Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1
value | created_at stringlengths 19 19 | repo stringlengths 4 112 | repo_url stringlengths 33 141 | action stringclasses 3
values | title stringlengths 1 994 | labels stringlengths 4 719 | body stringlengths 1 261k | index stringclasses 13
values | text_combine stringlengths 95 261k | label stringclasses 2
values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
161,211 | 6,111,107,841 | IssuesEvent | 2017-06-21 16:17:51 | TerraFusion/basicFusion | https://api.github.com/repos/TerraFusion/basicFusion | closed | Check for MISR missing files in genInput.sh | Database Functionality Medium Priority | Need to write a check that if AA is missing, none of the other cameras are present. | 1.0 | Check for MISR missing files in genInput.sh - Need to write a check that if AA is missing, none of the other cameras are present. | non_secu | check for misr missing files in geninput sh need to write a check that if aa is missing none of the other cameras are present | 0 |
393,041 | 26,969,855,035 | IssuesEvent | 2023-02-09 03:12:23 | APSIMInitiative/ApsimX | https://api.github.com/repos/APSIMInitiative/ApsimX | closed | Add an example simulation that shows creating events in scripts | documentation | Need a simulation example that shows how to define events in a manager script that are published to the simulation. | 1.0 | Add an example simulation that shows creating events in scripts - Need a simulation example that shows how to define events in a manager script that are published to the simulation. | non_secu | add an example simulation that shows creating events in scripts need a simulation example that shows how to define events in a manager script that are published to the simulation | 0 |
83,626 | 15,712,467,945 | IssuesEvent | 2021-03-27 12:15:25 | emilykaldwin1827/goof | https://api.github.com/repos/emilykaldwin1827/goof | closed | CVE-2015-8855 (High) detected in semver-1.1.4.tgz | security vulnerability | ## CVE-2015-8855 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semver-1.1.4.tgz</b></p></summary>
<p>The semantic version parser used by npm.</p>
<p>Library home page: <a href="https... | True | CVE-2015-8855 (High) detected in semver-1.1.4.tgz - ## CVE-2015-8855 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semver-1.1.4.tgz</b></p></summary>
<p>The semantic version parser u... | secu | cve high detected in semver tgz cve high severity vulnerability vulnerable library semver tgz the semantic version parser used by npm library home page a href path to dependency file goof package json path to vulnerable library goof node modules npmconf node modules... | 1 |
625,773 | 19,765,291,786 | IssuesEvent | 2022-01-17 00:52:39 | secure-sw-dev/checkedc-llvm-project | https://api.github.com/repos/secure-sw-dev/checkedc-llvm-project | opened | Assertion fail for generic struct definition after non-generic pre-declaration | priority:3 | This issue was copied from https://github.com/microsoft/checkedc-clang/issues/1092
----
```c
struct hash;
struct hash _For_any(K) {};
```
```
clang: /home/john/checkedc-clang/clang/lib/Sema/CheckedCSubst.cpp:302: bool clang::Sema::DiagnoseExpandingCycles(clang::RecordDecl*, clang::SourceLocation): Assertion `Ba... | 1.0 | Assertion fail for generic struct definition after non-generic pre-declaration - This issue was copied from https://github.com/microsoft/checkedc-clang/issues/1092
----
```c
struct hash;
struct hash _For_any(K) {};
```
```
clang: /home/john/checkedc-clang/clang/lib/Sema/CheckedCSubst.cpp:302: bool clang::Sema::... | non_secu | assertion fail for generic struct definition after non generic pre declaration this issue was copied from c struct hash struct hash for any k clang home john checkedc clang clang lib sema checkedcsubst cpp bool clang sema diagnoseexpandingcycles clang recorddecl clang sourc... | 0 |
58,129 | 14,239,579,168 | IssuesEvent | 2020-11-18 20:21:23 | CDH-Studio/I-Talent | https://api.github.com/repos/CDH-Studio/I-Talent | closed | ASC-10 DATA IN TRANSIT | security control | **ID:** ASC-10 DATA IN TRANSIT
**Description**
Data in transit, or data in motion, is data actively moving from one location to another such as across the internet or through a private network. Data protection in transit is the protection of this data while it’s traveling from network to network or being transfer... | True | ASC-10 DATA IN TRANSIT - **ID:** ASC-10 DATA IN TRANSIT
**Description**
Data in transit, or data in motion, is data actively moving from one location to another such as across the internet or through a private network. Data protection in transit is the protection of this data while it’s traveling from network to... | secu | asc data in transit id asc data in transit description data in transit or data in motion is data actively moving from one location to another such as across the internet or through a private network data protection in transit is the protection of this data while it’s traveling from network to n... | 1 |
238,204 | 18,235,640,224 | IssuesEvent | 2021-10-01 06:26:02 | microsoftgraph/microsoft-graph-docs | https://api.github.com/repos/microsoftgraph/microsoft-graph-docs | closed | Misleading description of return value | area: teams bug: documentation teams: TACO MSTeams-Developer-Support | Using this API endpoint does not return team resource as hinted in the team resource link at the top of the article ("Get the teams in Microsoft Teams ..."), but rather an object (a group object with extra properties?) containing only displayName, description, id and isArchived.
Attempts to expand other team specific ... | 1.0 | Misleading description of return value - Using this API endpoint does not return team resource as hinted in the team resource link at the top of the article ("Get the teams in Microsoft Teams ..."), but rather an object (a group object with extra properties?) containing only displayName, description, id and isArchived.... | non_secu | misleading description of return value using this api endpoint does not return team resource as hinted in the team resource link at the top of the article get the teams in microsoft teams but rather an object a group object with extra properties containing only displayname description id and isarchived ... | 0 |
142,605 | 19,099,369,080 | IssuesEvent | 2021-11-29 20:27:36 | harrinry/stream-chat-react | https://api.github.com/repos/harrinry/stream-chat-react | opened | CVE-2021-23362 (Medium) detected in hosted-git-info-2.8.8.tgz, hosted-git-info-3.0.7.tgz | security vulnerability | ## CVE-2021-23362 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>hosted-git-info-2.8.8.tgz</b>, <b>hosted-git-info-3.0.7.tgz</b></p></summary>
<p>
<details><summary><b>hosted-git-... | True | CVE-2021-23362 (Medium) detected in hosted-git-info-2.8.8.tgz, hosted-git-info-3.0.7.tgz - ## CVE-2021-23362 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>hosted-git-info-2.8.8.tg... | secu | cve medium detected in hosted git info tgz hosted git info tgz cve medium severity vulnerability vulnerable libraries hosted git info tgz hosted git info tgz hosted git info tgz provides metadata and conversions from repository urls for github bit... | 1 |
74,528 | 15,350,274,958 | IssuesEvent | 2021-03-01 01:56:10 | bitbar/test-samples | https://api.github.com/repos/bitbar/test-samples | closed | WS-2019-0425 (Medium) detected in mocha-5.2.0.tgz, mocha-3.5.3.tgz | closing security vulnerability | ## WS-2019-0425 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>mocha-5.2.0.tgz</b>, <b>mocha-3.5.3.tgz</b></p></summary>
<p>
<details><summary><b>mocha-5.2.0.tgz</b></p></summary>... | True | WS-2019-0425 (Medium) detected in mocha-5.2.0.tgz, mocha-3.5.3.tgz - ## WS-2019-0425 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>mocha-5.2.0.tgz</b>, <b>mocha-3.5.3.tgz</b></p><... | secu | ws medium detected in mocha tgz mocha tgz ws medium severity vulnerability vulnerable libraries mocha tgz mocha tgz mocha tgz simple flexible fun test framework library home page a href path to dependency file test samples samples testin... | 1 |
229,229 | 25,306,550,500 | IssuesEvent | 2022-11-17 14:33:54 | Sultan-Dev-Readonly-Org/Baragon-WSD-2004 | https://api.github.com/repos/Sultan-Dev-Readonly-Org/Baragon-WSD-2004 | opened | jackson-databind-2.9.9.jar: 48 vulnerabilities (highest severity is: 9.8) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://... | True | jackson-databind-2.9.9.jar: 48 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p></summary>
<p>General data-binding functionality for Jac... | secu | jackson databind jar vulnerabilities highest severity is vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file baragonwatcher pom xml baragonagentservice pom xml... | 1 |
270,371 | 8,455,108,785 | IssuesEvent | 2018-10-21 11:45:02 | vasyoid/cremebrulee | https://api.github.com/repos/vasyoid/cremebrulee | closed | Не обновляется аватарка пользователя | bug high priority medium importance | #### Описание
При смене пользовательского аватара, на странице пользователя показывается старый аватар.
