Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1
value | created_at stringlengths 19 19 | repo stringlengths 4 112 | repo_url stringlengths 33 141 | action stringclasses 3
values | title stringlengths 1 994 | labels stringlengths 4 719 | body stringlengths 1 261k | index stringclasses 13
values | text_combine stringlengths 95 261k | label stringclasses 2
values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
87,490 | 15,777,308,847 | IssuesEvent | 2021-04-01 06:08:44 | susanstdemos/WebGoat-1 | https://api.github.com/repos/susanstdemos/WebGoat-1 | opened | CVE-2020-1935 (Medium) detected in tomcat-embed-core-8.5.29.jar | security vulnerability | ## CVE-2020-1935 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-8.5.29.jar</b></p></summary>
<p>Core Tomcat implementation</p>
<p>Library home page: <a href="http:... | True | CVE-2020-1935 (Medium) detected in tomcat-embed-core-8.5.29.jar - ## CVE-2020-1935 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-8.5.29.jar</b></p></summary>
<p>C... | secu | cve medium detected in tomcat embed core jar cve medium severity vulnerability vulnerable library tomcat embed core jar core tomcat implementation library home page a href path to dependency file webgoat webwolf pom xml path to vulnerable library home wss scanner ... | 1 |
274,030 | 29,866,119,529 | IssuesEvent | 2023-06-20 04:07:58 | Chiencc/asuswrt-gt-ac5300 | https://api.github.com/repos/Chiencc/asuswrt-gt-ac5300 | opened | jquery.mobile-1.4.5.js: 1 vulnerabilities (highest severity is: 6.5) | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery.mobile-1.4.5.js</b></p></summary>
<p>Touch-Optimized Web Framework for Smartphones & Tablets</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/aj... | True | jquery.mobile-1.4.5.js: 1 vulnerabilities (highest severity is: 6.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery.mobile-1.4.5.js</b></p></summary>
<p>Touch-Optimized Web Framework for Smartphones & Tab... | secu | jquery mobile js vulnerabilities highest severity is vulnerable library jquery mobile js touch optimized web framework for smartphones tablets library home page a href path to dependency file release src router www sysdep rp www qis wizard htm path to vulnerable libra... | 1 |
238,074 | 26,085,548,817 | IssuesEvent | 2022-12-26 01:59:27 | snykiotcubedev/arangodb-3.7.6 | https://api.github.com/repos/snykiotcubedev/arangodb-3.7.6 | reopened | CVE-2021-3757 (High) detected in immer-1.7.2.tgz | security vulnerability | ## CVE-2021-3757 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>immer-1.7.2.tgz</b></p></summary>
<p>Create your next immutable state by mutating the current one</p>
<p>Library home p... | True | CVE-2021-3757 (High) detected in immer-1.7.2.tgz - ## CVE-2021-3757 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>immer-1.7.2.tgz</b></p></summary>
<p>Create your next immutable stat... | secu | cve high detected in immer tgz cve high severity vulnerability vulnerable library immer tgz create your next immutable state by mutating the current one library home page a href dependency hierarchy react dev utils tgz root library x immer ... | 1 |
233,964 | 25,787,918,560 | IssuesEvent | 2022-12-09 22:48:27 | ericcornelissen/git-tag-annotation-action | https://api.github.com/repos/ericcornelissen/git-tag-annotation-action | opened | Management of non-package registry dependencies | help wanted dependencies security | ### Summary
Most of this projects dependencies are explicitly tracked[^1], either through the `package*.json` files or GitHub workflow files. However, not all dependencies are.
Not having dependency versions tracked accurately in version control can have negative consequence, ranging from contributor accessibilit... | True | Management of non-package registry dependencies - ### Summary
Most of this projects dependencies are explicitly tracked[^1], either through the `package*.json` files or GitHub workflow files. However, not all dependencies are.
Not having dependency versions tracked accurately in version control can have negative ... | secu | management of non package registry dependencies summary most of this projects dependencies are explicitly tracked either through the package json files or github workflow files however not all dependencies are not having dependency versions tracked accurately in version control can have negative con... | 1 |
270,357 | 20,598,413,037 | IssuesEvent | 2022-03-05 21:58:41 | AmandaStromdahl/algorithms | https://api.github.com/repos/AmandaStromdahl/algorithms | closed | Review caps problem and clean code and comments | documentation | I found some details that need some changes in the algorithm, especially comments | 1.0 | Review caps problem and clean code and comments - I found some details that need some changes in the algorithm, especially comments | non_secu | review caps problem and clean code and comments i found some details that need some changes in the algorithm especially comments | 0 |
73,694 | 15,279,595,455 | IssuesEvent | 2021-02-23 04:23:26 | OSWeekends/EventPoints | https://api.github.com/repos/OSWeekends/EventPoints | opened | CVE-2020-28500 (Medium) detected in lodash-4.17.11.tgz | security vulnerability | ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.11.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registr... | True | CVE-2020-28500 (Medium) detected in lodash-4.17.11.tgz - ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.11.tgz</b></p></summary>
<p>Lodash modular util... | secu | cve medium detected in lodash tgz cve medium severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href dependency hierarchy addon actions rc tgz root library x lodash tgz vulnerable library... | 1 |
77,787 | 15,569,880,231 | IssuesEvent | 2021-03-17 01:12:29 | tlkh/mini-dlperf | https://api.github.com/repos/tlkh/mini-dlperf | opened | CVE-2021-25291 (Medium) detected in Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl | security vulnerability | ## CVE-2021-25291 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary>
<p>Python Imaging Library (Fork)</p>
<p>Library hom... | True | CVE-2021-25291 (Medium) detected in Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2021-25291 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pillow-6.2.2-cp27-cp27mu-manylin... | secu | cve medium detected in pillow whl cve medium severity vulnerability vulnerable library pillow whl python imaging library fork library home page a href path to dependency file mini dlperf requirements txt path to vulnerable library mini dlperf re... | 1 |
217,170 | 16,681,039,768 | IssuesEvent | 2021-06-07 23:48:56 | nicolasdeory/DP2-Project | https://api.github.com/repos/nicolasdeory/DP2-Project | closed | Task 068. Progress report | documentation | produce a report in which you describe how the work in your workgroup has gone on. Please, do not write on your subjective impressions; make a point of writing a concise and objective progress report. | 1.0 | Task 068. Progress report - produce a report in which you describe how the work in your workgroup has gone on. Please, do not write on your subjective impressions; make a point of writing a concise and objective progress report. | non_secu | task progress report produce a report in which you describe how the work in your workgroup has gone on please do not write on your subjective impressions make a point of writing a concise and objective progress report | 0 |
347,751 | 24,897,751,701 | IssuesEvent | 2022-10-28 17:29:01 | opensearch-project/geospatial | https://api.github.com/repos/opensearch-project/geospatial | closed | New XYPoint Field to index and query documents that contains cartesian points | documentation roadmap v2.4.0 feature geospatial | The new `xy_point` field type facilitates the indexing and searching of points represented as unit less x, y pairs that fall in a 2-dimensional planar coordinate system. This will be similar to geo_point field type but there are no range limitations (geo_point has a range limitation of -90 to 90 for latitude and -180 t... | 1.0 | New XYPoint Field to index and query documents that contains cartesian points - The new `xy_point` field type facilitates the indexing and searching of points represented as unit less x, y pairs that fall in a 2-dimensional planar coordinate system. This will be similar to geo_point field type but there are no range li... | non_secu | new xypoint field to index and query documents that contains cartesian points the new xy point field type facilitates the indexing and searching of points represented as unit less x y pairs that fall in a dimensional planar coordinate system this will be similar to geo point field type but there are no range li... | 0 |
193,801 | 22,216,352,391 | IssuesEvent | 2022-06-08 02:21:16 | maddyCode23/linux-4.1.15 | https://api.github.com/repos/maddyCode23/linux-4.1.15 | reopened | CVE-2020-24394 (High) detected in linux-stable-rtv4.1.33 | security vulnerability | ## CVE-2020-24394 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home pag... | True | CVE-2020-24394 (High) detected in linux-stable-rtv4.1.33 - ## CVE-2020-24394 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartw... | secu | cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files... | 1 |
111,159 | 17,018,980,654 | IssuesEvent | 2021-07-02 15:51:09 | raft-tech/TANF-app | https://api.github.com/repos/raft-tech/TANF-app | closed | AC-02(12): Account Management | Account Monitoring / Atypical usage | security | AC:
- [ ] Control implementation statement has been reviewed by Raft for technical accuracy
- [ ] Control implementation statement has passed QASP review
DoD:
- [ ] Control implementation statement has been documented in GitHub
**Control Description:**
The organization:
(a) Monitors information system accounts for [... | True | AC-02(12): Account Management | Account Monitoring / Atypical usage - AC:
- [ ] Control implementation statement has been reviewed by Raft for technical accuracy
- [ ] Control implementation statement has passed QASP review
DoD:
- [ ] Control implementation statement has been documented in GitHub
**Control Descriptio... | secu | ac account management account monitoring atypical usage ac control implementation statement has been reviewed by raft for technical accuracy control implementation statement has passed qasp review dod control implementation statement has been documented in github control description the... | 1 |
212,971 | 16,505,908,419 | IssuesEvent | 2021-05-25 19:16:43 | giridhar196/pm-notes | https://api.github.com/repos/giridhar196/pm-notes | closed | Write notes for Class 05/13/2021 | documentation good first issue | Gather notes for today's class and submit them under the documents after the class. | 1.0 | Write notes for Class 05/13/2021 - Gather notes for today's class and submit them under the documents after the class. | non_secu | write notes for class gather notes for today s class and submit them under the documents after the class | 0 |
74,423 | 15,349,977,434 | IssuesEvent | 2021-03-01 01:00:45 | Dima2021/clamav-devel | https://api.github.com/repos/Dima2021/clamav-devel | opened | CVE-2012-6706 (High) detected in clamav-develclamav-0.103.0 | security vulnerability | ## CVE-2012-6706 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>clamav-develclamav-0.103.0</b></p></summary>
<p>
<p>ClamAV Development - FAQ is here: https://github.com/Cisco-Talos/cl... | True | CVE-2012-6706 (High) detected in clamav-develclamav-0.103.0 - ## CVE-2012-6706 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>clamav-develclamav-0.103.0</b></p></summary>
<p>
<p>ClamA... | secu | cve high detected in clamav develclamav cve high severity vulnerability vulnerable library clamav develclamav clamav development faq is here library home page a href found in base branch dev vulnerable source files clamav devel lib... | 1 |
153,779 | 19,708,597,591 | IssuesEvent | 2022-01-13 01:44:01 | artsking/linux-4.19.72_CVE-2020-14386 | https://api.github.com/repos/artsking/linux-4.19.72_CVE-2020-14386 | opened | CVE-2020-26088 (Medium) detected in linux-yoctov5.4.51 | security vulnerability | ## CVE-2020-26088 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary>
<p>
<p>Yocto Linux Embedded kernel</p>
<p>Library home page: <a href=https://gi... | True | CVE-2020-26088 (Medium) detected in linux-yoctov5.4.51 - ## CVE-2020-26088 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary>
<p>
<p>Yocto Linux Emb... | secu | cve medium detected in linux cve medium severity vulnerability vulnerable library linux yocto linux embedded kernel library home page a href found in base branch master vulnerable source files net nfc rawsock c net nfc rawsock c ... | 1 |
172,775 | 14,382,169,104 | IssuesEvent | 2020-12-02 07:00:07 | ngneat/dag | https://api.github.com/repos/ngneat/dag | closed | Fix README Broken Images | documentation | <!--
PLEASE HELP US PROCESS GITHUB ISSUES FASTER BY PROVIDING THE FOLLOWING INFORMATION.
