneratedfile void const int at usr lib linux gnu libprotobuf so in protobuf google adddescriptorsimpl at usr lib linux gnu libprotobuf so in pthread once slow once control init routine at pthread once c in at usr lib linux gnu libprotobuf so in call init env argv argc l at dl init c in dl init main map main map entry argc argv env at dl init c in dl open worker a a entry at dl open c in gi dl catch exception exception operate args at dl error skeleton c in dl open file home wook work nns nnstreamer build ext nnstreamer tensor filter libnnstreamer filter tensorflow so mode caller dlopen nsid argc argv env at dl open c in dlopen doit a a entry at dlopen c in gi dl catch exception exception exception entry operate args at dl error skeleton c in gi dl catch error objname errstring mallocedp operate args at dl error skeleton c in dlerror run operate operate entry args args entry at dlerror c in dlopen file mode at dlopen c in g module open at usr lib linux gnu libgmodule so in search subplugin type nns subplugin filter name tensorflow path home wook work nns nnstreamer build ext nnstreamer tensor filter libnnstreamer filter tensorflow so at home wook work nns nnstreamer gst nnstreamer nnstreamer subplugin c in get subplugin type nns subplugin filter name tensorflow at home wook work nns nnstreamer gst nnstreamer nnstreamer subplugin c in nnstreamer filter find name tensorflow at home wook work nns nnstreamer gst nnstreamer tensor filter tensor filter common c in gst tensor filter get available framework priv fw name auto at home wook work nns nnstreamer gst nnstreamer tensor filter tensor filter common c in gtfc setprop model priv prop value at home wook work nns nnstreamer gst nnstreamer tensor filter tensor filter common c in gst tensor filter common set property priv prop id value pspec at home wook work nns nnstreamer gst nnstreamer tensor filter tensor filter common c in gst tensor filter set property object prop id value pspec at home wook work nns nnstreamer gst nnstreamer tensor filter tensor filter c in g object setv at usr lib linux gnu libgobject so in g object set property at usr lib linux gnu libgobject so in at usr lib linux gnu libgstreamer so in at usr lib linux gnu libgstreamer so in at usr lib linux gnu libgstreamer so in gst parse launch full at usr lib linux gnu libgstreamer so in test tensor filter framework auto ext pb test testbody this at tests nnstreamer plugins unittest plugins cc in testing internal handlesehexceptionsinmethodifsupported testing test void testing test char const object method virtual testing test testbody location the test body at usr src gtest src gtest cc in testing internal handleexceptionsinmethodifsupported testing test void testing test char const object method virtual testing test testbody location the test body at usr src gtest src gtest cc in testing test run this at usr src gtest src gtest cc in testing testinfo run this at usr src gtest src gtest cc in testing testcase run this at usr src gtest src gtest cc in testing internal unittestimpl runalltests this at usr src gtest src gtest cc in testing internal handlesehexceptionsinmethodifsupported testing internal unittestimpl bool testing internal unittestimpl char const object method bool testing internal unittestimpl testing internal unittestimpl const location auxiliary test code environments or event listeners at usr src gtest src gtest cc in testing internal handleexceptionsinmethodifsupported testing internal unittestimpl bool testing internal unittestimpl char const object method bool testing internal unittestimpl testing internal unittestimpl const location auxiliary test code environments or event listeners at usr src gtest src gtest cc in testing unittest run this at usr src gtest src gtest cc in run all tests at usr src gtest include gtest gtest h in main int char argc argv at tests nnstreamer plugins unittest plugins cc as you can see the method in usr lib linux gnu libprotobuf so at calls the method in usr lib linux gnu libprotobuf so at the result was not different even if it is built with the bundled protobuf sources possible soulutions rollback to change our protobuf packages names with a suffix i ve already done and tested this let the nns modules which require protobuf use these packages with protobut build with protobut s shared libraries i tried and i found that it works i also checked this version passed test cases related to protobuf and tf however i am not sure that with protobut has no problems at all
0
255,127
27,484,757,566
IssuesEvent
2023-03-04 01:15:58
panasalap/linux-4.1.15
https://api.github.com/repos/panasalap/linux-4.1.15
opened
CVE-2019-12819 (Medium) detected in linuxlinux-4.1.17
security vulnerability
## CVE-2019-12819 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.1.17</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/phy/mdio_bus.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/phy/mdio_bus.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service. <p>Publish Date: 2019-06-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-12819>CVE-2019-12819</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12819">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12819</a></p> <p>Release Date: 2019-06-18</p> <p>Fix Resolution: v5.0-rc8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-12819 (Medium) detected in linuxlinux-4.1.17 - ## CVE-2019-12819 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.1.17</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/phy/mdio_bus.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/phy/mdio_bus.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service. <p>Publish Date: 2019-06-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-12819>CVE-2019-12819</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12819">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12819</a></p> <p>Release Date: 2019-06-18</p> <p>Fix Resolution: v5.0-rc8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_usab
cve medium detected in linuxlinux cve medium severity vulnerability vulnerable library linuxlinux apache software foundation asf library home page a href found in base branch master vulnerable source files drivers net phy mdio bus c drivers net phy mdio bus c vulnerability details an issue was discovered in the linux kernel before the function mdiobus register in drivers net phy mdio bus c calls put device which will trigger a fixed mdio bus init use after free this will cause a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