#### Версия приложения
228.1337 (Android)
#### Шаги для воспроизведения
- Авторизируемся любым пользователем в Android-приложении
- Попадаем на страницу пользователя
- Заходим в настройки
- На странице настро... | 1.0 | Не обновляется аватарка пользователя - #### Описание
При смене пользовательского аватара, на странице пользователя показывается старый аватар.
#### Версия приложения
228.1337 (Android)
#### Шаги для воспроизведения
- Авторизируемся любым пользователем в Android-приложении
- Попадаем на страницу пользователя
- За... | non_secu | не обновляется аватарка пользователя описание при смене пользовательского аватара на странице пользователя показывается старый аватар версия приложения android шаги для воспроизведения авторизируемся любым пользователем в android приложении попадаем на страницу пользователя заходим... | 0 |
531,961 | 15,527,864,211 | IssuesEvent | 2021-03-13 08:13:20 | containrrr/watchtower | https://api.github.com/repos/containrrr/watchtower | closed | Add MQTT and WebHook as notification options | Priority: Low Status: Available Type: Enhancement | I'd like to be able to monitor the status of container updates using Home Assistant. At present, this is very tricky to do.
Watchtower could easily achieve this if MQTT or Webhook's were added as notification options.
Like other notification options, these could easily be configured using the Env variables to spe... | 1.0 | Add MQTT and WebHook as notification options - I'd like to be able to monitor the status of container updates using Home Assistant. At present, this is very tricky to do.
Watchtower could easily achieve this if MQTT or Webhook's were added as notification options.
Like other notification options, these could easi... | non_secu | add mqtt and webhook as notification options i d like to be able to monitor the status of container updates using home assistant at present this is very tricky to do watchtower could easily achieve this if mqtt or webhook s were added as notification options like other notification options these could easi... | 0 |
245,158 | 26,519,977,167 | IssuesEvent | 2023-01-19 01:08:00 | n-devs/testTungTonScript | https://api.github.com/repos/n-devs/testTungTonScript | opened | CVE-2021-32803 (High) detected in tar-4.4.10.tgz | security vulnerability | ## CVE-2021-32803 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-4.4.10.tgz</b></p></summary>
<p>tar for node</p>
<p>Library home page: <a href="https://registry.npmjs.org/tar/-/t... | True | CVE-2021-32803 (High) detected in tar-4.4.10.tgz - ## CVE-2021-32803 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-4.4.10.tgz</b></p></summary>
<p>tar for node</p>
<p>Library hom... | secu | cve high detected in tar tgz cve high severity vulnerability vulnerable library tar tgz tar for node library home page a href path to dependency file testtungtonscript package json path to vulnerable library node modules tar package json dependency hierarchy ... | 1 |
75,704 | 14,515,689,573 | IssuesEvent | 2020-12-13 13:19:43 | languagetool-org/languagetool | https://api.github.com/repos/languagetool-org/languagetool | opened | [de] bad spelling suggestions "freit" | German code/java | Maybe because "freit" is in `prohibit.txt`?

-> top suggestion should be "freut" | 1.0 | [de] bad spelling suggestions "freit" - Maybe because "freit" is in `prohibit.txt`?

-> top suggestion should be "freut" | non_secu | bad spelling suggestions freit maybe because freit is in prohibit txt top suggestion should be freut | 0 |
84,185 | 10,483,191,018 | IssuesEvent | 2019-09-24 13:33:53 | ethereum/ethereum-org-website | https://api.github.com/repos/ethereum/ethereum-org-website | closed | Establish consistent font hierarchy | design wip | - Homepage section titles should be headers (`<h2>`?), not `<li>`
- Every page should have an `<h1>` - all header titles should be `<h1>` not `<h2>`
- Headers & HTML elements should have consistent size
- e.g. `<h1>` on /developers has custom styling to display like an `<h2>`!? | 1.0 | Establish consistent font hierarchy - - Homepage section titles should be headers (`<h2>`?), not `<li>`
- Every page should have an `<h1>` - all header titles should be `<h1>` not `<h2>`
- Headers & HTML elements should have consistent size
- e.g. `<h1>` on /developers has custom styling to display like an `<h2>... | non_secu | establish consistent font hierarchy homepage section titles should be headers not every page should have an all header titles should be not headers html elements should have consistent size e g on developers has custom styling to display like an | 0 |
140,910 | 18,927,436,605 | IssuesEvent | 2021-11-17 11:01:48 | sultanabubaker/Rem_Ren_Test | https://api.github.com/repos/sultanabubaker/Rem_Ren_Test | opened | WS-2019-0331 (Medium) detected in handlebars-4.0.10.tgz | security vulnerability | ## WS-2019-0331 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.0.10.tgz</b></p></summary>
<p>Handlebars provides the power necessary to let you build semantic templates... | True | WS-2019-0331 (Medium) detected in handlebars-4.0.10.tgz - ## WS-2019-0331 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.0.10.tgz</b></p></summary>
<p>Handlebars provid... | secu | ws medium detected in handlebars tgz ws medium severity vulnerability vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file rem ren t... | 1 |
478,040 | 13,771,787,016 | IssuesEvent | 2020-10-07 22:47:33 | metabase/metabase | https://api.github.com/repos/metabase/metabase | closed | 0.37-rc1: empty click behavior sidebar when dealing with a dashboard card displaying an error | Priority:P2 Type:Bug | When dealing with a dashboard card displaying the error message, "There was a problem displaying this chart," the click behavior sidebar is empty, only showing the title "On-click behavior for each column." | 1.0 | 0.37-rc1: empty click behavior sidebar when dealing with a dashboard card displaying an error - When dealing with a dashboard card displaying the error message, "There was a problem displaying this chart," the click behavior sidebar is empty, only showing the title "On-click behavior for each column." | non_secu | empty click behavior sidebar when dealing with a dashboard card displaying an error when dealing with a dashboard card displaying the error message there was a problem displaying this chart the click behavior sidebar is empty only showing the title on click behavior for each column | 0 |
159,684 | 20,085,892,320 | IssuesEvent | 2022-02-05 01:07:55 | AkshayMukkavilli/Analyzing-the-Significance-of-Structure-in-Amazon-Review-Data-Using-Machine-Learning-Approaches | https://api.github.com/repos/AkshayMukkavilli/Analyzing-the-Significance-of-Structure-in-Amazon-Review-Data-Using-Machine-Learning-Approaches | opened | CVE-2021-41204 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl | security vulnerability | ## CVE-2021-41204 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learni... | True | CVE-2021-41204 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2021-41204 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27... | secu | cve medium detected in tensorflow whl cve medium severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file finalproject requirement... | 1 |
8,823 | 7,457,017,821 | IssuesEvent | 2018-03-30 01:14:51 | s-newman/skitter | https://api.github.com/repos/s-newman/skitter | closed | Picture Processing | required security | When users upload profile pictures, we will have to process them to ensure that they aren't trying to sneak in anything malicious. This should be done before reaching the microservices. | True | Picture Processing - When users upload profile pictures, we will have to process them to ensure that they aren't trying to sneak in anything malicious. This should be done before reaching the microservices. | secu | picture processing when users upload profile pictures we will have to process them to ensure that they aren t trying to sneak in anything malicious this should be done before reaching the microservices | 1 |