ISSUES MISSING IMPORTANT INFORMATION MAY BE CLOSED WITHOUT INVESTIGATION.
-->
## I'm submitting a...
<!-- Check one of the following options with "x" -->
<pre><code>
[ ] Regression (a behavior that used to work and sto... | 1.0 | Fix README Broken Images - <!--
PLEASE HELP US PROCESS GITHUB ISSUES FASTER BY PROVIDING THE FOLLOWING INFORMATION.
ISSUES MISSING IMPORTANT INFORMATION MAY BE CLOSED WITHOUT INVESTIGATION.
-->
## I'm submitting a...
<!-- Check one of the following options with "x" -->
<pre><code>
[ ] Regression (a behavio... | non_secu | fix readme broken images please help us process github issues faster by providing the following information issues missing important information may be closed without investigation i m submitting a regression a behavior that used to work and stopped working in a new release b... | 0 |
146,515 | 19,406,117,623 | IssuesEvent | 2021-12-20 01:05:33 | snowdensb/Leo | https://api.github.com/repos/snowdensb/Leo | opened | CVE-2021-4104 (High) detected in log4j-1.2.17.jar | security vulnerability | ## CVE-2021-4104 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: Leo/core/pom.xml</p>
<p>Path to ... | True | CVE-2021-4104 (High) detected in log4j-1.2.17.jar - ## CVE-2021-4104 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary>
<p>Apache Log4j 1.2</p>
<p>Path ... | secu | cve high detected in jar cve high severity vulnerability vulnerable library jar apache path to dependency file leo core pom xml path to vulnerable library canner repository jar home wss scanner repository jar home wss s... | 1 |
76,658 | 3,490,490,989 | IssuesEvent | 2016-01-04 10:21:03 | JustArchi/ArchiSteamFarm | https://api.github.com/repos/JustArchi/ArchiSteamFarm | closed | Implement inter-process communication | Done Enhancement Low priority Wishlist | I am thinking of some kind of named pipe, which would allow third-party process to communicate with ASF, such as executing functions and other calls.
This is a big big wishlist, probably I'll get down to this only when I have nothing to add anymore, as ASF is supposed to be as transparent as possible and everything ... | 1.0 | Implement inter-process communication - I am thinking of some kind of named pipe, which would allow third-party process to communicate with ASF, such as executing functions and other calls.
This is a big big wishlist, probably I'll get down to this only when I have nothing to add anymore, as ASF is supposed to be as... | non_secu | implement inter process communication i am thinking of some kind of named pipe which would allow third party process to communicate with asf such as executing functions and other calls this is a big big wishlist probably i ll get down to this only when i have nothing to add anymore as asf is supposed to be as... | 0 |
202,705 | 23,096,072,812 | IssuesEvent | 2022-07-26 19:41:20 | elastic/kibana | https://api.github.com/repos/elastic/kibana | closed | [Security Solution] Error displayed when adding an exception with `matches` operator under certain conditions | bug Team:Detections and Resp Team: SecuritySolution Team:Detection Alerts | **Describe the bug:**
- Not able to add an exception with `matches` operator when the field contains an array of values , the `Close all alerts that match this exception` is selected and the value of the field of one of the alerts is composed by an array.
**Kibana/Elasticsearch Stack version:**
- main (96e284fdf49... | True | [Security Solution] Error displayed when adding an exception with `matches` operator under certain conditions - **Describe the bug:**
- Not able to add an exception with `matches` operator when the field contains an array of values , the `Close all alerts that match this exception` is selected and the value of the fie... | secu | error displayed when adding an exception with matches operator under certain conditions describe the bug not able to add an exception with matches operator when the field contains an array of values the close all alerts that match this exception is selected and the value of the field of one of the a... | 1 |
140,658 | 32,044,135,929 | IssuesEvent | 2023-09-22 22:34:32 | jupyterhub/jupyter-server-proxy | https://api.github.com/repos/jupyterhub/jupyter-server-proxy | closed | JupyterLab extension to also be a Notebook 7 extension | new code:jupyterlab-extension | From @bollwyvl in https://github.com/jupyterhub/jupyter-server-proxy/pull/419#issuecomment-1677987290
> If this is worth doing (and it probably is) it should also support Notebook 7, to the best of its abilities. As NB7 doesn't have a launcher, it would need to be ported to a file browser dropdown to stay consistent... | 1.0 | JupyterLab extension to also be a Notebook 7 extension - From @bollwyvl in https://github.com/jupyterhub/jupyter-server-proxy/pull/419#issuecomment-1677987290
> If this is worth doing (and it probably is) it should also support Notebook 7, to the best of its abilities. As NB7 doesn't have a launcher, it would need t... | non_secu | jupyterlab extension to also be a notebook extension from bollwyvl in if this is worth doing and it probably is it should also support notebook to the best of its abilities as doesn t have a launcher it would need to be ported to a file browser dropdown to stay consistent ux wise there is ... | 0 |
9,996 | 7,054,583,974 | IssuesEvent | 2018-01-04 01:48:23 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | opened | distsql: refactor processors to implement RowSource | performance | This issue tracks the work remaining to have all distsql processors implement `RowSource`.
- [ ] `aggregator`
- [ ] `algebraicSetOp`
- [ ] `hashJoiner`
- [ ] `interleavedReaderJoiner`
- [ ] `joinReader`
- [ ] `sorter`
The `*Backfiller` processors are lower priority because they are not involved in user queri... | True | distsql: refactor processors to implement RowSource - This issue tracks the work remaining to have all distsql processors implement `RowSource`.
- [ ] `aggregator`
- [ ] `algebraicSetOp`
- [ ] `hashJoiner`
- [ ] `interleavedReaderJoiner`
- [ ] `joinReader`
- [ ] `sorter`
The `*Backfiller` processors are lowe... | non_secu | distsql refactor processors to implement rowsource this issue tracks the work remaining to have all distsql processors implement rowsource aggregator algebraicsetop hashjoiner interleavedreaderjoiner joinreader sorter the backfiller processors are lower priority b... | 0 |
826,765 | 31,711,352,962 | IssuesEvent | 2023-09-09 10:07:09 | gamefreedomgit/Maelstrom | https://api.github.com/repos/gamefreedomgit/Maelstrom | closed | [Dungeon][Loot] Heroic Last Boss Drops 1 Item Instead of 2 | Loot Status: Confirmed Priority: Medium | [//]: # (REMBEMBER! Add links to things related to the bug using for example:)
[//]: # (http://wowhead.com/)
[//]: # (cata-twinhead.twinstar.cz)
**Description:**
Last bosses in heroic dungeons through RDF feature drop only 1 item, instead of the usual 2.
**How to reproduce:**
Last bosses in any heroic dunge... | 1.0 | [Dungeon][Loot] Heroic Last Boss Drops 1 Item Instead of 2 - [//]: # (REMBEMBER! Add links to things related to the bug using for example:)
[//]: # (http://wowhead.com/)
[//]: # (cata-twinhead.twinstar.cz)
**Description:**
Last bosses in heroic dungeons through RDF feature drop only 1 item, instead of the usual... | non_secu | heroic last boss drops item instead of rembember add links to things related to the bug using for example cata twinhead twinstar cz description last bosses in heroic dungeons through rdf feature drop only item instead of the usual how to reproduce last bosses... | 0 |
177,212 | 21,467,882,205 | IssuesEvent | 2022-04-26 06:41:33 | Soontao/presentations | https://api.github.com/repos/Soontao/presentations | closed | approuter-10.15.1.tgz: 2 vulnerabilities (highest severity is: 7.8) - autoclosed | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>approuter-10.15.1.tgz</b></p></summary>
<p></p>
<p>Path to dependency file: /src/node/cap-training/session-6-example/cap-02/gateway/package.json</p>
<p>Path to vulner... | True | approuter-10.15.1.tgz: 2 vulnerabilities (highest severity is: 7.8) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>approuter-10.15.1.tgz</b></p></summary>
<p></p>
<p>Path to dependency file: /src/no... | secu | approuter tgz vulnerabilities highest severity is autoclosed vulnerable library approuter tgz path to dependency file src node cap training session example cap gateway package json path to vulnerable library src node cap training session example cap gateway node mo... | 1 |
436,367 | 12,550,367,463 | IssuesEvent | 2020-06-06 10:51:37 | googleapis/google-api-java-client-services | https://api.github.com/repos/googleapis/google-api-java-client-services | opened | Synthesis failed for language | api: language autosynth failure priority: p1 type: bug | Hello! Autosynth couldn't regenerate language. :broken_heart:
Here's the output from running `synth.py`:
```
2020-06-06 03:51:29,776 autosynth [INFO] > logs will be written to: /tmpfs/src/github/synthtool/logs/googleapis/google-api-java-client-services
2020-06-06 03:51:30,797 autosynth [DEBUG] > Running: git config -... | 1.0 | Synthesis failed for language - Hello! Autosynth couldn't regenerate language. :broken_heart:
Here's the output from running `synth.py`:
```
2020-06-06 03:51:29,776 autosynth [INFO] > logs will be written to: /tmpfs/src/github/synthtool/logs/googleapis/google-api-java-client-services
2020-06-06 03:51:30,797 autosynth... | non_secu | synthesis failed for language hello autosynth couldn t regenerate language broken heart here s the output from running synth py autosynth logs will be written to tmpfs src github synthtool logs googleapis google api java client services autosynth running git config ... | 0 |
10,738 | 8,153,886,224 | IssuesEvent | 2018-08-23 00:05:11 | bitshares/bitshares-core | https://api.github.com/repos/bitshares/bitshares-core | closed | Change object_id to more than 32 bit | 1a Epic 2a Discussion Needed 3c Enhancement 4b Normal 6 Security 9c Large security | According to the code, `object_id::instance` is `unsigned_int`: https://github.com/bitshares/bitshares-core/blob/af118f697319d473b2547e2b110d0493980ac2b4/libraries/db/include/graphene/db/object_id.hpp#L134
However, `unsigned_int` is actually implemented with `uint32_t` in FC (code is [here](https://github.com/bitsha... | True | Change object_id to more than 32 bit - According to the code, `object_id::instance` is `unsigned_int`: https://github.com/bitshares/bitshares-core/blob/af118f697319d473b2547e2b110d0493980ac2b4/libraries/db/include/graphene/db/object_id.hpp#L134
However, `unsigned_int` is actually implemented with `uint32_t` in FC (c... | secu | change object id to more than bit according to the code object id instance is unsigned int however unsigned int is actually implemented with t in fc code is struct unsigned int t value that means the maximum value is as of writing the obje... | 1 |
24,766 | 4,108,360,590 | IssuesEvent | 2016-06-06 15:52:55 | obenland/shiny-updates | https://api.github.com/repos/obenland/shiny-updates | closed | Make the 'Updating' button ajaxify itself when done | feedback needs testing | I clicked 'update all' and it properly told me that my one plugin was updated, but the green (primary) top/bottom buttons got stuck on updating.