574
2,603,745,769
IssuesEvent
2015-02-24 17:42:31
chrsmith/bwapi
https://api.github.com/repos/chrsmith/bwapi
closed
interfaces and portability
auto-migrated Usability
``` forked issue 134, collecting facts: 1. fact: current interface is the "abstract interface". Read more under "C++ Mature Approach: Using an Abstract Interface" at http://www.codeproject.com/KB/cpp/howto_export_cpp_classes.aspx . This interface is only portable between C++ compilers. More on that under "Why This Works With Other Compilers". plan: remove the abstract interface and let agents compile the receiver code. This option became available since the bridge from issue 134. Note: "receiver" is coined as "agent-side wrapper classes around bridge's protocoll" 2. fact: Many nonC++ classes beg to use BWAPI. This feature is best implemented on the agent's side. Since the bridge, the are no drawbacks this way. suggestion: igalvelis has a promising project using swig to port the C++ receiver into any target language. Technically this is a better way than using sockets. I suggest making a wiki acticle for nonC++ users about portability and link to igalvelis's project page, where they hopefully, soon will be able to download an adapter library for their target language. Or we could make igalvelis's project part of BWAPIs and publish the adapter libraries with our releases. ``` ----- Original issue reported on code.google.com by `goo...@teabix.com` on 28 Nov 2009 at 12:58
True
interfaces and portability - ``` forked issue 134, collecting facts: 1. fact: current interface is the "abstract interface". Read more under "C++ Mature Approach: Using an Abstract Interface" at http://www.codeproject.com/KB/cpp/howto_export_cpp_classes.aspx . This interface is only portable between C++ compilers. More on that under "Why This Works With Other Compilers". plan: remove the abstract interface and let agents compile the receiver code. This option became available since the bridge from issue 134. Note: "receiver" is coined as "agent-side wrapper classes around bridge's protocoll" 2. fact: Many nonC++ classes beg to use BWAPI. This feature is best implemented on the agent's side. Since the bridge, the are no drawbacks this way. suggestion: igalvelis has a promising project using swig to port the C++ receiver into any target language. Technically this is a better way than using sockets. I suggest making a wiki acticle for nonC++ users about portability and link to igalvelis's project page, where they hopefully, soon will be able to download an adapter library for their target language. Or we could make igalvelis's project part of BWAPIs and publish the adapter libraries with our releases. ``` ----- Original issue reported on code.google.com by `goo...@teabix.com` on 28 Nov 2009 at 12:58
usab
interfaces and portability forked issue collecting facts fact current interface is the abstract interface read more under c mature approach using an abstract interface at this interface is only portable between c compilers more on that under why this works with other compilers plan remove the abstract interface and let agents compile the receiver code this option became available since the bridge from issue note receiver is coined as agent side wrapper classes around bridge s protocoll fact many nonc classes beg to use bwapi this feature is best implemented on the agent s side since the bridge the are no drawbacks this way suggestion igalvelis has a promising project using swig to port the c receiver into any target language technically this is a better way than using sockets i suggest making a wiki acticle for nonc users about portability and link to igalvelis s project page where they hopefully soon will be able to download an adapter library for their target language or we could make igalvelis s project part of bwapis and publish the adapter libraries with our releases original issue reported on code google com by goo teabix com on nov at
1
78,050
9,658,619,560
IssuesEvent
2019-05-20 11:29:28
alan-turing-institute/sktime
https://api.github.com/repos/alan-turing-institute/sktime
opened
Extend pipeline functionality to classical forecasters
API design implementation: framework
* See [pmdarima](https://github.com/tgsmith61591/pmdarima) Python package for a working example * related to #7
1.0
Extend pipeline functionality to classical forecasters - * See [pmdarima](https://github.com/tgsmith61591/pmdarima) Python package for a working example * related to #7
non_usab
extend pipeline functionality to classical forecasters see python package for a working example related to
0
26,889
27,317,998,320
IssuesEvent
2023-02-24 17:12:24
DOI-ONRR/onrr.gov-site
https://api.github.com/repos/DOI-ONRR/onrr.gov-site
closed
Research page tags for site indexing in Search.gov
enhancement usability
Research the location for tags that will allow Search.gov's in-house indexing to read tags and direct users to correct page. This will include tags for 2nd level tabs.