799,381 | 28,305,698,868 | IssuesEvent | 2023-04-10 10:46:17 | bounswe/bounswe2023group8 | https://api.github.com/repos/bounswe/bounswe2023group8 | opened | Implementing Milestone 1 Report to Wiki | type: wiki type: improvement status: to-do priority: high effort: low | As the Milestone 1 Report is set with the #65, we need to implement the missing chapters of the report to related wiki page. | 1.0 | Implementing Milestone 1 Report to Wiki - As the Milestone 1 Report is set with the #65, we need to implement the missing chapters of the report to related wiki page. | non_secu | implementing milestone report to wiki as the milestone report is set with the we need to implement the missing chapters of the report to related wiki page | 0 |
178,917 | 6,620,046,048 | IssuesEvent | 2017-09-21 14:22:02 | robotology/yarp | https://api.github.com/repos/robotology/yarp | closed | yarp devel is not configuring if YCM 0.4.0 is installed in the system | Component: CMake Fixed in: YARP 2.3.72 Priority: High Resolution: Fixed | I have `ycm` installed from homebrew, and the latest YARP devel is not configuring with this error:
~~~
CMake Error at /usr/local/share/YCM/modules/AddInstallRPATHSupport.cmake:137 (file):
file RELATIVE_PATH must be passed a full path to the directory:
INSTALL_NAME_DIR
Call Stack (most recent call first):
c... | 1.0 | yarp devel is not configuring if YCM 0.4.0 is installed in the system - I have `ycm` installed from homebrew, and the latest YARP devel is not configuring with this error:
~~~
CMake Error at /usr/local/share/YCM/modules/AddInstallRPATHSupport.cmake:137 (file):
file RELATIVE_PATH must be passed a full path to the d... | non_secu | yarp devel is not configuring if ycm is installed in the system i have ycm installed from homebrew and the latest yarp devel is not configuring with this error cmake error at usr local share ycm modules addinstallrpathsupport cmake file file relative path must be passed a full path to the dir... | 0 |
42,439 | 12,891,413,604 | IssuesEvent | 2020-07-13 17:41:21 | jtimberlake/jazz | https://api.github.com/repos/jtimberlake/jazz | opened | WS-2019-0425 (Medium) detected in multiple libraries | security vulnerability | ## WS-2019-0425 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>mocha-3.5.3.tgz</b>, <b>mocha-4.1.0.tgz</b>, <b>mocha-5.2.0.tgz</b></p></summary>
<p>
<details><summary><b>mocha-3.5... | True | WS-2019-0425 (Medium) detected in multiple libraries - ## WS-2019-0425 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>mocha-3.5.3.tgz</b>, <b>mocha-4.1.0.tgz</b>, <b>mocha-5.2.0.tg... | secu | ws medium detected in multiple libraries ws medium severity vulnerability vulnerable libraries mocha tgz mocha tgz mocha tgz mocha tgz simple flexible fun test framework library home page a href path to dependency file tmp ws scm jazz templ... | 1 |
19,637 | 10,374,702,641 | IssuesEvent | 2019-09-09 10:12:04 | vicvega/chaltron | https://api.github.com/repos/vicvega/chaltron | closed | CVE-2018-8048 (Medium) detected in loofah-2.1.1.gem | security vulnerability | ## CVE-2018-8048 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>loofah-2.1.1.gem</b></p></summary>
<p>Loofah is a general library for manipulating and transforming HTML/XML
document... | True | CVE-2018-8048 (Medium) detected in loofah-2.1.1.gem - ## CVE-2018-8048 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>loofah-2.1.1.gem</b></p></summary>
<p>Loofah is a general libra... | secu | cve medium detected in loofah gem cve medium severity vulnerability vulnerable library loofah gem loofah is a general library for manipulating and transforming html xml documents and fragments it s built on top of nokogiri and so it s fast and has a nice api loofah excels ... | 1 |
793,390 | 27,994,021,021 | IssuesEvent | 2023-03-27 07:07:44 | apache/kyuubi | https://api.github.com/repos/apache/kyuubi | opened | [Bug] flink engine failed to generate operation log | kind:bug priority:major | ### Code of Conduct
- [X] I agree to follow this project's [Code of Conduct](https://www.apache.org/foundation/policies/conduct)
### Search before asking
- [X] I have searched in the [issues](https://github.com/apache/kyuubi/issues?q=is%3Aissue) and found no similar issues.
### Describe the bug

### Search before asking
- [X] I have searched in the [issues](https://github.com/apache/kyuubi/issues?q=is%3Aissue) and found no sim... | non_secu | flink engine failed to generate operation log code of conduct i agree to follow this project s search before asking i have searched in the and found no similar issues describe the bug i read this issue but found that the structure of the fix code is kyuubi versi... | 0 |
3,313 | 4,323,658,942 | IssuesEvent | 2016-07-25 17:41:51 | dkopecek/usbguard | https://api.github.com/repos/dkopecek/usbguard | closed | Descriptor data not included in the device hash value computation | bug security | During the rule parser refactoring I've noticed that the device hash computation routine doesn't take the descriptor data blob into account. Only the values of several attribute are included in the hash computation. Fixing this will lead to a backwards incompatibility which is very unfortunate :-( | True | Descriptor data not included in the device hash value computation - During the rule parser refactoring I've noticed that the device hash computation routine doesn't take the descriptor data blob into account. Only the values of several attribute are included in the hash computation. Fixing this will lead to a backwards... | secu | descriptor data not included in the device hash value computation during the rule parser refactoring i ve noticed that the device hash computation routine doesn t take the descriptor data blob into account only the values of several attribute are included in the hash computation fixing this will lead to a backwards... | 1 |
32,594 | 12,131,321,182 | IssuesEvent | 2020-04-23 04:21:15 | kenferrara/spark | https://api.github.com/repos/kenferrara/spark | opened | CVE-2019-8331 (Medium) detected in bootstrap-2.1.0.min.js, bootstrap-2.1.0.js | security vulnerability | ## CVE-2019-8331 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>bootstrap-2.1.0.min.js</b>, <b>bootstrap-2.1.0.js</b></p></summary>
<p>
<details><summary><b>bootstrap-2.1.0.min.js... | True | CVE-2019-8331 (Medium) detected in bootstrap-2.1.0.min.js, bootstrap-2.1.0.js - ## CVE-2019-8331 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>bootstrap-2.1.0.min.js</b>, <b>boots... | secu | cve medium detected in bootstrap min js bootstrap js cve medium severity vulnerability vulnerable libraries bootstrap min js bootstrap js bootstrap min js the most popular front end framework for developing responsive mobile first projects on the ... | 1 |
134,873 | 5,239,008,124 | IssuesEvent | 2017-01-31 08:12:39 | status-im/status-react | https://api.github.com/repos/status-im/status-react | closed | Discover view lost its over scroll bungie effect | bug in progress intermediate medium-priority | ## Description
[iOS] The Chats and Contacts views will allow you to slide a view beyond its max height and it will snap back. The Discover view has lost this effect.
## Reproduction
1. Go to Discover view.
2. Slide down to go beyond top of page. **[nothing happens]**
3. Go to Chats view.
4. Slide down to go... | 1.0 | Discover view lost its over scroll bungie effect - ## Description
[iOS] The Chats and Contacts views will allow you to slide a view beyond its max height and it will snap back. The Discover view has lost this effect.
## Reproduction
1. Go to Discover view.
2. Slide down to go beyond top of page. **[nothing ha... | non_secu | discover view lost its over scroll bungie effect description the chats and contacts views will allow you to slide a view beyond its max height and it will snap back the discover view has lost this effect reproduction go to discover view slide down to go beyond top of page go to c... | 0 |
257,802 | 19,532,166,657 | IssuesEvent | 2021-12-30 19:11:42 | fleetdm/fleet | https://api.github.com/repos/fleetdm/fleet | opened | Add a "Signing installers" section to the "Adding hosts" documentation page | :improve documentation idea | ### Goal
Add a "Signing installers" section to the "Adding hosts" documentation page
### How?
- [ ] Add a "Signing installers" section
- [ ] Add instructions that answer the following questions:
- What do I need to use to sign an osquery installer for macOS?