Shouldn't they too change to... | 1.0 | Make the 'Updating' button ajaxify itself when done - I clicked 'update all' and it properly told me that my one plugin was updated, but the green (primary) top/bottom buttons got stuck on updating.
 detected in multiple libraries - autoclosed | security vulnerability | ## CVE-2018-16487 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-0.9.2.tgz</b>, <b>lodash-4.17.5.tgz</b>, <b>lodash-2.4.2.tgz</b>, <b>lodash-1.0.2.tgz</b>, <b>lodash-3.7.0.t... | True | CVE-2018-16487 (Medium) detected in multiple libraries - autoclosed - ## CVE-2018-16487 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-0.9.2.tgz</b>, <b>lodash-4.17.5.tgz</b... | secu | cve medium detected in multiple libraries autoclosed cve medium severity vulnerability vulnerable libraries lodash tgz lodash tgz lodash tgz lodash tgz lodash tgz lodash tgz lodash tgz a utility library delivering consisten... | 1 |
149,997 | 19,597,941,652 | IssuesEvent | 2022-01-05 20:21:15 | shaimael/PrimeFacesAdminLTE | https://api.github.com/repos/shaimael/PrimeFacesAdminLTE | opened | WS-2016-7060 (Medium) detected in primefaces-6.0.jar | security vulnerability | ## WS-2016-7060 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>primefaces-6.0.jar</b></p></summary>
<p>Sonatype helps open source projects to set up Maven repositories on https://os... | True | WS-2016-7060 (Medium) detected in primefaces-6.0.jar - ## WS-2016-7060 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>primefaces-6.0.jar</b></p></summary>
<p>Sonatype helps open sou... | secu | ws medium detected in primefaces jar ws medium severity vulnerability vulnerable library primefaces jar sonatype helps open source projects to set up maven repositories on library home page a href path to dependency file pom xml path to vulnerable library ry org prime... | 1 |
207,996 | 23,538,081,406 | IssuesEvent | 2022-08-20 01:07:01 | microsoft/mu_feature_mm_supv | https://api.github.com/repos/microsoft/mu_feature_mm_supv | closed | Race condition in SmiHandlerProfileUnregisterHandler() that could lead to FreePool() of something that isn't pool allocated | bug impact: security | SmiHandlerProfileUnregisterHandler() is called by ProcessUserHandlerUnreg() which is called by the supervisor when handling SMM_MM_HDL_UNREG_1/SMM_MM_HDL_UNREG_2 syscalls. It takes a guid pointer (as well as a context and context size) provided by user space. It has been inspected with a call to InspectTargetRangeOwner... | True | Race condition in SmiHandlerProfileUnregisterHandler() that could lead to FreePool() of something that isn't pool allocated - SmiHandlerProfileUnregisterHandler() is called by ProcessUserHandlerUnreg() which is called by the supervisor when handling SMM_MM_HDL_UNREG_1/SMM_MM_HDL_UNREG_2 syscalls. It takes a guid pointe... | secu | race condition in smihandlerprofileunregisterhandler that could lead to freepool of something that isn t pool allocated smihandlerprofileunregisterhandler is called by processuserhandlerunreg which is called by the supervisor when handling smm mm hdl unreg smm mm hdl unreg syscalls it takes a guid pointe... | 1 |
218,580 | 24,376,083,595 | IssuesEvent | 2022-10-04 01:06:46 | samq-wsdemo/playgoat | https://api.github.com/repos/samq-wsdemo/playgoat | opened | CVE-2022-42004 (Medium) detected in jackson-databind-2.11.4.jar | security vulnerability | ## CVE-2022-42004 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.11.4.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core strea... | True | CVE-2022-42004 (Medium) detected in jackson-databind-2.11.4.jar - ## CVE-2022-42004 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.11.4.jar</b></p></summary>
<p>G... | secu | cve medium detected in jackson databind jar cve medium severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cac... | 1 |
265,590 | 28,297,950,124 | IssuesEvent | 2023-04-10 01:19:09 | nk7598/linux-4.19.72 | https://api.github.com/repos/nk7598/linux-4.19.72 | closed | CVE-2019-19447 (High) detected in linuxlinux-4.19.269 - autoclosed | Mend: dependency security vulnerability | ## CVE-2019-19447 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.269</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.k... | True | CVE-2019-19447 (High) detected in linuxlinux-4.19.269 - autoclosed - ## CVE-2019-19447 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.269</b></p></summary>
<p>
<p>The ... | secu | cve high detected in linuxlinux autoclosed cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in base branch master vulnerable source files vulnerability details ... | 1 |
61,004 | 14,597,690,032 | IssuesEvent | 2020-12-20 21:16:17 | turkdevops/sourcegraph | https://api.github.com/repos/turkdevops/sourcegraph | opened | CVE-2019-10747 (High) detected in set-value-2.0.0.tgz, set-value-0.4.3.tgz | security vulnerability | ## CVE-2019-10747 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>set-value-2.0.0.tgz</b>, <b>set-value-0.4.3.tgz</b></p></summary>
<p>
<details><summary><b>set-value-2.0.0.tgz</b></... | True | CVE-2019-10747 (High) detected in set-value-2.0.0.tgz, set-value-0.4.3.tgz - ## CVE-2019-10747 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>set-value-2.0.0.tgz</b>, <b>set-value-0.... | secu | cve high detected in set value tgz set value tgz cve high severity vulnerability vulnerable libraries set value tgz set value tgz set value tgz create nested values and any intermediaries using dot notation a b c paths library home page ... | 1 |
386,592 | 26,691,307,800 | IssuesEvent | 2023-01-27 05:24:14 | mkdocstrings/mkdocstrings | https://api.github.com/repos/mkdocstrings/mkdocstrings | closed | Unexpected error when trying to include docstrings from compiled Cython module | documentation error handling faq | **Describe the bug**
I have tried to include the docstring from a function called `getDim` in the `quotonic.fock` module. To do this, I have include `::: quotonic.fock.getDim` in `docs/fock.md`. Unfortunately, when I try to create the documentation, I get the following error:
`ERROR - mkdocstrings: Template 'alias.... | 1.0 | Unexpected error when trying to include docstrings from compiled Cython module - **Describe the bug**
I have tried to include the docstring from a function called `getDim` in the `quotonic.fock` module. To do this, I have include `::: quotonic.fock.getDim` in `docs/fock.md`. Unfortunately, when I try to create the doc... | non_secu | unexpected error when trying to include docstrings from compiled cython module describe the bug i have tried to include the docstring from a function called getdim in the quotonic fock module to do this i have include quotonic fock getdim in docs fock md unfortunately when i try to create the doc... | 0 |
60,753 | 14,592,294,709 | IssuesEvent | 2020-12-19 16:58:51 | kadirselcuk/zaproxy | https://api.github.com/repos/kadirselcuk/zaproxy | opened | CVE-2020-11619 (High) detected in jackson-databind-2.9.2.jar | security vulnerability | ## CVE-2020-11619 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.2.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streamin... | True | CVE-2020-11619 (High) detected in jackson-databind-2.9.2.jar - ## CVE-2020-11619 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.2.jar</b></p></summary>
<p>General... | secu | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file zaproxy buildsrc build gradle k... | 1 |
653,294 | 21,578,976,949 | IssuesEvent | 2022-05-02 16:33:37 | NatSatie/db-banco-letscode | https://api.github.com/repos/NatSatie/db-banco-letscode | closed | Fazer a conversão de validações em Bean Annotations | high priority | - converter as validações em Beans
- Dica: Validação de beans no RestController na aula
- https://www.baeldung.com/spring-boot-bean-validation | 1.0 | Fazer a conversão de validações em Bean Annotations - - converter as validações em Beans
- Dica: Validação de beans no RestController na aula
- https://www.baeldung.com/spring-boot-bean-validation | non_secu | fazer a conversão de validações em bean annotations converter as validações em beans dica validação de beans no restcontroller na aula | 0 |
125,071 | 17,796,079,565 | IssuesEvent | 2021-08-31 22:28:10 | ghc-dev/Kimberly-Harris | https://api.github.com/repos/ghc-dev/Kimberly-Harris | opened | CVE-2019-9740 (Medium) detected in urllib3-1.23-py2.py3-none-any.whl | security vulnerability | ## CVE-2019-9740 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>urllib3-1.23-py2.py3-none-any.whl</b></p></summary>
<p>HTTP library with thread-safe connection pooling, file post, a... | True | CVE-2019-9740 (Medium) detected in urllib3-1.23-py2.py3-none-any.whl - ## CVE-2019-9740 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>urllib3-1.23-py2.py3-none-any.whl</b></p></summ... | secu | cve medium detected in none any whl cve medium severity vulnerability vulnerable library none any whl http library with thread safe connection pooling file post and more library home page a href path to dependency file kimberly harris requirements txt path ... | 1 |
1,293 | 17,378,501,300 | IssuesEvent | 2021-07-31 07:17:25 | ccache/ccache | https://api.github.com/repos/ccache/ccache | closed | ccache 4.3 on MIPS64 does not work | bug help wanted portability | ### How to reproduce ###
<!-- Steps to reproduce the behavior: -->
1. ccache gcc --version
### Actual behavior ###
<!-- What happened? -->
Segmentation fault
### Expected behavior ###
<!-- What did you expect to happen? -->
It working
### Environment ###
<!-- Which ccache version did you use? --... | True | ccache 4.3 on MIPS64 does not work - ### How to reproduce ###
<!-- Steps to reproduce the behavior: -->
1. ccache gcc --version
### Actual behavior ###
<!-- What happened? -->
Segmentation fault
### Expected behavior ###
<!-- What did you expect to happen? -->
It working
### Environment ###
<!--... | non_secu | ccache on does not work how to reproduce ccache gcc version actual behavior segmentation fault expected behavior it working environment ccache version host is a cpu running debian gdb backtrace program received si... | 0 |
482,607 | 13,910,576,418 | IssuesEvent | 2020-10-20 16:14:40 | OpenLiberty/ci.maven | https://api.github.com/repos/OpenLiberty/ci.maven | closed | Skip installing local runtime if starting dev mode for containers | devMode devModeContainers high priority | Skip installing local runtime.
Skip installing features locally.
Applies to both Maven and Gradle. | 1.0 | Skip installing local runtime if starting dev mode for containers - Skip installing local runtime.
Skip installing features locally.