True
Research page tags for site indexing in Search.gov - Research the location for tags that will allow Search.gov's in-house indexing to read tags and direct users to correct page. This will include tags for 2nd level tabs.
usab
research page tags for site indexing in search gov research the location for tags that will allow search gov s in house indexing to read tags and direct users to correct page this will include tags for level tabs
1
173,153
27,392,436,937
IssuesEvent
2023-02-28 17:08:11
grommet/hpe-design-system
https://api.github.com/repos/grommet/hpe-design-system
closed
Page Templates - List + Table
design
[Figma file ](https://www.figma.com/file/4rdBkUlHd5MCVq3hvUOXHd/Page-Layouts?node-id=5639%3A166209&t=qRxjtBcYDfqAJ7A2-1) ## Problem Statement How might we provide easy to use List/DataTable examples to our designers and developer so that they can copy and paste them when designing? ## Acceptance Criteria - [x] publish List page template in a format consistent with the [home page template]() - [x] publish DataTable page template in a format consistent with the [home page template]() ## Tasks - [x] create success criteria - [x] collect and review List/DataTable examples and understand what it entails [1 day max] - [x] gather List/DataTable examples from other teams like Storage and Compute [2 days max] - [x] V1 - ideate ideas on how to visually layout List/DataTable (skeletal to more detailed view ((examples)) [2 days max] - [x] connect w/ Taylor - [x] share + gather feedback from Scott + Eric - [x] implement feedback - [x] share + gather feedback from stakeholders - [x] implement feedback ## Notes Scott and I connected on 2/13/23 to discuss the next steps following ticket #3123. This ticket is still TBD as a next step or next template we should work on. **Stakeholders**: Chris Gina Justin Amanda Diane?
1.0
Page Templates - List + Table - [Figma file ](https://www.figma.com/file/4rdBkUlHd5MCVq3hvUOXHd/Page-Layouts?node-id=5639%3A166209&t=qRxjtBcYDfqAJ7A2-1) ## Problem Statement How might we provide easy to use List/DataTable examples to our designers and developer so that they can copy and paste them when designing? ## Acceptance Criteria - [x] publish List page template in a format consistent with the [home page template]() - [x] publish DataTable page template in a format consistent with the [home page template]() ## Tasks - [x] create success criteria - [x] collect and review List/DataTable examples and understand what it entails [1 day max] - [x] gather List/DataTable examples from other teams like Storage and Compute [2 days max] - [x] V1 - ideate ideas on how to visually layout List/DataTable (skeletal to more detailed view ((examples)) [2 days max] - [x] connect w/ Taylor - [x] share + gather feedback from Scott + Eric - [x] implement feedback - [x] share + gather feedback from stakeholders - [x] implement feedback ## Notes Scott and I connected on 2/13/23 to discuss the next steps following ticket #3123. This ticket is still TBD as a next step or next template we should work on. **Stakeholders**: Chris Gina Justin Amanda Diane?