- What do I need to use to sign an osquery ... | 1.0 | Add a "Signing installers" section to the "Adding hosts" documentation page - ### Goal
Add a "Signing installers" section to the "Adding hosts" documentation page
### How?
- [ ] Add a "Signing installers" section
- [ ] Add instructions that answer the following questions:
- What do I need to use to sign ... | non_secu | add a signing installers section to the adding hosts documentation page goal add a signing installers section to the adding hosts documentation page how add a signing installers section add instructions that answer the following questions what do i need to use to sign an o... | 0 |
127,305 | 10,465,345,542 | IssuesEvent | 2019-09-21 10:02:22 | fastify/fastify | https://api.github.com/repos/fastify/fastify | closed | Remove Travis from master | discussion test | Travis has already been removed from the 1.x and next branches. Azure Pipelines has been working very well. It’s time to remove Travis from master, and disconnect it from the repository as a whole.
| 1.0 | Remove Travis from master - Travis has already been removed from the 1.x and next branches. Azure Pipelines has been working very well. It’s time to remove Travis from master, and disconnect it from the repository as a whole.
| non_secu | remove travis from master travis has already been removed from the x and next branches azure pipelines has been working very well it’s time to remove travis from master and disconnect it from the repository as a whole | 0 |
170,589 | 6,459,567,243 | IssuesEvent | 2017-08-16 00:10:40 | objectpartners/angular2-timesheet | https://api.github.com/repos/objectpartners/angular2-timesheet | opened | Add support links into navigation in the workshop | Priority: Low | In an effort to better aid workshoppees, we should add links to the github repo, workshop slides, angular docs, and angular material docs. | 1.0 | Add support links into navigation in the workshop - In an effort to better aid workshoppees, we should add links to the github repo, workshop slides, angular docs, and angular material docs. | non_secu | add support links into navigation in the workshop in an effort to better aid workshoppees we should add links to the github repo workshop slides angular docs and angular material docs | 0 |
364,052 | 25,479,277,849 | IssuesEvent | 2022-11-25 18:02:58 | entropyqueen/trans-cec | https://api.github.com/repos/entropyqueen/trans-cec | opened | Faire un README propre | documentation | C'est mooooche, c'est tout plein de trucs c'est compliqué, bref.
Simplifions, facilitons, tout ça tout ça... | 1.0 | Faire un README propre - C'est mooooche, c'est tout plein de trucs c'est compliqué, bref.
Simplifions, facilitons, tout ça tout ça... | non_secu | faire un readme propre c est mooooche c est tout plein de trucs c est compliqué bref simplifions facilitons tout ça tout ça | 0 |
2,163 | 5,008,956,794 | IssuesEvent | 2016-12-12 20:59:58 | bongo227/StatsNotes | https://api.github.com/repos/bongo227/StatsNotes | opened | Estimation of short-term standard deviation from small samples. Ability of a process to meet tolerances. | 15.3 Statistical Process Control | From the spec:
Estimate of proportion not meeting tolerances.
| 1.0 | Estimation of short-term standard deviation from small samples. Ability of a process to meet tolerances. - From the spec:
Estimate of proportion not meeting tolerances.
| non_secu | estimation of short term standard deviation from small samples ability of a process to meet tolerances from the spec estimate of proportion not meeting tolerances | 0 |
71,907 | 15,210,106,322 | IssuesEvent | 2021-02-17 06:49:18 | andythinkpower/Proj_02 | https://api.github.com/repos/andythinkpower/Proj_02 | opened | CVE-2018-11771 (Medium) detected in commons-compress-1.12.jar | security vulnerability | ## CVE-2018-11771 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.12.jar</b></p></summary>
<p>Apache Commons Compress software defines an API for working with
comp... | True | CVE-2018-11771 (Medium) detected in commons-compress-1.12.jar - ## CVE-2018-11771 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.12.jar</b></p></summary>
<p>Apach... | secu | cve medium detected in commons compress jar cve medium severity vulnerability vulnerable library commons compress jar apache commons compress software defines an api for working with compression and archive formats these include gzip lzma xz snappy traditional unix comp... | 1 |
171,587 | 20,977,553,337 | IssuesEvent | 2022-03-28 16:32:21 | hejny/czech.events | https://api.github.com/repos/hejny/czech.events | closed | CVE-2022-0691 (High) detected in url-parse-1.5.4.tgz - autoclosed | security vulnerability | ## CVE-2022-0691 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.5.4.tgz</b></p></summary>
<p>Small footprint URL parser that works seamlessly across Node.js and browser en... | True | CVE-2022-0691 (High) detected in url-parse-1.5.4.tgz - autoclosed - ## CVE-2022-0691 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.5.4.tgz</b></p></summary>
<p>Small foot... | secu | cve high detected in url parse tgz autoclosed cve high severity vulnerability vulnerable library url parse tgz small footprint url parser that works seamlessly across node js and browser environments library home page a href path to dependency file package json pat... | 1 |
432,054 | 12,488,608,477 | IssuesEvent | 2020-05-31 15:01:55 | arfc/2020-fairhurst-hydrogen-production | https://api.github.com/repos/arfc/2020-fairhurst-hydrogen-production | closed | Add document with more information about iodine-sulfur cycle | Comp:Core Difficulty:2-Challenging Priority:2-Normal Status:1-New Type:Docs | This issue can be closed when more information about the iodine-sulfur thermochemical cycle for producing hydrogen is added to the repository. This information should also contain more accurate data about the energy (both thermal and electric) demanded by the process. | 1.0 | Add document with more information about iodine-sulfur cycle - This issue can be closed when more information about the iodine-sulfur thermochemical cycle for producing hydrogen is added to the repository. This information should also contain more accurate data about the energy (both thermal and electric) demanded by t... | non_secu | add document with more information about iodine sulfur cycle this issue can be closed when more information about the iodine sulfur thermochemical cycle for producing hydrogen is added to the repository this information should also contain more accurate data about the energy both thermal and electric demanded by t... | 0 |
53,658 | 13,866,942,787 | IssuesEvent | 2020-10-16 07:41:39 | stefanfreitag/terraforming_aws | https://api.github.com/repos/stefanfreitag/terraforming_aws | opened | CVE-2018-20190 (Medium) detected in opennmsopennms-source-25.1.0-1, node-sass-4.14.1.tgz | security vulnerability | ## CVE-2018-20190 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>opennmsopennms-source-25.1.0-1</b>, <b>node-sass-4.14.1.tgz</b></p></summary>
<p>
<details><summary><b>node-sass-4... | True | CVE-2018-20190 (Medium) detected in opennmsopennms-source-25.1.0-1, node-sass-4.14.1.tgz - ## CVE-2018-20190 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>opennmsopennms-source-25... | secu | cve medium detected in opennmsopennms source node sass tgz cve medium severity vulnerability vulnerable libraries opennmsopennms source node sass tgz node sass tgz wrapper around libsass library home page a href path to dependency file ... | 1 |
21,062 | 10,568,905,744 | IssuesEvent | 2019-10-06 16:05:07 | vvni/one-life-app | https://api.github.com/repos/vvni/one-life-app | opened | CVE-2019-10103 (High) detected in kotlin-stdlib-common-1.3.0.jar, kotlin-stdlib-1.3.0.jar | security vulnerability | ## CVE-2019-10103 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>kotlin-stdlib-common-1.3.0.jar</b>, <b>kotlin-stdlib-1.3.0.jar</b></p></summary>
<p>
<details><summary><b>kotlin-std... | True | CVE-2019-10103 (High) detected in kotlin-stdlib-common-1.3.0.jar, kotlin-stdlib-1.3.0.jar - ## CVE-2019-10103 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>kotlin-stdlib-common-1.3.... | secu | cve high detected in kotlin stdlib common jar kotlin stdlib jar cve high severity vulnerability vulnerable libraries kotlin stdlib common jar kotlin stdlib jar kotlin stdlib common jar kotlin common standard library library home page a href ... | 1 |
282,208 | 30,889,223,341 | IssuesEvent | 2023-08-04 02:25:05 | madhans23/linux-4.1.15 | https://api.github.com/repos/madhans23/linux-4.1.15 | reopened | CVE-2022-24958 (High) detected in linux-stable-rtv4.1.33 | Mend: dependency security vulnerability | ## CVE-2022-24958 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home pag... | True | CVE-2022-24958 (High) detected in linux-stable-rtv4.1.33 - ## CVE-2022-24958 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartw... | secu | cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in base branch master vulnerable source files vuln... | 1 |
133,058 | 12,530,818,811 | IssuesEvent | 2020-06-04 13:39:44 | GSG-K3/funny-hooks | https://api.github.com/repos/GSG-K3/funny-hooks | closed | create Read-me | Done documentation | In README:
- [x] Title
- [x] Description
- [x] user journey
- [x] how to run our project
- [x] Team members | 1.0 | create Read-me - In README:
- [x] Title
- [x] Description
- [x] user journey
- [x] how to run our project
- [x] Team members | non_secu | create read me in readme title description user journey how to run our project team members | 0 |
21,004 | 10,565,534,925 | IssuesEvent | 2019-10-05 12:14:08 | nidhisi/Postgres-11.3 | https://api.github.com/repos/nidhisi/Postgres-11.3 | opened | CVE-2019-10164 (High) detected in postgres-REL_11_3 | security vulnerability | ## CVE-2019-10164 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>postgresREL_11_3</b></p></summary>