Applies to both Maven and Gradle. | non_secu | skip installing local runtime if starting dev mode for containers skip installing local runtime skip installing features locally applies to both maven and gradle | 0 |
386,515 | 11,440,441,701 | IssuesEvent | 2020-02-05 09:40:19 | sunpy/sunpy | https://api.github.com/repos/sunpy/sunpy | closed | Create a Unit Range object | Effort Medium Feature Request Hacktoberfest Package Novice Priority Low | Should be able to handle any kind of quantities including times such as wavelength, dimensions (e.g. arcsec).
TimeRange would subclass this object.
| 1.0 | Create a Unit Range object - Should be able to handle any kind of quantities including times such as wavelength, dimensions (e.g. arcsec).
TimeRange would subclass this object.
| non_secu | create a unit range object should be able to handle any kind of quantities including times such as wavelength dimensions e g arcsec timerange would subclass this object | 0 |
251,170 | 27,150,951,145 | IssuesEvent | 2023-02-17 01:10:35 | benlazarine/subspace | https://api.github.com/repos/benlazarine/subspace | opened | CVE-2023-0286 (High) detected in cryptography-2.8-cp27-cp27mu-manylinux1_x86_64.whl | security vulnerability | ## CVE-2023-0286 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cryptography-2.8-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary>
<p>cryptography is a package which provides crypto... | True | CVE-2023-0286 (High) detected in cryptography-2.8-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2023-0286 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cryptography-2.8-cp27-cp27mu-manyl... | secu | cve high detected in cryptography whl cve high severity vulnerability vulnerable library cryptography whl cryptography is a package which provides cryptographic recipes and primitives to python developers library home page a href path to dependency file ... | 1 |
73,565 | 7,344,309,050 | IssuesEvent | 2018-03-07 14:19:32 | liquidinvestigations/liquidinvestigations | https://api.github.com/repos/liquidinvestigations/liquidinvestigations | closed | Rephrase titles for AdminUI > Network Configuration | UI in-testing ready | Lan - should specify "Create Wireless Hotspot"
Wan - should specify "Connect to Wireless Network"
So that people understand what each is. | 1.0 | Rephrase titles for AdminUI > Network Configuration - Lan - should specify "Create Wireless Hotspot"
Wan - should specify "Connect to Wireless Network"
So that people understand what each is. | non_secu | rephrase titles for adminui network configuration lan should specify create wireless hotspot wan should specify connect to wireless network so that people understand what each is | 0 |
438,152 | 30,627,757,049 | IssuesEvent | 2023-07-24 12:42:54 | lightbend/kalix-javascript-sdk | https://api.github.com/repos/lightbend/kalix-javascript-sdk | closed | Show how to run docker composed detached | Documentation kalix-proxy DX javascript-sdk | @rstento commented on [Fri Aug 20 2021](https://github.com/lightbend/akkaserverless-java-sdk/issues/229)
From @mckeeh3: In the Run Service Locally / Starting the service section, provide an example and short details for running docker-compose using detached mode. See docker-compose up --help for details.
macOS and ... | 1.0 | Show how to run docker composed detached - @rstento commented on [Fri Aug 20 2021](https://github.com/lightbend/akkaserverless-java-sdk/issues/229)
From @mckeeh3: In the Run Service Locally / Starting the service section, provide an example and short details for running docker-compose using detached mode. See docker-c... | non_secu | show how to run docker composed detached rstento commented on from in the run service locally starting the service section provide an example and short details for running docker compose using detached mode see docker compose up help for details macos and windows docker compose up d linux ... | 0 |
32,219 | 15,284,016,025 | IssuesEvent | 2021-02-23 11:38:38 | keptn/keptn | https://api.github.com/repos/keptn/keptn | closed | Keptn Bridge: Root events are limited to 20 | bridge.2.0 estimate: 0.5 performance | **Environment**
* Client OS (e.g., Linux, OSX, Windows): `Ubuntu 20.04`
* Keptn Version (`keptn version`): `0.8.0-alpha`
* Kubernetes Cloud Provider (e.g., GKE, AKS): `GKE`
* Kubernetes version (`kubectl version`): `v1.16.15-gke.6000`
* Bridge image: `bridge2:0.8.0-dev-PR-3169`
**Affected Component**
* [ ] D... | True | Keptn Bridge: Root events are limited to 20 - **Environment**
* Client OS (e.g., Linux, OSX, Windows): `Ubuntu 20.04`
* Keptn Version (`keptn version`): `0.8.0-alpha`
* Kubernetes Cloud Provider (e.g., GKE, AKS): `GKE`
* Kubernetes version (`kubectl version`): `v1.16.15-gke.6000`
* Bridge image: `bridge2:0.8.0-d... | non_secu | keptn bridge root events are limited to environment client os e g linux osx windows ubuntu keptn version keptn version alpha kubernetes cloud provider e g gke aks gke kubernetes version kubectl version gke bridge image dev pr a... | 0 |
429,652 | 30,085,219,872 | IssuesEvent | 2023-06-29 08:08:01 | Nalini1998/Project_Public | https://api.github.com/repos/Nalini1998/Project_Public | closed | 9. Check it with the incorrect password | documentation enhancement help wanted good first issue question | Try entering an incorrect password and hitting `“Submit”`. Nothing should happen.
Now try entering `“swordfish”`. The website should reveal the **contact info**! | 1.0 | 9. Check it with the incorrect password - Try entering an incorrect password and hitting `“Submit”`. Nothing should happen.
Now try entering `“swordfish”`. The website should reveal the **contact info**! | non_secu | check it with the incorrect password try entering an incorrect password and hitting “submit” nothing should happen now try entering “swordfish” the website should reveal the contact info | 0 |
182,578 | 21,672,954,485 | IssuesEvent | 2022-05-08 08:48:49 | turkdevops/update-electron-app | https://api.github.com/repos/turkdevops/update-electron-app | closed | CVE-2022-21681 (High) detected in marked-2.1.3.tgz - autoclosed | security vulnerability | ## CVE-2022-21681 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-2.1.3.tgz</b></p></summary>
<p>A markdown parser built for speed</p>
<p>Library home page: <a href="https://reg... | True | CVE-2022-21681 (High) detected in marked-2.1.3.tgz - autoclosed - ## CVE-2022-21681 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-2.1.3.tgz</b></p></summary>
<p>A markdown par... | secu | cve high detected in marked tgz autoclosed cve high severity vulnerability vulnerable library marked tgz a markdown parser built for speed library home page a href path to dependency file package json path to vulnerable library node modules marked package json ... | 1 |
4,394 | 2,551,148,113 | IssuesEvent | 2015-02-02 05:59:03 | roundware/roundware-server | https://api.github.com/repos/roundware/roundware-server | opened | RemovedInDjango18Warning in rw/admin.py | low priority | ```
/vagrant/roundware/rw/admin.py:81: RemovedInDjango18Warning: `BaseModelAdmin.queryset` is deprecated, use `get_queryset` instead.
qset = super(admin.ModelAdmin, self).queryset(request)
``` | 1.0 | RemovedInDjango18Warning in rw/admin.py - ```
/vagrant/roundware/rw/admin.py:81: RemovedInDjango18Warning: `BaseModelAdmin.queryset` is deprecated, use `get_queryset` instead.
qset = super(admin.ModelAdmin, self).queryset(request)
``` | non_secu | in rw admin py vagrant roundware rw admin py basemodeladmin queryset is deprecated use get queryset instead qset super admin modeladmin self queryset request | 0 |
225,577 | 7,488,710,062 | IssuesEvent | 2018-04-06 03:12:35 | LeicaSimile/galaxy-cowboys | https://api.github.com/repos/LeicaSimile/galaxy-cowboys | closed | Bug: make next and close button for tooltips functional | bug medium priority | When the player clicks the close button, the tooltip should close. When the player clicks next, the tooltip, should show the next tip. This should work without firing the bullet. | 1.0 | Bug: make next and close button for tooltips functional - When the player clicks the close button, the tooltip should close. When the player clicks next, the tooltip, should show the next tip. This should work without firing the bullet. | non_secu | bug make next and close button for tooltips functional when the player clicks the close button the tooltip should close when the player clicks next the tooltip should show the next tip this should work without firing the bullet | 0 |
446,238 | 12,842,866,536 | IssuesEvent | 2020-07-08 03:09:19 | code4nagoya/covid19 | https://api.github.com/repos/code4nagoya/covid19 | opened | 愛知県HPの検査件数表に「抗原検査」が追加されたことによる対応 | improve priority high | ## 改善詳細 / Details of Improvement
[愛知県HP の 3.愛知県内の検査件数](https://www.pref.aichi.jp/site/covid19-aichi/kansensya-kensa.html) に「抗原検査」の列が追加されました。
それにより以下の事象の影響が発生します。
1. [優先度:高]表形式が発生したことにより(?)、定期自動スクレイピングが失敗している ※1
3. [優先度:低]「検査実施件数」グラフに、抗原検査の検査件数も表現する(「件数」としてなら、PCRと抗原検査の積み上げ防棒グラフでよい?) ※2
元々、検査件数表の情報は「件数」しか使っていま... | 1.0 | 愛知県HPの検査件数表に「抗原検査」が追加されたことによる対応 - ## 改善詳細 / Details of Improvement
[愛知県HP の 3.愛知県内の検査件数](https://www.pref.aichi.jp/site/covid19-aichi/kansensya-kensa.html) に「抗原検査」の列が追加されました。
それにより以下の事象の影響が発生します。
1. [優先度:高]表形式が発生したことにより(?)、定期自動スクレイピングが失敗している ※1
3. [優先度:低]「検査実施件数」グラフに、抗原検査の検査件数も表現する(「件数」としてなら、PCRと抗原検査の積み上げ防棒グラフで... | non_secu | 愛知県hpの検査件数表に「抗原検査」が追加されたことによる対応 改善詳細 details of improvement に「抗原検査」の列が追加されました。 それにより以下の事象の影響が発生します。 表形式が発生したことにより 、定期自動スクレイピングが失敗している ※ 「検査実施件数」グラフに、抗原検査の検査件数も表現する(「件数」としてなら、pcrと抗原検査の積み上げ防棒グラフでよい?) ※ 元々、検査件数表の情報は「件数」しか使っていませんでした(陽性者数は未使用)。そのため他の影響は無いと思います。 ※ ※ ... | 0 |
123,097 | 26,208,737,455 | IssuesEvent | 2023-01-04 02:58:34 | single-cell-data/TileDB-SOMA | https://api.github.com/repos/single-cell-data/TileDB-SOMA | closed | IO-related support code should be in IO package | python-api code-organization | SOMA*NdMatrix has code which only exists to support the `io` package, eg, `from_matrix` and its sub-functions. These should be moved to a sub-package (or into soma.io) and the core classes kept focused & well separated from soma.io.
Example from soma_sparse_nd_array.py:
```
# ---------------
# TODO: most... | 1.0 | IO-related support code should be in IO package - SOMA*NdMatrix has code which only exists to support the `io` package, eg, `from_matrix` and its sub-functions. These should be moved to a sub-package (or into soma.io) and the core classes kept focused & well separated from soma.io.