non_usab
page templates list table figma file problem statement how might we provide easy to use list datatable examples to our designers and developer so that they can copy and paste them when designing acceptance criteria publish list page template in a format consistent with the publish datatable page template in a format consistent with the tasks create success criteria collect and review list datatable examples and understand what it entails gather list datatable examples from other teams like storage and compute ideate ideas on how to visually layout list datatable skeletal to more detailed view examples connect w taylor share gather feedback from scott eric implement feedback share gather feedback from stakeholders implement feedback notes scott and i connected on to discuss the next steps following ticket this ticket is still tbd as a next step or next template we should work on stakeholders chris gina justin amanda diane
0
11,256
7,131,004,601
IssuesEvent
2018-01-22 09:25:40
zaproxy/zaproxy
https://api.github.com/repos/zaproxy/zaproxy
closed
ZAP should accept/parse cookies without name
Usability bug
Issue reported in OWASP ZAP User Group: https://groups.google.com/d/topic/zaproxy-users/1gvzbFUTbGI/discussion Steps to reproduce the issue: 1. Run ZAP; 2. Proxy a request with a cookie without name: ``` GET / HTTP/1.1 Cookie: value Host: example.org ``` 3. Note that ZAP logs some warnings: ``` 51511 [ZAP-ProxyThread-3] WARN org.zaproxy.zap.extension.httpsessions.ExtensionHttpSessions - Failed to obtain the cookies: value java.lang.IllegalArgumentException: value at org.parosproxy.paros.network.HtmlParameter.<init>(HtmlParameter.java:55) at org.parosproxy.paros.network.HttpRequestHeader.getCookieParams(HttpRequestHeader.java:739) at org.parosproxy.paros.network.HttpRequestHeader.getHttpCookies(HttpRequestHeader.java:758) at org.zaproxy.zap.extension.httpsessions.ExtensionHttpSessions.onHttpRequestSend(ExtensionHttpSessions.java:625) at org.parosproxy.paros.network.HttpSender.notifyRequestListeners(HttpSender.java:451) at org.parosproxy.paros.network.HttpSender.sendAndReceive(HttpSender.java:400) at org.parosproxy.paros.network.HttpSender.sendAndReceive(HttpSender.java:362) at org.parosproxy.paros.core.proxy.ProxyThread.processHttp(ProxyThread.java:509) at org.parosproxy.paros.core.proxy.ProxyThread.run(ProxyThread.java:317) at java.lang.Thread.run(Thread.java:748) 53314 [ZAP-PassiveScanner] WARN org.zaproxy.zap.extension.params.ExtensionParams - Failed to obtain the cookies: value java.lang.IllegalArgumentException: value at org.parosproxy.paros.network.HtmlParameter.<init>(HtmlParameter.java:55) at org.parosproxy.paros.network.HttpRequestHeader.getCookieParams(HttpRequestHeader.java:739) at org.zaproxy.zap.extension.params.ExtensionParams.onHttpRequestSend(ExtensionParams.java:271) at org.zaproxy.zap.extension.params.ParamScanner.scanHttpRequestSend(ParamScanner.java:43) at org.zaproxy.zap.extension.pscan.PassiveScanThread.run(PassiveScanThread.java:146) ``` (In some places this leads to errors, as reported in the user group.) Remarks: Browsers (e.g. Firefox, Chrome) accept and send the cookies without the name. ZAP should be more lenient and accept/parse those cookies as well. ZAP Version 2.7.0 (and older).
True
ZAP should accept/parse cookies without name - Issue reported in OWASP ZAP User Group: https://groups.google.com/d/topic/zaproxy-users/1gvzbFUTbGI/discussion Steps to reproduce the issue: 1. Run ZAP; 2. Proxy a request with a cookie without name: ``` GET / HTTP/1.1 Cookie: value Host: example.org ``` 3. Note that ZAP logs some warnings: ``` 51511 [ZAP-ProxyThread-3] WARN org.zaproxy.zap.extension.httpsessions.ExtensionHttpSessions - Failed to obtain the cookies: value java.lang.IllegalArgumentException: value at org.parosproxy.paros.network.HtmlParameter.<init>(HtmlParameter.java:55) at org.parosproxy.paros.network.HttpRequestHeader.getCookieParams(HttpRequestHeader.java:739) at org.parosproxy.paros.network.HttpRequestHeader.getHttpCookies(HttpRequestHeader.java:758) at org.zaproxy.zap.extension.httpsessions.ExtensionHttpSessions.onHttpRequestSend(ExtensionHttpSessions.java:625) at org.parosproxy.paros.network.HttpSender.notifyRequestListeners(HttpSender.java:451) at org.parosproxy.paros.network.HttpSender.sendAndReceive(HttpSender.java:400) at org.parosproxy.paros.network.HttpSender.sendAndReceive(HttpSender.java:362) at org.parosproxy.paros.core.proxy.ProxyThread.processHttp(ProxyThread.java:509) at org.parosproxy.paros.core.proxy.ProxyThread.run(ProxyThread.java:317) at java.lang.Thread.run(Thread.java:748) 53314 [ZAP-PassiveScanner] WARN org.zaproxy.zap.extension.params.ExtensionParams - Failed to obtain the cookies: value java.lang.IllegalArgumentException: value at org.parosproxy.paros.network.HtmlParameter.<init>(HtmlParameter.java:55) at org.parosproxy.paros.network.HttpRequestHeader.getCookieParams(HttpRequestHeader.java:739) at org.zaproxy.zap.extension.params.ExtensionParams.onHttpRequestSend(ExtensionParams.java:271) at org.zaproxy.zap.extension.params.ParamScanner.scanHttpRequestSend(ParamScanner.java:43) at org.zaproxy.zap.extension.pscan.PassiveScanThread.run(PassiveScanThread.java:146) ``` (In some places this leads to errors, as reported in the user group.) Remarks: Browsers (e.g. Firefox, Chrome) accept and send the cookies without the name. ZAP should be more lenient and accept/parse those cookies as well. ZAP Version 2.7.0 (and older).