<p>
<p>Mirror of the official PostgreSQL GIT repository. Note that this is just a *... | True | CVE-2019-10164 (High) detected in postgres-REL_11_3 - ## CVE-2019-10164 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>postgresREL_11_3</b></p></summary>
<p>
<p>Mirror of the official... | secu | cve high detected in postgres rel cve high severity vulnerability vulnerable library postgresrel mirror of the official postgresql git repository note that this is just a mirror we don t work with pull requests on github to contribute please see library home page a hre... | 1 |
16,250 | 9,744,713,282 | IssuesEvent | 2019-06-03 07:47:57 | jamijam/example-php | https://api.github.com/repos/jamijam/example-php | opened | CVE-2015-3176 (Medium) detected in moodle/moodle-v2.6.2 | security vulnerability | ## CVE-2015-3176 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moodle/moodle-v2.6.2</b></p></summary>
<p>Moodle - the world's open source learning platform</p>
<p>
Dependency Hier... | True | CVE-2015-3176 (Medium) detected in moodle/moodle-v2.6.2 - ## CVE-2015-3176 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moodle/moodle-v2.6.2</b></p></summary>
<p>Moodle - the worl... | secu | cve medium detected in moodle moodle cve medium severity vulnerability vulnerable library moodle moodle moodle the world s open source learning platform dependency hierarchy x moodle moodle vulnerable library found in head commit a href ... | 1 |
184,627 | 32,021,763,138 | IssuesEvent | 2023-09-22 05:30:05 | energizer-develop/Y_FE_WIKI | https://api.github.com/repos/energizer-develop/Y_FE_WIKI | closed | Wiki Component Responsive Design | design | ## 설명
- 위키 컴포넌트 모바일 반응형 디자인 구현
## 할 일
- [ ] 위키 컴포넌트 반응형 구현
- [ ] 네비게이션 바 반응형 구현
| 1.0 | Wiki Component Responsive Design - ## 설명
- 위키 컴포넌트 모바일 반응형 디자인 구현
## 할 일
- [ ] 위키 컴포넌트 반응형 구현
- [ ] 네비게이션 바 반응형 구현
| non_secu | wiki component responsive design 설명 위키 컴포넌트 모바일 반응형 디자인 구현 할 일 위키 컴포넌트 반응형 구현 네비게이션 바 반응형 구현 | 0 |
261,977 | 27,831,507,112 | IssuesEvent | 2023-03-20 05:32:14 | ministryofjustice/hmpps-probation-integration-services | https://api.github.com/repos/ministryofjustice/hmpps-probation-integration-services | opened | CVE-2023-24998 (tier-to-delius) | dependencies security | Apache Commons FileUpload: FileUpload DoS with excessive parts
* Project: tier-to-delius
* Package: `commons-fileupload:commons-fileupload:1.4`
* Location: `app/libs/commons-fileupload-1.4.jar`
>Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility... | True | CVE-2023-24998 (tier-to-delius) - Apache Commons FileUpload: FileUpload DoS with excessive parts
* Project: tier-to-delius
* Package: `commons-fileupload:commons-fileupload:1.4`
* Location: `app/libs/commons-fileupload-1.4.jar`
>Apache Commons FileUpload before 1.5 does not limit the number of request parts to be proc... | secu | cve tier to delius apache commons fileupload fileupload dos with excessive parts project tier to delius package commons fileupload commons fileupload location app libs commons fileupload jar apache commons fileupload before does not limit the number of request parts to be processed r... | 1 |
266,077 | 28,298,895,305 | IssuesEvent | 2023-04-10 02:52:49 | nidhi7598/linux-4.19.72 | https://api.github.com/repos/nidhi7598/linux-4.19.72 | closed | CVE-2020-24394 (High) detected in linuxlinux-4.19.254 - autoclosed | Mend: dependency security vulnerability | ## CVE-2020-24394 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.254</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.k... | True | CVE-2020-24394 (High) detected in linuxlinux-4.19.254 - autoclosed - ## CVE-2020-24394 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.254</b></p></summary>
<p>
<p>The ... | secu | cve high detected in linuxlinux autoclosed cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch master vulnerable source files fs ... | 1 |
94,414 | 19,542,991,477 | IssuesEvent | 2022-01-01 09:11:19 | joomla/joomla-cms | https://api.github.com/repos/joomla/joomla-cms | closed | [4.1] Error: 0 in the frontend after installing nightly build + demo data | No Code Attached Yet | ### Steps to reproduce the issue
Used the latest nightly build which is available on 01.01. All I did was install the build, tested the PR https://github.com/joomla/joomla-cms/pull/36515 (i.e. created 1 task) and then installed the demo data (NOT multilingual). Everything, the frontend fell off.
 and then installed the demo data ... | non_secu | error in the frontend after installing nightly build demo data steps to reproduce the issue used the latest nightly build which is available on all i did was install the build tested the pr i e created task and then installed the demo data not multilingual everything the frontend fell of... | 0 |
147,929 | 19,526,167,190 | IssuesEvent | 2021-12-30 08:13:59 | panasalap/linux-4.1.15 | https://api.github.com/repos/panasalap/linux-4.1.15 | opened | CVE-2015-8812 (High) detected in linuxv4.4.3 | security vulnerability | ## CVE-2015-8812 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv4.4.3</b></p></summary>
<p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/kees/li... | True | CVE-2015-8812 (High) detected in linuxv4.4.3 - ## CVE-2015-8812 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv4.4.3</b></p></summary>
<p>
<p>Library home page: <a href=https://... | secu | cve high detected in cve high severity vulnerability vulnerable library library home page a href found in head commit a href found in base branch master vulnerable source files drivers infiniband hw iwch cm c drivers infiniba... | 1 |
268,756 | 20,360,817,344 | IssuesEvent | 2022-02-20 17:01:22 | scikit-image/scikit-image | https://api.github.com/repos/scikit-image/scikit-image | reopened | Clarification: coordinate conventions in watershed example | type: documentation | I have been frequently referring to [this watershed segmentation example](https://scikit-image.org/docs/stable/auto_examples/segmentation/plot_watershed.html#sphx-glr-auto-examples-segmentation-plot-watershed-py). The second centroid in the docs uses the naming convention `(x2, y2)` to represent the point `(44, 52)`. I... | 1.0 | Clarification: coordinate conventions in watershed example - I have been frequently referring to [this watershed segmentation example](https://scikit-image.org/docs/stable/auto_examples/segmentation/plot_watershed.html#sphx-glr-auto-examples-segmentation-plot-watershed-py). The second centroid in the docs uses the nami... | non_secu | clarification coordinate conventions in watershed example i have been frequently referring to the second centroid in the docs uses the naming convention to represent the point if you then use mask to set labels to the centroids on the image the labelled centroid is present at row and... | 0 |
273,716 | 29,831,069,665 | IssuesEvent | 2023-06-18 09:26:59 | RG4421/ampere-centos-kernel | https://api.github.com/repos/RG4421/ampere-centos-kernel | closed | CVE-2019-15921 (Medium) detected in linuxv5.2 - autoclosed | Mend: dependency security vulnerability | ## CVE-2019-15921 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv5.2</b></p></summary>
<p>
<p>Linux kernel source tree</p>
<p>Library home page: <a href=https://github.com/tor... | True | CVE-2019-15921 (Medium) detected in linuxv5.2 - autoclosed - ## CVE-2019-15921 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv5.2</b></p></summary>
<p>
<p>Linux kernel source ... | secu | cve medium detected in autoclosed cve medium severity vulnerability vulnerable library linux kernel source tree library home page a href found in base branch amp centos kernel vulnerable source files net netlink genetlink c net n... | 1 |
40,445 | 12,794,037,715 | IssuesEvent | 2020-07-02 05:55:15 | mgh3326/railbook | https://api.github.com/repos/mgh3326/railbook | opened | CVE-2020-7656 (Medium) detected in jquery-1.7.1.min.js | security vulnerability | ## CVE-2020-7656 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.1.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="htt... | True | CVE-2020-7656 (Medium) detected in jquery-1.7.1.min.js - ## CVE-2020-7656 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.1.min.js</b></p></summary>
<p>JavaScript library ... | secu | cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file tmp ws scm railbook node modules sockjs examples hapi html index html path t... | 1 |
427,284 | 12,393,943,400 | IssuesEvent | 2020-05-20 16:10:04 | googleapis/elixir-google-api | https://api.github.com/repos/googleapis/elixir-google-api | closed | Synthesis failed for Jobs | api: jobs autosynth failure priority: p1 type: bug | Hello! Autosynth couldn't regenerate Jobs. :broken_heart:
Here's the output from running `synth.py`:
```
ning: failed to remove deps/parse_trans/ebin/parse_trans.app: Permission denied
warning: failed to remove deps/parse_trans/ebin/parse_trans_mod.beam: Permission denied
warning: failed to remove deps/parse_trans/eb... | 1.0 | Synthesis failed for Jobs - Hello! Autosynth couldn't regenerate Jobs. :broken_heart:
Here's the output from running `synth.py`:
```
ning: failed to remove deps/parse_trans/ebin/parse_trans.app: Permission denied
warning: failed to remove deps/parse_trans/ebin/parse_trans_mod.beam: Permission denied
warning: failed t... | non_secu | synthesis failed for jobs hello autosynth couldn t regenerate jobs broken heart here s the output from running synth py ning failed to remove deps parse trans ebin parse trans app permission denied warning failed to remove deps parse trans ebin parse trans mod beam permission denied warning failed t... | 0 |
687,026 | 23,511,516,256 | IssuesEvent | 2022-08-18 17:00:40 | asosnovsky/Shortumation | https://api.github.com/repos/asosnovsky/Shortumation | closed | Internal Server Error | bug high priority | **Describe the bug**
Internal server error when opening web UI.