Example from soma_sparse_nd_array... | non_secu | io related support code should be in io package soma ndmatrix has code which only exists to support the io package eg from matrix and its sub functions these should be moved to a sub package or into soma io and the core classes kept focused well separated from soma io example from soma sparse nd array... | 0 |
14,543 | 17,658,456,385 | IssuesEvent | 2021-08-21 02:39:09 | qgis/QGIS | https://api.github.com/repos/qgis/QGIS | closed | Join attributes by location on large dataset: consumes all memory and crashes | Feedback stale Processing Bug Crash/Data Corruption | <!--
Bug fixing and feature development is a community responsibility, and not the responsibility of the QGIS project alone.
If this bug report or feature request is high-priority for you, we suggest engaging a QGIS developer or support organisation and financially sponsoring a fix
Checklist before submitting
-... | 1.0 | Join attributes by location on large dataset: consumes all memory and crashes - <!--
Bug fixing and feature development is a community responsibility, and not the responsibility of the QGIS project alone.
If this bug report or feature request is high-priority for you, we suggest engaging a QGIS developer or support o... | non_secu | join attributes by location on large dataset consumes all memory and crashes bug fixing and feature development is a community responsibility and not the responsibility of the qgis project alone if this bug report or feature request is high priority for you we suggest engaging a qgis developer or support o... | 0 |
509,015 | 14,710,705,654 | IssuesEvent | 2021-01-05 05:53:04 | wso2/product-microgateway | https://api.github.com/repos/wso2/product-microgateway | closed | QSG is only working in mac | Priority/Normal Type/Bug envoy-gw | ### Description:
<!-- Describe the issue -->
QSG fails on Linux. Due to the configuration in [1].
[1]. https://github.com/wso2/product-microgateway/blob/039c0a106199b9d8bfcebfcfd9240978e34723ab/resources/envoy.yaml#L44
### Steps to reproduce:
Follow QSG in Linux machine
### Affected Product Version:
<!-- M... | 1.0 | QSG is only working in mac - ### Description:
<!-- Describe the issue -->
QSG fails on Linux. Due to the configuration in [1].
[1]. https://github.com/wso2/product-microgateway/blob/039c0a106199b9d8bfcebfcfd9240978e34723ab/resources/envoy.yaml#L44
### Steps to reproduce:
Follow QSG in Linux machine
### Affe... | non_secu | qsg is only working in mac description qsg fails on linux due to the configuration in steps to reproduce follow qsg in linux machine affected product version envoy gw mg environment details with versions os client env docker opt... | 0 |
241,511 | 26,256,818,142 | IssuesEvent | 2023-01-06 02:00:38 | directoryxx/SPD | https://api.github.com/repos/directoryxx/SPD | opened | CVE-2020-28500 (Medium) detected in lodash-4.17.13.tgz | security vulnerability | ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.13.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registr... | True | CVE-2020-28500 (Medium) detected in lodash-4.17.13.tgz - ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.13.tgz</b></p></summary>
<p>Lodash modular util... | secu | cve medium detected in lodash tgz cve medium severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file spd package json path to vulnerable library node modules lodash package json dependency ... | 1 |
90,989 | 15,856,354,201 | IssuesEvent | 2021-04-08 02:08:38 | anakos9/Questributions | https://api.github.com/repos/anakos9/Questributions | opened | CVE-2020-7608 (Medium) detected in yargs-parser-11.1.1.tgz | security vulnerability | ## CVE-2020-7608 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>yargs-parser-11.1.1.tgz</b></p></summary>
<p>the mighty option parser used by yargs</p>
<p>Library home page: <a href... | True | CVE-2020-7608 (Medium) detected in yargs-parser-11.1.1.tgz - ## CVE-2020-7608 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>yargs-parser-11.1.1.tgz</b></p></summary>
<p>the mighty ... | secu | cve medium detected in yargs parser tgz cve medium severity vulnerability vulnerable library yargs parser tgz the mighty option parser used by yargs library home page a href path to dependency file questributions package json path to vulnerable library questribution... | 1 |
157,468 | 19,957,374,974 | IssuesEvent | 2022-01-28 01:57:16 | phunware/phuntoken | https://api.github.com/repos/phunware/phuntoken | closed | WS-2019-0318 (High) detected in handlebars-4.1.2.tgz - autoclosed | security vulnerability | ## WS-2019-0318 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.1.2.tgz</b></p></summary>
<p>Handlebars provides the power necessary to let you build semantic templates ef... | True | WS-2019-0318 (High) detected in handlebars-4.1.2.tgz - autoclosed - ## WS-2019-0318 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.1.2.tgz</b></p></summary>
<p>Handlebars... | secu | ws high detected in handlebars tgz autoclosed ws high severity vulnerability vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file ... | 1 |
372,424 | 26,001,687,708 | IssuesEvent | 2022-12-20 15:47:55 | waldronlab/bugsigdbr | https://api.github.com/repos/waldronlab/bugsigdbr | opened | standard enrichment workflow | documentation | We need somewhere a simple vignette documenting recommended standard enrichment workflows using bugsigdb. It could include:
1. (lower priority): data preparation from a couple of the most popular Bioinformatics pipelines
2. differential abundance analysis
3. creating a table of enrichment analysis results
Some ... | 1.0 | standard enrichment workflow - We need somewhere a simple vignette documenting recommended standard enrichment workflows using bugsigdb. It could include:
1. (lower priority): data preparation from a couple of the most popular Bioinformatics pipelines
2. differential abundance analysis
3. creating a table of enric... | non_secu | standard enrichment workflow we need somewhere a simple vignette documenting recommended standard enrichment workflows using bugsigdb it could include lower priority data preparation from a couple of the most popular bioinformatics pipelines differential abundance analysis creating a table of enric... | 0 |
37,188 | 12,473,793,933 | IssuesEvent | 2020-05-29 08:29:44 | Kalskiman/gentelella | https://api.github.com/repos/Kalskiman/gentelella | opened | WS-2017-0107 (High) detected in ws-0.4.32.tgz | security vulnerability | ## WS-2017-0107 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ws-0.4.32.tgz</b></p></summary>
<p>simple to use, blazing fast and thoroughly tested websocket client, server and consol... | True | WS-2017-0107 (High) detected in ws-0.4.32.tgz - ## WS-2017-0107 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ws-0.4.32.tgz</b></p></summary>
<p>simple to use, blazing fast and thoro... | secu | ws high detected in ws tgz ws high severity vulnerability vulnerable library ws tgz simple to use blazing fast and thoroughly tested websocket client server and console for node js up to date against rfc library home page a href path to dependency file tmp ws scm ... | 1 |
120,981 | 4,803,338,130 | IssuesEvent | 2016-11-02 09:48:34 | Kunstmaan/KunstmaanBundlesCMS | https://api.github.com/repos/Kunstmaan/KunstmaanBundlesCMS | closed | Request: unique constraint for Redirect | Priority: Low Profile: Backend Target audience: Developers Type: Feature | Hello, what do you think of having Unique constraint for `Redirect` entity on fields `domain`, `origin`, `target`?
https://github.com/Kunstmaan/KunstmaanRedirectBundle/blob/sf3/Entity/Redirect.php
| 1.0 | Request: unique constraint for Redirect - Hello, what do you think of having Unique constraint for `Redirect` entity on fields `domain`, `origin`, `target`?
https://github.com/Kunstmaan/KunstmaanRedirectBundle/blob/sf3/Entity/Redirect.php
| non_secu | request unique constraint for redirect hello what do you think of having unique constraint for redirect entity on fields domain origin target | 0 |
15,368 | 10,309,674,539 | IssuesEvent | 2019-08-29 13:45:27 | kyma-project/kyma | https://api.github.com/repos/kyma-project/kyma | closed | Upgrade istio to 1.2.4 | area/service-mesh enhancement security/high | <!-- Thank you for your contribution. Before you submit the issue:
1. Search open and closed issues for duplicates.
2. Read the contributing guidelines.
-->
**Description**
According to https://istio.io/blog/2019/istio-security-003-004/ we should update istio to 1.2.4
<!-- Provide a clear and concise descrip... | 1.0 | Upgrade istio to 1.2.4 - <!-- Thank you for your contribution. Before you submit the issue:
1. Search open and closed issues for duplicates.
2. Read the contributing guidelines.
-->
**Description**
According to https://istio.io/blog/2019/istio-security-003-004/ we should update istio to 1.2.4
<!-- Provide a ... | non_secu | upgrade istio to thank you for your contribution before you submit the issue search open and closed issues for duplicates read the contributing guidelines description according to we should update istio to reasons it s a security issue with overall score ... | 0 |
433,046 | 12,501,150,170 | IssuesEvent | 2020-06-02 00:22:32 | eclipse-ee4j/glassfish | https://api.github.com/repos/eclipse-ee4j/glassfish | closed | Spurious directory creation | Component: installation ERR: Assignee Priority: Minor Stale Type: Bug | If you choose a non-standard install directory on Unix (I'm using a Mac), such as:
/home/driscoll/Work/glassfishv3-b68
the installer will **still** create a directory in your home dir anyway, like so:
/home/driscoll/glassfishv3
While not a critical bug (the directory is empty, and everything works) it looks
sloppy.... | 1.0 | Spurious directory creation - If you choose a non-standard install directory on Unix (I'm using a Mac), such as:
/home/driscoll/Work/glassfishv3-b68
the installer will **still** create a directory in your home dir anyway, like so:
/home/driscoll/glassfishv3
While not a critical bug (the directory is empty, and ever... | non_secu | spurious directory creation if you choose a non standard install directory on unix i m using a mac such as home driscoll work the installer will still create a directory in your home dir anyway like so home driscoll while not a critical bug the directory is empty and everything works it looks... | 0 |
171,878 | 21,002,815,215 | IssuesEvent | 2022-03-29 19:12:52 | elastic/kibana | https://api.github.com/repos/elastic/kibana | opened | Change session expiration to override on app leave behavior | bug good first issue Team:Security Feature:Security/Session Management | Depends on: #114225
When your session times out, it's supposed to redirect you to the "logout" route, which logs you out and redirects you again to the login page.
The current app's `onAppLeave` behavior can prevent this from occurring (such as in Lens when you have unsaved changes), so when your session expires, i... | True | Change session expiration to override on app leave behavior - Depends on: #114225
When your session times out, it's supposed to redirect you to the "logout" route, which logs you out and redirects you again to the login page.
The current app's `onAppLeave` behavior can prevent this from occurring (such as in Lens w... | secu | change session expiration to override on app leave behavior depends on when your session times out it s supposed to redirect you to the logout route which logs you out and redirects you again to the login page the current app s onappleave behavior can prevent this from occurring such as in lens when y... | 1 |
327,904 | 28,088,975,717 | IssuesEvent | 2023-03-30 11:48:34 | redpanda-data/redpanda | https://api.github.com/repos/redpanda-data/redpanda | opened | Check controller log size at end of integration tests | kind/enhance area/tests | This will not help with issues with external tools that really do write huge numbers of records, but it will ensure we are catching any in-redpanda bugs that might spew too many records to the controller log. | 1.0 | Check controller log size at end of integration tests - This will not help with issues with external tools that really do write huge numbers of records, but it will ensure we are catching any in-redpanda bugs that might spew too many records to the controller log. | non_secu | check controller log size at end of integration tests this will not help with issues with external tools that really do write huge numbers of records but it will ensure we are catching any in redpanda bugs that might spew too many records to the controller log | 0 |
397,036 | 11,717,447,603 | IssuesEvent | 2020-03-09 17:16:34 | bcgov/entity | https://api.github.com/repos/bcgov/entity | opened | Correction Filings - Self Service - UI DESIGN | ENTITY Priority2 UX | Users will be able to correct information about their entity (Director information, Registered and Records Office Addresses, Dates etc.)