usab
zap should accept parse cookies without name issue reported in owasp zap user group steps to reproduce the issue run zap proxy a request with a cookie without name get http cookie value host example org note that zap logs some warnings warn org zaproxy zap extension httpsessions extensionhttpsessions failed to obtain the cookies value java lang illegalargumentexception value at org parosproxy paros network htmlparameter htmlparameter java at org parosproxy paros network httprequestheader getcookieparams httprequestheader java at org parosproxy paros network httprequestheader gethttpcookies httprequestheader java at org zaproxy zap extension httpsessions extensionhttpsessions onhttprequestsend extensionhttpsessions java at org parosproxy paros network httpsender notifyrequestlisteners httpsender java at org parosproxy paros network httpsender sendandreceive httpsender java at org parosproxy paros network httpsender sendandreceive httpsender java at org parosproxy paros core proxy proxythread processhttp proxythread java at org parosproxy paros core proxy proxythread run proxythread java at java lang thread run thread java warn org zaproxy zap extension params extensionparams failed to obtain the cookies value java lang illegalargumentexception value at org parosproxy paros network htmlparameter htmlparameter java at org parosproxy paros network httprequestheader getcookieparams httprequestheader java at org zaproxy zap extension params extensionparams onhttprequestsend extensionparams java at org zaproxy zap extension params paramscanner scanhttprequestsend paramscanner java at org zaproxy zap extension pscan passivescanthread run passivescanthread java in some places this leads to errors as reported in the user group remarks browsers e g firefox chrome accept and send the cookies without the name zap should be more lenient and accept parse those cookies as well zap version and older
1
6,060
4,146,561,949
IssuesEvent
2016-06-15 00:47:14
zaproxy/zaproxy
https://api.github.com/repos/zaproxy/zaproxy
closed
Enable searching in ZAP Addons Pop-up
Component-UI enhancement Usability
Hi, as the number of ZAP extensions is growing, the addons pop-up should have a search box in order to be user-friendly. I can work on this feature. Will need some guidance where to start also ;)
True
Enable searching in ZAP Addons Pop-up - Hi, as the number of ZAP extensions is growing, the addons pop-up should have a search box in order to be user-friendly. I can work on this feature. Will need some guidance where to start also ;)
usab
enable searching in zap addons pop up hi as the number of zap extensions is growing the addons pop up should have a search box in order to be user friendly i can work on this feature will need some guidance where to start also
1
131,267
27,864,130,426
IssuesEvent
2023-03-21 09:04:09
isogeo/isogeo-plugin-qgis
https://api.github.com/repos/isogeo/isogeo-plugin-qgis
opened
Refonte de l'interaction avec l'APIIsogeo
enhancement code art
Il s'agit principalement de travailler sur les 3 modules suivants : * **ApiRequester** * **SearchFormManager** * **ResultsManager** L'idée étant d'assainir l'algorithme et d'essayer de simplifier les relations entre le formulaire, l'envoie de requête, le traitement des réponses de l'API et l'affichage des résultats
1.0