It might be something in my config file but I am unsure where to look. I have split up my config and automations into separate folders/files.
**To Reproduce**
Steps to reproduce the behavior:
1. Go to 'Web UI'
2. Click on 'Web UI'
3. ???
4. Loo... | 1.0 | Internal Server Error - **Describe the bug**
Internal server error when opening web UI.
It might be something in my config file but I am unsure where to look. I have split up my config and automations into separate folders/files.
**To Reproduce**
Steps to reproduce the behavior:
1. Go to 'Web UI'
2. Click on... | non_secu | internal server error describe the bug internal server error when opening web ui it might be something in my config file but i am unsure where to look i have split up my config and automations into separate folders files to reproduce steps to reproduce the behavior go to web ui click on... | 0 |
306,585 | 26,482,414,970 | IssuesEvent | 2023-01-17 15:33:53 | red-hat-storage/ocs-ci | https://api.github.com/repos/red-hat-storage/ocs-ci | closed | test_bucket_creation failed with ocs_ci.ocs.exceptions.CommandFailed: Error during execution of command: /home/jenkins/workspace/qe-deploy-ocs-cluster-prod/ocs-ci/data/mcg-cli backingstore create pv-pool pv-backingstore-216e7721521d4379baea7305 --num-volumes 1 --pv-size-gb 50 --storage-class ocs-storagecluster-ceph-rbd... | High Priority TestCase failing Squad/Red | Run details:
URL: https://reportportal-ocs4.apps.ocp-c1.prod.psi.redhat.com/ui/#OCS/launches/362/6633/272793/272796/272802/log
Run ID: 1669598191
Test Case: test_bucket_creation
ODF Build: 4.12.0-120
OCP Version: 4.12
Job name: VSPHERE6 UPI 1AZ RHCOS MCG Only Deployment 3M 3W tier1
Jenkins job: https://ocs4-jenkins-cs... | 1.0 | test_bucket_creation failed with ocs_ci.ocs.exceptions.CommandFailed: Error during execution of command: /home/jenkins/workspace/qe-deploy-ocs-cluster-prod/ocs-ci/data/mcg-cli backingstore create pv-pool pv-backingstore-216e7721521d4379baea7305 --num-volumes 1 --pv-size-gb 50 --storage-class ocs-storagecluster-ceph-rbd... | non_secu | test bucket creation failed with ocs ci ocs exceptions commandfailed error during execution of command home jenkins workspace qe deploy ocs cluster prod ocs ci data mcg cli backingstore create pv pool pv backingstore num volumes pv size gb storage class ocs storagecluster ceph rbd n openshift storage ... | 0 |
59,497 | 3,113,936,772 | IssuesEvent | 2015-09-03 04:11:13 | AutomationSolutionz/Framework_0.1 | https://api.github.com/repos/AutomationSolutionz/Framework_0.1 | closed | Common tab is not considering all the other status that were added later. | bug Priority 2 (High) Release Gating Shetu | Common tab is not considering all the other status that we added new.
Please make sure all status are grouped together and user can view full detail. | 1.0 | Common tab is not considering all the other status that were added later. - Common tab is not considering all the other status that we added new.
Please make sure all status are grouped together and user can view full detail. | non_secu | common tab is not considering all the other status that were added later common tab is not considering all the other status that we added new please make sure all status are grouped together and user can view full detail | 0 |
34,577 | 12,293,475,879 | IssuesEvent | 2020-05-10 19:10:46 | heholek/better-onetab | https://api.github.com/repos/heholek/better-onetab | opened | WS-2020-0068 (High) detected in yargs-parser-13.1.2.tgz | security vulnerability | ## WS-2020-0068 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>yargs-parser-13.1.2.tgz</b></p></summary>
<p>the mighty option parser used by yargs</p>
<p>Library home page: <a href="h... | True | WS-2020-0068 (High) detected in yargs-parser-13.1.2.tgz - ## WS-2020-0068 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>yargs-parser-13.1.2.tgz</b></p></summary>
<p>the mighty option... | secu | ws high detected in yargs parser tgz ws high severity vulnerability vulnerable library yargs parser tgz the mighty option parser used by yargs library home page a href path to dependency file tmp ws scm better onetab package json path to vulnerable library tmp ws s... | 1 |
197,484 | 6,955,823,853 | IssuesEvent | 2017-12-07 09:20:22 | Sinapse-Energia/AP-Sinapse | https://api.github.com/repos/Sinapse-Energia/AP-Sinapse | opened | [ML 8 - RF] The command 126; is not sending the correct data | enhancement High Priority | The configure radio command is built with the following frame:
0C 16 00 00 01 00 00 02 RC 01 06 CS
The value RC indicates if the EPD should be a master or not and the number of transmissions of a command is the device is a master.
Now, is possible to set the EPD as a master but the number of transmissions is a... | 1.0 | [ML 8 - RF] The command 126; is not sending the correct data - The configure radio command is built with the following frame:
0C 16 00 00 01 00 00 02 RC 01 06 CS
The value RC indicates if the EPD should be a master or not and the number of transmissions of a command is the device is a master.
Now, is possible ... | non_secu | the command is not sending the correct data the configure radio command is built with the following frame rc cs the value rc indicates if the epd should be a master or not and the number of transmissions of a command is the device is a master now is possible to set the epd as a ma... | 0 |
12,670 | 8,710,323,234 | IssuesEvent | 2018-12-06 16:09:05 | adempiere/adempiere | https://api.github.com/repos/adempiere/adempiere | closed | Improve default features for XML importer | (SC) System Core (SE) Security 01 enhancement | This issue is for set a default features for XML importers from ADempiere | True | Improve default features for XML importer - This issue is for set a default features for XML importers from ADempiere | secu | improve default features for xml importer this issue is for set a default features for xml importers from adempiere | 1 |
45,987 | 13,147,793,305 | IssuesEvent | 2020-08-08 17:36:53 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | closed | Make SSL handshake exceptions and logging useful | area-System.Net.Security enhancement | There is growing number of cases (like #27703) where uses see something like:
```
---> System.Security.Authentication.AuthenticationException: The remote certificate is invalid according to the validation procedure.
at System.Net.Security.SslState.StartSendAuthResetSignal(ProtocolToken message, AsyncProtocolReq... | True | Make SSL handshake exceptions and logging useful - There is growing number of cases (like #27703) where uses see something like:
```
---> System.Security.Authentication.AuthenticationException: The remote certificate is invalid according to the validation procedure.