Wireframes:
Visual Design:
Requirements:
| 1.0 | Correction Filings - Self Service - UI DESIGN - Users will be able to correct information about their entity (Director information, Registered and Records Office Addresses, Dates etc.)
Wireframes:
Visual Design:
Requirements:
| non_secu | correction filings self service ui design users will be able to correct information about their entity director information registered and records office addresses dates etc wireframes visual design requirements | 0 |
34,521 | 12,291,548,886 | IssuesEvent | 2020-05-10 10:34:44 | varora1406/csv-parser | https://api.github.com/repos/varora1406/csv-parser | opened | WS-2018-0232 (Medium) detected in underscore.string-2.2.1.tgz | security vulnerability | ## WS-2018-0232 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore.string-2.2.1.tgz</b></p></summary>
<p>String manipulation extensions for Underscore.js javascript library.<... | True | WS-2018-0232 (Medium) detected in underscore.string-2.2.1.tgz - ## WS-2018-0232 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore.string-2.2.1.tgz</b></p></summary>
<p>Strin... | secu | ws medium detected in underscore string tgz ws medium severity vulnerability vulnerable library underscore string tgz string manipulation extensions for underscore js javascript library library home page a href path to dependency file tmp ws scm csv parser package jso... | 1 |
274,052 | 29,866,162,311 | IssuesEvent | 2023-06-20 04:11:22 | Chiencc/asuswrt-gt-ac5300 | https://api.github.com/repos/Chiencc/asuswrt-gt-ac5300 | closed | linux-yocto-devv2.6.34.10: 5 vulnerabilities (highest severity is: 7.8) - autoclosed | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-devv2.6.34.10</b></p></summary>
<p>
<p>Linux Embedded Kernel - tracks the next mainline release</p>
<p>Library home page: <a href=https://git.yoctoproject... | True | linux-yocto-devv2.6.34.10: 5 vulnerabilities (highest severity is: 7.8) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-devv2.6.34.10</b></p></summary>
<p>
<p>Linux Embedded Kernel - trac... | secu | linux yocto vulnerabilities highest severity is autoclosed vulnerable library linux yocto linux embedded kernel tracks the next mainline release library home page a href found in head commit a href vulnerable source files release src rt... | 1 |
252,581 | 27,245,877,494 | IssuesEvent | 2023-02-22 01:56:02 | rvvergara/react-native-blog | https://api.github.com/repos/rvvergara/react-native-blog | opened | CVE-2021-23440 (High) detected in set-value-2.0.1.tgz | security vulnerability | ## CVE-2021-23440 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>set-value-2.0.1.tgz</b></p></summary>
<p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) pa... | True | CVE-2021-23440 (High) detected in set-value-2.0.1.tgz - ## CVE-2021-23440 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>set-value-2.0.1.tgz</b></p></summary>
<p>Create nested values ... | secu | cve high detected in set value tgz cve high severity vulnerability vulnerable library set value tgz create nested values and any intermediaries using dot notation a b c paths library home page a href path to dependency file package json path to vulnerable libr... | 1 |
124,517 | 4,923,906,866 | IssuesEvent | 2016-11-25 12:10:13 | trupti-dhall/Harman | https://api.github.com/repos/trupti-dhall/Harman | opened | On clicking on the images the pop ups are showing | bug Priority2 | Step 1 : Navigate to the url: http://wipro48ocphrfau.devcloud.acquia-sites.com/user
Step 2 : Login as editor. editor/wipro@123
Step 3 : Navigate to the url: https://wipro48ocphrfau.devcloud.acquia-sites.com/recognition
Step 4 : In device Ipad. Iphone
Step 5 : It is observed that on clicking on the images the pop up... | 1.0 | On clicking on the images the pop ups are showing - Step 1 : Navigate to the url: http://wipro48ocphrfau.devcloud.acquia-sites.com/user
Step 2 : Login as editor. editor/wipro@123
Step 3 : Navigate to the url: https://wipro48ocphrfau.devcloud.acquia-sites.com/recognition
Step 4 : In device Ipad. Iphone
Step 5 : It i... | non_secu | on clicking on the images the pop ups are showing step navigate to the url step login as editor editor wipro step navigate to the url step in device ipad iphone step it is observed that on clicking on the images the pop ups are showing but not on the links please check in china ... | 0 |
282,243 | 21,315,474,638 | IssuesEvent | 2022-04-16 07:35:42 | nnmoq/pe | https://api.github.com/repos/nnmoq/pe | opened | Implementation Section of DG | severity.VeryLow type.DocumentationBug | All of the features says they are proposed. Does that mean they are not implemented?
<!--session: 1650087570543-0f118b3c-2e61-4ac3-a33f-8e2b67b468f6-->
<!--Version: Web v3.4.2--> | 1.0 | Implementation Section of DG - All of the features says they are proposed. Does that mean they are not implemented?
<!--session: 1650087570543-0f118b3c-2e61-4ac3-a33f-8e2b67b468f6-->
<!--Version: Web v3.4.2--> | non_secu | implementation section of dg all of the features says they are proposed does that mean they are not implemented | 0 |
283,847 | 30,913,560,428 | IssuesEvent | 2023-08-05 02:14:45 | hshivhare67/kernel_v4.19.72 | https://api.github.com/repos/hshivhare67/kernel_v4.19.72 | reopened | CVE-2020-27835 (Medium) detected in linuxlinux-4.19.282 | Mend: dependency security vulnerability | ## CVE-2020-27835 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.282</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge... | True | CVE-2020-27835 (Medium) detected in linuxlinux-4.19.282 - ## CVE-2020-27835 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.282</b></p></summary>
<p>
<p>The Linux Ker... | secu | cve medium detected in linuxlinux cve medium severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch master vulnerable source files drivers infi... | 1 |
436,223 | 30,542,511,094 | IssuesEvent | 2023-07-19 23:05:31 | WordPress/performance | https://api.github.com/repos/WordPress/performance | closed | Link to new Persistent Object Caching documentation from Autoloaded Options health check | duplicate [Type] Documentation [Focus] Site Health LEGACY Performance Lab Plugin | As discussed in #234 and being reviewed in #448, once the new Persistent Object Caching section is ready and added, add a link to it in the [autoloaded options](https://wordpress.org/support/article/optimization/#autoloaded-options) section:
Add a third one-sentence paragraph: "If you use a Persistent Object Cache, ... | 1.0 | Link to new Persistent Object Caching documentation from Autoloaded Options health check - As discussed in #234 and being reviewed in #448, once the new Persistent Object Caching section is ready and added, add a link to it in the [autoloaded options](https://wordpress.org/support/article/optimization/#autoloaded-optio... | non_secu | link to new persistent object caching documentation from autoloaded options health check as discussed in and being reviewed in once the new persistent object caching section is ready and added add a link to it in the section add a third one sentence paragraph if you use a persistent object cache op... | 0 |
236,340 | 26,004,316,743 | IssuesEvent | 2022-12-20 17:51:21 | ghc-dev/3046595_2171 | https://api.github.com/repos/ghc-dev/3046595_2171 | opened | PyYAML-5.3.1.tar.gz: 1 vulnerabilities (highest severity is: 9.8) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>PyYAML-5.3.1.tar.gz</b></p></summary>
<p>YAML parser and emitter for Python</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/64/c2/b80047c7a... | True | PyYAML-5.3.1.tar.gz: 1 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>PyYAML-5.3.1.tar.gz</b></p></summary>
<p>YAML parser and emitter for Python</p>
<p>Library home pa... | secu | pyyaml tar gz vulnerabilities highest severity is vulnerable library pyyaml tar gz yaml parser and emitter for python library home page a href path to dependency file requirements txt path to vulnerable library requirements txt found in head commit a href ... | 1 |
130,457 | 18,156,834,813 | IssuesEvent | 2021-09-27 03:31:10 | LaudateCorpus1/qr1 | https://api.github.com/repos/LaudateCorpus1/qr1 | opened | CVE-2019-8331 (Medium) detected in bootstrap-3.3.7.min.js | security vulnerability | ## CVE-2019-8331 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.7.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile fi... | True | CVE-2019-8331 (Medium) detected in bootstrap-3.3.7.min.js - ## CVE-2019-8331 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.7.min.js</b></p></summary>
<p>The most popu... | secu | cve medium detected in bootstrap min js cve medium severity vulnerability vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library metadata ... | 1 |
17,256 | 9,991,823,751 | IssuesEvent | 2019-07-11 12:05:57 | sudopower/opensupports | https://api.github.com/repos/sudopower/opensupports | closed | CVE-2015-9251 (Medium) detected in jquery-2.1.1.tgz | security vulnerability | ## CVE-2015-9251 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.1.1.tgz</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https:... | True | CVE-2015-9251 (Medium) detected in jquery-2.1.1.tgz - ## CVE-2015-9251 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.1.1.tgz</b></p></summary>
<p>JavaScript library for DO... | secu | cve medium detected in jquery tgz cve medium severity vulnerability vulnerable library jquery tgz javascript library for dom operations library home page a href path to dependency file opensupports client package json path to vulnerable library opensupports client ... | 1 |
757,680 | 26,524,284,625 | IssuesEvent | 2023-01-19 07:12:07 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | www.beatport.com - site is not usable | browser-firefox priority-normal engine-gecko | <!-- @browser: Firefox 109.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/109.0 -->
<!-- @reported_with: unknown -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/117005 -->
**URL**: https://www.beatport.com/
**Browser / Version**: Firefox 109.0
**Op... | 1.0 | www.beatport.com - site is not usable - <!-- @browser: Firefox 109.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/109.0 -->
<!-- @reported_with: unknown -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/117005 -->
**URL**: https://www.beatport.com/
*... | non_secu | site is not usable url browser version firefox operating system windows tested another browser yes edge problem type site is not usable description missing items steps to reproduce firefox updated to the latest version and now the top nav is missing from th... | 0 |
9,981 | 7,870,988,224 | IssuesEvent | 2018-06-25 05:47:32 | nextcloud/server | https://api.github.com/repos/nextcloud/server | closed | All files get Password protected if user saves password on the browser | bug feature: sharing needs info security | ### Steps to reproduce
1. Login in nextcloud
2. Save password in the browser
3. Share a file with someoneelse
### Expected behaviour
Be able to select another user other than yourself and not protect with password
### Actual behaviour
Selected user for sharing is always yourself and the file is protected wi... | True | All files get Password protected if user saves password on the browser - ### Steps to reproduce
1. Login in nextcloud
2. Save password in the browser
3. Share a file with someoneelse
### Expected behaviour
Be able to select another user other than yourself and not protect with password
### Actual behaviour
... | secu | all files get password protected if user saves password on the browser steps to reproduce login in nextcloud save password in the browser share a file with someoneelse expected behaviour be able to select another user other than yourself and not protect with password actual behaviour ... | 1 |
51,933 | 13,687,243,298 | IssuesEvent | 2020-09-30 09:49:41 | kinvolk/lokomotive | https://api.github.com/repos/kinvolk/lokomotive | opened | Use sensitive_content when writing content of private keys in Terraform code | area/security kind/enhancement | So if one removes assets directory, private keys do not get printed to the console. | True | Use sensitive_content when writing content of private keys in Terraform code - So if one removes assets directory, private keys do not get printed to the console. | secu | use sensitive content when writing content of private keys in terraform code so if one removes assets directory private keys do not get printed to the console | 1 |
103,495 | 16,602,898,545 | IssuesEvent | 2021-06-01 22:13:59 | gms-ws-sandbox/nibrs | https://api.github.com/repos/gms-ws-sandbox/nibrs | opened | CVE-2020-36187 (High) detected in multiple libraries | security vulnerability | ## CVE-2020-36187 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.9.5.jar</b>, <b>jackson-databind-2.9.6.jar</b>, <b>jackson-databind-2.9.8.jar</b>, <b>jackson-data... | True | CVE-2020-36187 (High) detected in multiple libraries - ## CVE-2020-36187 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.9.5.jar</b>, <b>jackson-databind-2.9.6.jar<... | secu | cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackso... | 1 |
8,384 | 7,272,704,653 | IssuesEvent | 2018-02-21 00:28:41 | freedomofpress/securedrop | https://api.github.com/repos/freedomofpress/securedrop | closed | Use monitoring server to check integrity of site pages | ops/deployment security | We should run a script on the monitoring server (or a separate server) that periodically downloads SecureDrop pages over fresh tor circuits and check whether they've been tampered with. It's been suggested that this server terminate the power supply of the App Server immediately when it detects an attack.