Refonte de l'interaction avec l'APIIsogeo - Il s'agit principalement de travailler sur les 3 modules suivants : * **ApiRequester** * **SearchFormManager** * **ResultsManager** L'idée étant d'assainir l'algorithme et d'essayer de simplifier les relations entre le formulaire, l'envoie de requête, le traitement des réponses de l'API et l'affichage des résultats
non_usab
refonte de l interaction avec l apiisogeo il s agit principalement de travailler sur les modules suivants apirequester searchformmanager resultsmanager l idée étant d assainir l algorithme et d essayer de simplifier les relations entre le formulaire l envoie de requête le traitement des réponses de l api et l affichage des résultats
0
11,070
9,210,740,102
IssuesEvent
2019-03-09 08:38:01
NLog/NLog
https://api.github.com/repos/NLog/NLog
closed
NLog Webservice Target - Soap envelope missing
webservice-target
- Bug **NLog version**: (e.g. 4.2.3) 4.3.11 **Platform**: ..Net 4.5.2 **Current NLog config** (xml or C#, if relevant) ```xml <?xml version="1.0" encoding="utf-8" ?> <nlog xmlns="http://www.nlog-project.org/schemas/NLog.xsd" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.nlog-project.org/schemas/NLog.xsd NLog.xsd" autoReload="true" throwExceptions="true" internalLogFile="c:\nLogDebugging.txt" internalLogLevel="Trace"> <targets> <target xsi:type="WebService" encoding="" name="EmailWebService" url="http://computername/TestWSForNLog2/MyWebService.asmx" namespace="http://namespace/webservices" methodName="SendMail2"> <parameter layout="" name="from" type="System.String"/> <parameter layout="username@address.com" name="to" type="System.String"/> <parameter layout="" name="cc" type="System.String"/> </target> </targets> <rules> <logger name="*" minlevel="Debug" writeTo="EmailWebService" /> </rules> </nlog> ``` In case of a BUG: - What is the current result? When I call the webservice by adding a service reference is Visual Studio 2015 I see this in Fiddler: ``` POST http://computername/TestWSForNLog2/MyWebService.asmx HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; MS Web Services Client Protocol 4.0.30319.42000) VsDebuggerCausalityData: uIDPo4rtZBSuD1RGtQzXHA48wAcAAAAAIyg/V4GZak2tTxbfdqq1CxRIDzCgKRhOpp04ElhwUo0ACQAA Content-Type: text/xml; charset=utf-8 SOAPAction: "http://namespace/webservices/SendMail2" Host: computername Content-Length: 327 Expect: 100-continue <?xml version="1.0" encoding="utf-8"?><soap:Envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><soap:Body><SendMail2 xmlns="http://namespace/webservices"><from /><to>username@address.com/to><cc /></SendMail2></soap:Body></soap:Envelope> ``` However, when I call the logger and use the above target, Fiddler catches this session from NLog. Which is missing the Soap Envelope: ``` POST http://computername/TestWSForNLog2/MyWebService.asmx HTTP/1.1 SOAPAction: http://namespace/webservices/SendMail2 Content-Type: text/xml; charset=utf-8 Host: computername Content-Length: 254 Expect: 100-continue ``` Here is the code which generates the NLog call: ```c# logger.Log(LogLevel.Error, "This is my message"); ``` logger is defined at the top of the class: ```c# private static Logger logger = LogManager.GetCurrentClassLogger(); ``` The computername above refers to another PC on our network where I have the webservice hosted for development. When I break point the webservice on computername, the break point is hit when called from the service reference, but not when called through NLog. Any help is appreciated. I am stuck, having tried everything I can think of and google.