at System.Net.Security.SslState.StartSendAuth... | secu | make ssl handshake exceptions and logging useful there is growing number of cases like where uses see something like system security authentication authenticationexception the remote certificate is invalid according to the validation procedure at system net security sslstate startsendauthrese... | 1 |
149,544 | 11,905,264,596 | IssuesEvent | 2020-03-30 18:15:47 | IntellectualSites/FastAsyncWorldEdit | https://api.github.com/repos/IntellectualSites/FastAsyncWorldEdit | closed | FAWE returns wrong version on server start | Requires Testing |
**[REQUIRED] FastAsyncWorldEdit Configuration Files:** n/a
<!--- Issue /fawe debugpaste in game or in your console and copy the supplied URL here -->
<!--- If you cannot perform the above, we require logs/latest.log; config.yml and config-legacy.yml -->
<!--- If you are unwilling to supply the information we nee... | 1.0 | FAWE returns wrong version on server start -
**[REQUIRED] FastAsyncWorldEdit Configuration Files:** n/a
<!--- Issue /fawe debugpaste in game or in your console and copy the supplied URL here -->
<!--- If you cannot perform the above, we require logs/latest.log; config.yml and config-legacy.yml -->
<!--- If you a... | non_secu | fawe returns wrong version on server start fastasyncworldedit configuration files n a fastasyncworldedit version number build spigot paper version number n a description of the problem when you start your server you get loading fastasyncworld... | 0 |
267,869 | 28,509,429,880 | IssuesEvent | 2023-04-19 02:02:47 | RG4421/ampere-centos-kernel | https://api.github.com/repos/RG4421/ampere-centos-kernel | closed | CVE-2020-27825 (Medium) detected in linuxv5.2 - autoclosed | Mend: dependency security vulnerability | ## CVE-2020-27825 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv5.2</b></p></summary>
<p>
<p>Linux kernel source tree</p>
<p>Library home page: <a href=https://github.com/tor... | True | CVE-2020-27825 (Medium) detected in linuxv5.2 - autoclosed - ## CVE-2020-27825 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv5.2</b></p></summary>
<p>
<p>Linux kernel source ... | secu | cve medium detected in autoclosed cve medium severity vulnerability vulnerable library linux kernel source tree library home page a href found in base branch amp centos kernel vulnerable source files kernel trace ring buffer c ... | 1 |
303,532 | 26,215,353,688 | IssuesEvent | 2023-01-04 10:29:13 | saleor/saleor-dashboard | https://api.github.com/repos/saleor/saleor-dashboard | closed | Cypress test fail: should be able to sort products by price. TC: SALEOR_2607 | tests | **Known bug for versions:**
v34: true
**Additional Info:**
Spec: As an admin I should be able to sort products | 1.0 | Cypress test fail: should be able to sort products by price. TC: SALEOR_2607 - **Known bug for versions:**
v34: true
**Additional Info:**
Spec: As an admin I should be able to sort products | non_secu | cypress test fail should be able to sort products by price tc saleor known bug for versions true additional info spec as an admin i should be able to sort products | 0 |
9,521 | 13,508,556,670 | IssuesEvent | 2020-09-14 07:54:26 | hajke-gu/text-mod | https://api.github.com/repos/hajke-gu/text-mod | opened | It must be possible to view texts that are longer than fits in the allocated space, or even the screen. | Requirement | # Requirement 2
## Description
"It must be possible to view texts that are longer than fits in the allocated space, or even the screen."
## Acceptance criteria
- Acceptance criteria 1
- Acceptance criteria 2
| 1.0 | It must be possible to view texts that are longer than fits in the allocated space, or even the screen. - # Requirement 2
## Description
"It must be possible to view texts that are longer than fits in the allocated space, or even the screen."
## Acceptance criteria
- Acceptance criteria 1
- Acceptance crit... | non_secu | it must be possible to view texts that are longer than fits in the allocated space or even the screen requirement description it must be possible to view texts that are longer than fits in the allocated space or even the screen acceptance criteria acceptance criteria acceptance crit... | 0 |
205,160 | 23,303,527,302 | IssuesEvent | 2022-08-07 17:29:12 | rsoreq/NodeGoat | https://api.github.com/repos/rsoreq/NodeGoat | closed | CVE-2016-1000232 (Low) detected in tough-cookie-2.2.2.tgz - autoclosed | security vulnerability | ## CVE-2016-1000232 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tough-cookie-2.2.2.tgz</b></p></summary>
<p>RFC6265 Cookies and Cookie Jar for node.js</p>
<p>Library home page: <a h... | True | CVE-2016-1000232 (Low) detected in tough-cookie-2.2.2.tgz - autoclosed - ## CVE-2016-1000232 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tough-cookie-2.2.2.tgz</b></p></summary>
<p>... | secu | cve low detected in tough cookie tgz autoclosed cve low severity vulnerability vulnerable library tough cookie tgz cookies and cookie jar for node js library home page a href path to dependency file package json path to vulnerable library node modules grunt ret... | 1 |
134,617 | 5,231,637,714 | IssuesEvent | 2017-01-30 04:17:09 | talonbragg/Custom-Markup | https://api.github.com/repos/talonbragg/Custom-Markup | closed | XHTML | Done enhancement help wanted Pending Priority: Low question wontfix | Should we use XHTML instead of HTML? XHTML is like HTML and XML mushed together. It has stricter rules and is the better option for services with SSL encryptions. It also offers better support for Internet Explorer.
Read more [here](http://stackoverflow.com/questions/1969290/what-is-the-difference-between-html-and-x... | 1.0 | XHTML - Should we use XHTML instead of HTML? XHTML is like HTML and XML mushed together. It has stricter rules and is the better option for services with SSL encryptions. It also offers better support for Internet Explorer.
Read more [here](http://stackoverflow.com/questions/1969290/what-is-the-difference-between-ht... | non_secu | xhtml should we use xhtml instead of html xhtml is like html and xml mushed together it has stricter rules and is the better option for services with ssl encryptions it also offers better support for internet explorer read more | 0 |
98,256 | 16,361,477,439 | IssuesEvent | 2021-05-14 10:08:29 | Galaxy-Software-Service/Maven_Pom_Demo | https://api.github.com/repos/Galaxy-Software-Service/Maven_Pom_Demo | opened | CVE-2016-3093 (Medium) detected in struts2-core-2.3.15.jar, ognl-3.0.6.jar | security vulnerability | ## CVE-2016-3093 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>struts2-core-2.3.15.jar</b>, <b>ognl-3.0.6.jar</b></p></summary>
<p>
<details><summary><b>struts2-core-2.3.15.jar</... | True | CVE-2016-3093 (Medium) detected in struts2-core-2.3.15.jar, ognl-3.0.6.jar - ## CVE-2016-3093 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>struts2-core-2.3.15.jar</b>, <b>ognl-3.... | secu | cve medium detected in core jar ognl jar cve medium severity vulnerability vulnerable libraries core jar ognl jar core jar apache struts path to dependency file maven pom demo pom xml path to vulnerable library canner repository or... | 1 |
268,820 | 28,862,542,949 | IssuesEvent | 2023-05-05 00:19:55 | Carbonable/carbon-protocol | https://api.github.com/repos/Carbonable/carbon-protocol | reopened | Smart Contract - Transfer ownership improvement | Type: Security Component: Smart Contract Readiness: To be defineds Complexity: Complex Epic: Launchpad | **Description**
---
To secure ownership transfer, we can add a feature to ask the new owner to accept the ownership before processing the transfer.
Feature: [OpenZeppelin!505](https://github.com/OpenZeppelin/cairo-contracts/pull/505)
**Acceptance Criteria**
---
- [ ] Relevant smart contracts adopts the new ... | True | Smart Contract - Transfer ownership improvement - **Description**
---
To secure ownership transfer, we can add a feature to ask the new owner to accept the ownership before processing the transfer.