This would a... | True | Use monitoring server to check integrity of site pages - We should run a script on the monitoring server (or a separate server) that periodically downloads SecureDrop pages over fresh tor circuits and check whether they've been tampered with. It's been suggested that this server terminate the power supply of the App Se... | secu | use monitoring server to check integrity of site pages we should run a script on the monitoring server or a separate server that periodically downloads securedrop pages over fresh tor circuits and check whether they ve been tampered with it s been suggested that this server terminate the power supply of the app se... | 1 |
38,350 | 15,647,235,605 | IssuesEvent | 2021-03-23 02:47:55 | microsoft/PSRule.Rules.Azure | https://api.github.com/repos/microsoft/PSRule.Rules.Azure | opened | Update Azure.AKS.Version to 1.19.7 | rule: azure-kubernetes-service | # Rule request
## Suggested rule change
Update rule `Azure.AKS.Version` to 1.19.7.
## Applies to the following
The rule applies to the following:
- Resource type: **Microsoft.ContainerService/managedClusters**
| 1.0 | Update Azure.AKS.Version to 1.19.7 - # Rule request
## Suggested rule change
Update rule `Azure.AKS.Version` to 1.19.7.
## Applies to the following
The rule applies to the following:
- Resource type: **Microsoft.ContainerService/managedClusters**
| non_secu | update azure aks version to rule request suggested rule change update rule azure aks version to applies to the following the rule applies to the following resource type microsoft containerservice managedclusters | 0 |
200,778 | 22,841,804,917 | IssuesEvent | 2022-07-12 23:02:28 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | closed | Add X509ChainPolicy to SslOptions | api-approved area-System.Net.Security in-pr | ### Background and motivation
When TLS handshake is completed SslStream does peer certificate validation. This happens always on client and it can happen on server if client cert is provided. This process can for example download additional certificates over network and there is no way how caller can impact the proc... | True | Add X509ChainPolicy to SslOptions - ### Background and motivation
When TLS handshake is completed SslStream does peer certificate validation. This happens always on client and it can happen on server if client cert is provided. This process can for example download additional certificates over network and there is n... | secu | add to ssloptions background and motivation when tls handshake is completed sslstream does peer certificate validation this happens always on client and it can happen on server if client cert is provided this process can for example download additional certificates over network and there is no way how call... | 1 |
134,094 | 18,421,773,587 | IssuesEvent | 2021-10-13 16:54:17 | daniel-brown-ws-test/verademo | https://api.github.com/repos/daniel-brown-ws-test/verademo | closed | CVE-2020-5421 (Medium) detected in spring-web-5.2.7.RELEASE.jar | security vulnerability IaC violation | ## CVE-2020-5421 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-5.2.7.RELEASE.jar</b></p></summary>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/sp... | True | CVE-2020-5421 (Medium) detected in spring-web-5.2.7.RELEASE.jar - ## CVE-2020-5421 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-5.2.7.RELEASE.jar</b></p></summary>
<p>S... | secu | cve medium detected in spring web release jar cve medium severity vulnerability vulnerable library spring web release jar spring web library home page a href path to dependency file verademo app pom xml path to vulnerable library home wss scanner repository org s... | 1 |
198,011 | 22,617,835,891 | IssuesEvent | 2022-06-30 01:14:00 | turkdevops/node | https://api.github.com/repos/turkdevops/node | opened | CVE-2022-2218 (High) detected in parse-url-6.0.0.tgz | security vulnerability | ## CVE-2022-2218 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>parse-url-6.0.0.tgz</b></p></summary>
<p>An advanced url parser supporting git urls too.</p>
<p>Library home page: <a h... | True | CVE-2022-2218 (High) detected in parse-url-6.0.0.tgz - ## CVE-2022-2218 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>parse-url-6.0.0.tgz</b></p></summary>
<p>An advanced url parser ... | secu | cve high detected in parse url tgz cve high severity vulnerability vulnerable library parse url tgz an advanced url parser supporting git urls too library home page a href path to dependency file deps npm docs package json path to vulnerable library deps npm docs ... | 1 |
127,249 | 18,010,359,020 | IssuesEvent | 2021-09-16 07:53:26 | maddyCode23/linux-4.1.15 | https://api.github.com/repos/maddyCode23/linux-4.1.15 | opened | CVE-2019-19049 (High) detected in linuxv4.4.3 | security vulnerability | ## CVE-2019-19049 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv4.4.3</b></p></summary>
<p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/kees/l... | True | CVE-2019-19049 (High) detected in linuxv4.4.3 - ## CVE-2019-19049 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv4.4.3</b></p></summary>
<p>
<p>Library home page: <a href=https:... | secu | cve high detected in cve high severity vulnerability vulnerable library library home page a href found in head commit a href vulnerable source files drivers of unittest c drivers of unittest c vulnerability detail... | 1 |
412,969 | 12,058,898,698 | IssuesEvent | 2020-04-15 18:17:16 | AugurProject/augur | https://api.github.com/repos/AugurProject/augur | opened | Transfer Modal Copy upgrade | Needed for V2 launch Priority: High | The new Transfer button which brings up the Modal still Says Withdraw funds in it
Need to change Withdraw to Transfer | 1.0 | Transfer Modal Copy upgrade - The new Transfer button which brings up the Modal still Says Withdraw funds in it
Need to change Withdraw to Transfer | non_secu | transfer modal copy upgrade the new transfer button which brings up the modal still says withdraw funds in it need to change withdraw to transfer | 0 |
44,195 | 23,518,635,246 | IssuesEvent | 2022-08-19 01:44:56 | sourcegraph/sourcegraph | https://api.github.com/repos/sourcegraph/sourcegraph | opened | Introduce abstractions to bind HTTP request tracing spans to React component spans | team/frontend-platform UI performance observability | We need to introduce abstractions that would allow us to easily bind HTTP request tracing spans created by React components to React component spans. Currently, it's done via imperative APIs provided by `@opentelemetry` packages. It complicates the code and makes it harder to create the correct trace structure.
Pos... | True | Introduce abstractions to bind HTTP request tracing spans to React component spans - We need to introduce abstractions that would allow us to easily bind HTTP request tracing spans created by React components to React component spans. Currently, it's done via imperative APIs provided by `@opentelemetry` packages. It c... | non_secu | introduce abstractions to bind http request tracing spans to react component spans we need to introduce abstractions that would allow us to easily bind http request tracing spans created by react components to react component spans currently it s done via imperative apis provided by opentelemetry packages it c... | 0 |
360,812 | 10,697,549,818 | IssuesEvent | 2019-10-23 16:45:29 | containous/traefik | https://api.github.com/repos/containous/traefik | closed | Homogenization of the providers | area/provider kind/enhancement priority/P2 | ### Do you want to request a *feature* or report a *bug*?
feature
### What did you do?
Have the same possibility for each provider.
### Details
1. [x] split build configuration and provide
- Docker, Eureka, k8s, Marathon, Rancher, Mesos, ECS: #2518
- KV (BoldDB, Consul, Etcd, ZK): #2616
1. [x] h... | 1.0 | Homogenization of the providers - ### Do you want to request a *feature* or report a *bug*?
feature
### What did you do?
Have the same possibility for each provider.