1.0
NLog Webservice Target - Soap envelope missing - - Bug **NLog version**: (e.g. 4.2.3) 4.3.11 **Platform**: ..Net 4.5.2 **Current NLog config** (xml or C#, if relevant) ```xml <?xml version="1.0" encoding="utf-8" ?> <nlog xmlns="http://www.nlog-project.org/schemas/NLog.xsd" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.nlog-project.org/schemas/NLog.xsd NLog.xsd" autoReload="true" throwExceptions="true" internalLogFile="c:\nLogDebugging.txt" internalLogLevel="Trace"> <targets> <target xsi:type="WebService" encoding="" name="EmailWebService" url="http://computername/TestWSForNLog2/MyWebService.asmx" namespace="http://namespace/webservices" methodName="SendMail2"> <parameter layout="" name="from" type="System.String"/> <parameter layout="username@address.com" name="to" type="System.String"/> <parameter layout="" name="cc" type="System.String"/> </target> </targets> <rules> <logger name="*" minlevel="Debug" writeTo="EmailWebService" /> </rules> </nlog> ``` In case of a BUG: - What is the current result? When I call the webservice by adding a service reference is Visual Studio 2015 I see this in Fiddler: ``` POST http://computername/TestWSForNLog2/MyWebService.asmx HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; MS Web Services Client Protocol 4.0.30319.42000) VsDebuggerCausalityData: uIDPo4rtZBSuD1RGtQzXHA48wAcAAAAAIyg/V4GZak2tTxbfdqq1CxRIDzCgKRhOpp04ElhwUo0ACQAA Content-Type: text/xml; charset=utf-8 SOAPAction: "http://namespace/webservices/SendMail2" Host: computername Content-Length: 327 Expect: 100-continue <?xml version="1.0" encoding="utf-8"?><soap:Envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><soap:Body><SendMail2 xmlns="http://namespace/webservices"><from /><to>username@address.com/to><cc /></SendMail2></soap:Body></soap:Envelope> ``` However, when I call the logger and use the above target, Fiddler catches this session from NLog. Which is missing the Soap Envelope: ``` POST http://computername/TestWSForNLog2/MyWebService.asmx HTTP/1.1 SOAPAction: http://namespace/webservices/SendMail2 Content-Type: text/xml; charset=utf-8 Host: computername Content-Length: 254 Expect: 100-continue ``` Here is the code which generates the NLog call: ```c# logger.Log(LogLevel.Error, "This is my message"); ``` logger is defined at the top of the class: ```c# private static Logger logger = LogManager.GetCurrentClassLogger(); ``` The computername above refers to another PC on our network where I have the webservice hosted for development. When I break point the webservice on computername, the break point is hit when called from the service reference, but not when called through NLog. Any help is appreciated. I am stuck, having tried everything I can think of and google.
non_usab
nlog webservice target soap envelope missing bug nlog version e g platform net current nlog config xml or c if relevant xml nlog xmlns xmlns xsi xsi schemalocation nlog xsd autoreload true throwexceptions true internallogfile c nlogdebugging txt internalloglevel trace target xsi type webservice encoding name emailwebservice url namespace methodname in case of a bug what is the current result when i call the webservice by adding a service reference is visual studio i see this in fiddler post http user agent mozilla compatible msie ms web services client protocol vsdebuggercausalitydata content type text xml charset utf soapaction host computername content length expect continue username address com to however when i call the logger and use the above target fiddler catches this session from nlog which is missing the soap envelope post http soapaction content type text xml charset utf host computername content length expect continue here is the code which generates the nlog call c logger log loglevel error this is my message logger is defined at the top of the class c private static logger logger logmanager getcurrentclasslogger the computername above refers to another pc on our network where i have the webservice hosted for development when i break point the webservice on computername the break point is hit when called from the service reference but not when called through nlog any help is appreciated i am stuck having tried everything i can think of and google
0
785,118
27,599,079,827
IssuesEvent
2023-03-09 08:50:02
ballerina-platform/ballerina-lang
https://api.github.com/repos/ballerina-platform/ballerina-lang
closed
Improve recovery for invalid qualifiers in local-var-decl
Type/Improvement Priority/High Team/CompilerFE Area/Parser Deferred
**Description:** Consider following code segment. ```bal function foo() { configurable int e = 6; // cannot have configurable qualifier locally. } ``` Recovery: ```bal function foo() { MISSING[}] configurable int e = 6; INVALID[}] ``` Need to allow parsing the configurable, isolated, etc for `local-var-decl` and then validate.
1.0
Improve recovery for invalid qualifiers in local-var-decl - **Description:** Consider following code segment. ```bal function foo() { configurable int e = 6; // cannot have configurable qualifier locally. } ``` Recovery: ```bal function foo() { MISSING[}] configurable int e = 6; INVALID[}] ``` Need to allow parsing the configurable, isolated, etc for `local-var-decl` and then validate.
non_usab
improve recovery for invalid qualifiers in local var decl description consider following code segment bal function foo configurable int e cannot have configurable qualifier locally recovery bal function foo missing configurable int e invalid need to allow parsing the configurable isolated etc for local var decl and then validate
0