### Details
1. [x] split build configuration and provide
- Docker, Eureka, k8s, Marathon, Rancher, Mesos, ECS: #2518
- KV (BoldDB, ... | non_secu | homogenization of the providers do you want to request a feature or report a bug feature what did you do have the same possibility for each provider details split build configuration and provide docker eureka marathon rancher mesos ecs kv bolddb consul ... | 0 |
267,256 | 8,380,950,930 | IssuesEvent | 2018-10-07 19:48:55 | wevote/WeVoteServer | https://api.github.com/repos/wevote/WeVoteServer | opened | Force recount once per 24 hours when voter returns, positionsCountForAllBallotItems | Difficulty: Medium Priority 2 | def positions_count_for_all_ballot_items_view(request): # positionsCountForAllBallotItems
When the API positionsCountForAllBallotItems is called:
- If a "force" hasn't happened in the last 24 hours
- set off an independent process (that the current API call doesn't wait for) where we:
- run calculate_positions... | 1.0 | Force recount once per 24 hours when voter returns, positionsCountForAllBallotItems - def positions_count_for_all_ballot_items_view(request): # positionsCountForAllBallotItems
When the API positionsCountForAllBallotItems is called:
- If a "force" hasn't happened in the last 24 hours
- set off an independent pro... | non_secu | force recount once per hours when voter returns positionscountforallballotitems def positions count for all ballot items view request positionscountforallballotitems when the api positionscountforallballotitems is called if a force hasn t happened in the last hours set off an independent proce... | 0 |
183,172 | 6,677,949,968 | IssuesEvent | 2017-10-05 12:38:11 | ODIQueensland/data-curator | https://api.github.com/repos/ODIQueensland/data-curator | closed | Guess Column Properties - Ignore Missing Values? | env:MacOS env:Windows fn:Guess-Properties priority:Medium problem:Bug | ### Expected Behaviour
When guessing column properties, ignore missing values
### Current Behaviour
a column with dd/mm/yyyy or null values should be guessed to be a type: date and format: any and depending on tableschema.js capabilties perhaps guess the pattern %d/%m/%Y
<img width="1076" alt="screenshot 201... | 1.0 | Guess Column Properties - Ignore Missing Values? - ### Expected Behaviour
When guessing column properties, ignore missing values
### Current Behaviour
a column with dd/mm/yyyy or null values should be guessed to be a type: date and format: any and depending on tableschema.js capabilties perhaps guess the patter... | non_secu | guess column properties ignore missing values expected behaviour when guessing column properties ignore missing values current behaviour a column with dd mm yyyy or null values should be guessed to be a type date and format any and depending on tableschema js capabilties perhaps guess the patter... | 0 |
9,006 | 23,962,211,616 | IssuesEvent | 2022-09-12 20:14:00 | MicrosoftDocs/architecture-center | https://api.github.com/repos/MicrosoftDocs/architecture-center | closed | "Azure Cosmos DB SQL API" is listed as a reference for section "Document Databases" | doc-enhancement assigned-to-author triaged architecture-center/svc Pri2 guide/subsvc | You may want to reconsider and link to a document-oriented API instead.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: e40cb85c-ee53-7b49-0622-bed8ebedea81
* Version Independent ID: 896e0838-dfd1-c442-414d-ad9ea6dc8f7d
* Content:... | 1.0 | "Azure Cosmos DB SQL API" is listed as a reference for section "Document Databases" - You may want to reconsider and link to a document-oriented API instead.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: e40cb85c-ee53-7b49-0622-be... | non_secu | azure cosmos db sql api is listed as a reference for section document databases you may want to reconsider and link to a document oriented api instead document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version indep... | 0 |
98,878 | 4,038,874,667 | IssuesEvent | 2016-05-20 00:30:08 | rettigs/cs-senior-capstone | https://api.github.com/repos/rettigs/cs-senior-capstone | closed | Date range isn't actually a range | bug priority:medium | For example, if you want lights to be on from May 29th to June 1st, it would create a rule like this:
`(month >= 5 and month <= 6 and day >= 29 and day <= 1)`
This is impossible, and the light would never turn on. | 1.0 | Date range isn't actually a range - For example, if you want lights to be on from May 29th to June 1st, it would create a rule like this:
`(month >= 5 and month <= 6 and day >= 29 and day <= 1)`
This is impossible, and the light would never turn on. | non_secu | date range isn t actually a range for example if you want lights to be on from may to june it would create a rule like this month and month and day this is impossible and the light would never turn on | 0 |
23,303 | 10,869,035,486 | IssuesEvent | 2019-11-15 06:14:16 | nycbeardo/nycbeardo.github.io | https://api.github.com/repos/nycbeardo/nycbeardo.github.io | closed | CVE-2012-6708 (Medium) detected in jquery-1.7.1.min.js | security vulnerability | ## CVE-2012-6708 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.1.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="htt... | True | CVE-2012-6708 (Medium) detected in jquery-1.7.1.min.js - ## CVE-2012-6708 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.1.min.js</b></p></summary>
<p>JavaScript library ... | secu | cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file tmp ws scm nycbeardo github io resume node modules vm browserify example run i... | 1 |
79,972 | 15,586,253,969 | IssuesEvent | 2021-03-18 01:31:22 | Baneeishaque/spring-boot-students | https://api.github.com/repos/Baneeishaque/spring-boot-students | opened | CVE-2021-25329 (High) detected in tomcat-embed-core-9.0.35.jar | security vulnerability | ## CVE-2021-25329 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-9.0.35.jar</b></p></summary>
<p>Core Tomcat implementation</p>
<p>Library home page: <a href="https:... | True | CVE-2021-25329 (High) detected in tomcat-embed-core-9.0.35.jar - ## CVE-2021-25329 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-9.0.35.jar</b></p></summary>
<p>Cor... | secu | cve high detected in tomcat embed core jar cve high severity vulnerability vulnerable library tomcat embed core jar core tomcat implementation library home page a href path to dependency file spring boot students pom xml path to vulnerable library root repository... | 1 |
260,012 | 8,202,950,071 | IssuesEvent | 2018-09-02 15:37:26 | tideland/gotrace | https://api.github.com/repos/tideland/gotrace | opened | Add polling monitor based on interface | Priority: Normal Status: Available Type: Enhancement | - Interface returns ID and retrieved value (from system or application)
- Instances of interface implementation can be registered
- Ticker based retrieval of values, caching in map
- Requests retrieve list of ID-value-pairs | 1.0 | Add polling monitor based on interface - - Interface returns ID and retrieved value (from system or application)
- Instances of interface implementation can be registered
- Ticker based retrieval of values, caching in map
- Requests retrieve list of ID-value-pairs | non_secu | add polling monitor based on interface interface returns id and retrieved value from system or application instances of interface implementation can be registered ticker based retrieval of values caching in map requests retrieve list of id value pairs | 0 |
101,927 | 16,534,953,208 | IssuesEvent | 2021-05-27 10:42:27 | mohammedafzal37096/Vulnerablenode | https://api.github.com/repos/mohammedafzal37096/Vulnerablenode | opened | CVE-2017-16119 (High) detected in fresh-0.3.0.tgz | security vulnerability | ## CVE-2017-16119 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>fresh-0.3.0.tgz</b></p></summary>
<p>HTTP response freshness testing</p>
<p>Library home page: <a href="https://regist... | True | CVE-2017-16119 (High) detected in fresh-0.3.0.tgz - ## CVE-2017-16119 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>fresh-0.3.0.tgz</b></p></summary>
<p>HTTP response freshness testi... | secu | cve high detected in fresh tgz cve high severity vulnerability vulnerable library fresh tgz http response freshness testing library home page a href path to dependency file vulnerablenode package json path to vulnerable library vulnerablenode node modules fresh packa... | 1 |
2,766 | 5,532,619,976 | IssuesEvent | 2017-03-21 11:06:22 | vimperator/vimperator-labs | https://api.github.com/repos/vimperator/vimperator-labs | closed | [FF51] SSL indicator broken | compatibility | ##### Issue type:
- Bug report
##### Version:
Latest version including the patch from @ma8ma
##### Description:
There's still an issue with the ssl status indicator which is not shown at all.
```
[Exception... "Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIStringBundle.GetStringF... | True | [FF51] SSL indicator broken - ##### Issue type:
- Bug report
##### Version:
Latest version including the patch from @ma8ma
##### Description:
There's still an issue with the ssl status indicator which is not shown at all.
```
[Exception... "Component returned failure code: 0x80004005 (NS_ERROR_FAILUR... | non_secu | ssl indicator broken issue type bug report version latest version including the patch from description there s still an issue with the ssl status indicator which is not shown at all nsresult ns error failure location js frame xstringbundle getstr... | 0 |
79,617 | 15,586,190,111 | IssuesEvent | 2021-03-18 01:22:39 | sergioms/jackson_deserialization_poc | https://api.github.com/repos/sergioms/jackson_deserialization_poc | opened | CVE-2017-18640 (High) detected in snakeyaml-1.19.jar | security vulnerability | ## CVE-2017-18640 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.19.jar</b></p></summary>
<p>YAML 1.1 parser and emitter for Java</p>
<p>Library home page: <a href="http:/... | True | CVE-2017-18640 (High) detected in snakeyaml-1.19.jar - ## CVE-2017-18640 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.19.jar</b></p></summary>
<p>YAML 1.1 parser and emi... | secu | cve high detected in snakeyaml jar cve high severity vulnerability vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file jackson deserialization poc pom xml path to vulnerable library root repository or... | 1 |
103,208 | 4,165,411,956 | IssuesEvent | 2016-06-19 13:36:04 | sa31fh/ims | https://api.github.com/repos/sa31fh/ims | opened | Refine print preview message attachment | enhancement Medium Priority | Current print preview timeslot can be shared/messaged to another user in the system:
- Add necessary information to attachment so the receiver knows what received. Currently it does not differentiate between full day/timeslots. | 1.0 | Refine print preview message attachment - Current print preview timeslot can be shared/messaged to another user in the system:
- Add necessary information to attachment so the receiver knows what received. Currently it does not differentiate between full day/timeslots. | non_secu | refine print preview message attachment current print preview timeslot can be shared messaged to another user in the system add necessary information to attachment so the receiver knows what received currently it does not differentiate between full day timeslots | 0 |
237,056 | 26,078,769,120 | IssuesEvent | 2022-12-25 01:09:02 | vincenzodistasio97/ReactSocial | https://api.github.com/repos/vincenzodistasio97/ReactSocial | opened | CVE-2022-23540 (Medium) detected in jsonwebtoken-8.5.1.tgz | security vulnerability | ## CVE-2022-23540 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsonwebtoken-8.5.1.tgz</b></p></summary>
<p>JSON Web Token implementation (symmetric and asymmetric)</p>
<p>Library ... | True | CVE-2022-23540 (Medium) detected in jsonwebtoken-8.5.1.tgz - ## CVE-2022-23540 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsonwebtoken-8.5.1.tgz</b></p></summary>
<p>JSON Web To... | secu | cve medium detected in jsonwebtoken tgz cve medium severity vulnerability vulnerable library jsonwebtoken tgz json web token implementation symmetric and asymmetric library home page a href path to dependency file server package json path to vulnerable library se... | 1 |
11,064 | 7,047,609,758 | IssuesEvent | 2018-01-02 14:20:26 | Yakindu/statecharts | https://api.github.com/repos/Yakindu/statecharts | closed | Split sc editor and interface editor in multipage editor | Comp-Graphical Editor is-Feature-Request is-Usability-Issue Status-Consolidate | Currently, the interface declaration is a textfield inside of the graphical editor. This solution has certain advantages and drawbacks.
Pro:
- The interface declaration and the statechart can be seen simultaneously side by side. Elements in the statechart can easily be referenced in the interface declaration.
- The sta... | True | Split sc editor and interface editor in multipage editor - Currently, the interface declaration is a textfield inside of the graphical editor. This solution has certain advantages and drawbacks.
Pro:
- The interface declaration and the statechart can be seen simultaneously side by side. Elements in the statechart can e... | non_secu | split sc editor and interface editor in multipage editor currently the interface declaration is a textfield inside of the graphical editor this solution has certain advantages and drawbacks pro the interface declaration and the statechart can be seen simultaneously side by side elements in the statechart can e... | 0 |
84,018 | 15,720,818,029 | IssuesEvent | 2021-03-29 01:18:30 | jainisking/MyTest | https://api.github.com/repos/jainisking/MyTest | opened | CVE-2021-21345 (High) detected in xstream-1.4.11.1.jar | security vulnerability | ## CVE-2021-21345 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.11.1.jar</b></p></summary>
<p>XStream is a serialization library from Java objects to XML and back.</p>
<p... | True | CVE-2021-21345 (High) detected in xstream-1.4.11.1.jar - ## CVE-2021-21345 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.11.1.jar</b></p></summary>
<p>XStream is a serial... | secu | cve high detected in xstream jar cve high severity vulnerability vulnerable library xstream jar xstream is a serialization library from java objects to xml and back library home page a href path to dependency file mytest pom xml path to vulnerable library jyad... | 1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.