Feature: [OpenZeppelin!505](https://github.com/OpenZeppelin/cairo-contracts/pull/505)
**Acceptance Criteria**
---... | secu | smart contract transfer ownership improvement description to secure ownership transfer we can add a feature to ask the new owner to accept the ownership before processing the transfer feature acceptance criteria relevant smart contracts adopts the new feature | 1 |
221,530 | 24,642,877,896 | IssuesEvent | 2022-10-17 12:58:52 | MValle21/circonus-unified-agent | https://api.github.com/repos/MValle21/circonus-unified-agent | opened | CVE-2021-38561 (High) detected in golang.org/x/text/language-v0.3.5 | security vulnerability | ## CVE-2021-38561 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>golang.org/x/text/language-v0.3.5</b></p></summary>
<p>Package language implements BCP 47 language tags and related fu... | True | CVE-2021-38561 (High) detected in golang.org/x/text/language-v0.3.5 - ## CVE-2021-38561 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>golang.org/x/text/language-v0.3.5</b></p></summar... | secu | cve high detected in golang org x text language cve high severity vulnerability vulnerable library golang org x text language package language implements bcp language tags and related functionality library home page a href dependency hierarchy github com circon... | 1 |
337,265 | 24,532,684,138 | IssuesEvent | 2022-10-11 17:50:05 | strangelove-ventures/graz | https://api.github.com/repos/strangelove-ventures/graz | opened | Docs: Leap wallet cannot support suggest chain | documentation | We need to inform our user, that leap wallet not support suggest chain, in jsdoc and website documentation | 1.0 | Docs: Leap wallet cannot support suggest chain - We need to inform our user, that leap wallet not support suggest chain, in jsdoc and website documentation | non_secu | docs leap wallet cannot support suggest chain we need to inform our user that leap wallet not support suggest chain in jsdoc and website documentation | 0 |
123,968 | 17,772,422,625 | IssuesEvent | 2021-08-30 15:03:52 | kapseliboi/nuxt-client | https://api.github.com/repos/kapseliboi/nuxt-client | opened | CVE-2021-24033 (Medium) detected in react-dev-utils-9.1.0.tgz | security vulnerability | ## CVE-2021-24033 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>react-dev-utils-9.1.0.tgz</b></p></summary>
<p>Webpack utilities used by Create React App</p>
<p>Library home page: ... | True | CVE-2021-24033 (Medium) detected in react-dev-utils-9.1.0.tgz - ## CVE-2021-24033 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>react-dev-utils-9.1.0.tgz</b></p></summary>
<p>Webpa... | secu | cve medium detected in react dev utils tgz cve medium severity vulnerability vulnerable library react dev utils tgz webpack utilities used by create react app library home page a href path to dependency file nuxt client package json path to vulnerable library nuxt cl... | 1 |
88,456 | 25,408,874,232 | IssuesEvent | 2022-11-22 17:14:31 | mautic/mautic | https://api.github.com/repos/mautic/mautic | closed | Reproducing <!doctype html> on every save of the email | T1 bug ready-to-test builder-legacy stale | [//]: # ( Invisible comment:
IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
Before you create the issue:
IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
Search for similar report among other reported issues.
Learn how to troubleshoot at https://www.mautic.org/docs/en/tips/troubleshooting.html
Use drag&dro... | 1.0 | Reproducing <!doctype html> on every save of the email - [//]: # ( Invisible comment:
IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
Before you create the issue:
IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
Search for similar report among other reported issues.
Learn how to troubleshoot at https://www.m... | non_secu | reproducing on every save of the email invisible comment iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii before you create the issue iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii search for similar report among other reported issues learn how to troubleshoot at use drag drop to attach ima... | 0 |
66,297 | 12,745,084,169 | IssuesEvent | 2020-06-26 13:40:10 | AurityLab/graphql-kotlin-toolkit | https://api.github.com/repos/AurityLab/graphql-kotlin-toolkit | closed | Usage of existing enums | enhancement module: codegen | Sometimes there are already existing enums for the ones used in the GraphQL schema.
The code generator will currently always generate a new enum, which matches the one defined in the schema.
This behavior sometimes results in unnecessarily ugly code, therefore there should be an easier way to do that.
Possible f... | 1.0 | Usage of existing enums - Sometimes there are already existing enums for the ones used in the GraphQL schema.
The code generator will currently always generate a new enum, which matches the one defined in the schema.
This behavior sometimes results in unnecessarily ugly code, therefore there should be an easier way... | non_secu | usage of existing enums sometimes there are already existing enums for the ones used in the graphql schema the code generator will currently always generate a new enum which matches the one defined in the schema this behavior sometimes results in unnecessarily ugly code therefore there should be an easier way... | 0 |
684,935 | 23,438,791,448 | IssuesEvent | 2022-08-15 12:59:16 | flant/negentropy | https://api.github.com/repos/flant/negentropy | opened | documenting | area/docs priority/backlog source/internal-client type/epic | ### Usecase. Why is this important?
System should have documentation for users
### Proposed Solution
1) Repeat deckhouse autodocumenatation:
- deploy components
- write scripts
- implement ci/cd
2) Add needed information into code.
3) Organise third party checking readability and undestandability
### Additiona... | 1.0 | documenting - ### Usecase. Why is this important?
System should have documentation for users
### Proposed Solution
1) Repeat deckhouse autodocumenatation:
- deploy components
- write scripts
- implement ci/cd
2) Add needed information into code.
3) Organise third party checking readability and undestandability
... | non_secu | documenting usecase why is this important system should have documentation for users proposed solution repeat deckhouse autodocumenatation deploy components write scripts implement ci cd add needed information into code organise third party checking readability and undestandability ... | 0 |
210,988 | 23,778,951,928 | IssuesEvent | 2022-09-02 01:06:33 | Vali00/serverless-full-stack-apps-azure-sql | https://api.github.com/repos/Vali00/serverless-full-stack-apps-azure-sql | closed | CVE-2017-0247 (High) detected in system.net.http.4.3.0.nupkg - autoclosed | security vulnerability | ## CVE-2017-0247 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>system.net.http.4.3.0.nupkg</b></p></summary>
<p>Provides a programming interface for modern HTTP applications, includi... | True | CVE-2017-0247 (High) detected in system.net.http.4.3.0.nupkg - autoclosed - ## CVE-2017-0247 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>system.net.http.4.3.0.nupkg</b></p></summary... | secu | cve high detected in system net http nupkg autoclosed cve high severity vulnerability vulnerable library system net http nupkg provides a programming interface for modern http applications including http client components that library home page a href path to depen... | 1 |
167,590 | 26,518,272,993 | IssuesEvent | 2023-01-18 23:00:12 | flutter/flutter | https://api.github.com/repos/flutter/flutter | closed | App bar leading theme overrides should apply to all widgets with IconButton children | f: material design | Relates to https://github.com/flutter/flutter/pull/118216.
This fix allowed users to supply values to `appBarTheme.iconTheme` and `appBarTheme.actionsIconTheme`, which would override any `theme.iconButtonTheme` also set in the theme.
However, this fix only applies to widgets that are directly `IconButtons`. If,... | 1.0 | App bar leading theme overrides should apply to all widgets with IconButton children - Relates to https://github.com/flutter/flutter/pull/118216.
This fix allowed users to supply values to `appBarTheme.iconTheme` and `appBarTheme.actionsIconTheme`, which would override any `theme.iconButtonTheme` also set in the th... | non_secu | app bar leading theme overrides should apply to all widgets with iconbutton children relates to this fix allowed users to supply values to appbartheme icontheme and appbartheme actionsicontheme which would override any theme iconbuttontheme also set in the theme however this fix only applies to wid... | 0 |
204,692 | 23,272,119,355 | IssuesEvent | 2022-08-05 01:05:06 | snykiotcubedev/reactos-0.4.13-release | https://api.github.com/repos/snykiotcubedev/reactos-0.4.13-release | opened | CVE-2016-3709 (Medium) detected in reactosReactOS-0.4.13-release-28-g5724391-src | security vulnerability | ## CVE-2016-3709 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>reactosReactOS-0.4.13-release-28-g5724391-src</b></p></summary>
<p>
<p>An operating system based on the best Windows ... | True | CVE-2016-3709 (Medium) detected in reactosReactOS-0.4.13-release-28-g5724391-src - ## CVE-2016-3709 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>reactosReactOS-0.4.13-release-28-g5... | secu | cve medium detected in reactosreactos release src cve medium severity vulnerability vulnerable library reactosreactos release src an operating system based on the best windows nt design principles library home page a href found in head commit a href found... | 1 |
123,720 | 17,772,304,356 | IssuesEvent | 2021-08-30 14:57:03 | kapseliboi/platform-status | https://api.github.com/repos/kapseliboi/platform-status | opened | CVE-2020-7656 (Medium) detected in jquery-1.7.1.min.js | security vulnerability | ## CVE-2020-7656 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.1.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="htt... | True | CVE-2020-7656 (Medium) detected in jquery-1.7.1.min.js - ## CVE-2020-7656 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.1.min.js</b></p></summary>
<p>JavaScript library ... | secu | cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file platform status node modules vm browserify example run index html path to vul... | 1 |
24,467 | 12,302,098,557 | IssuesEvent | 2020-05-11 16:24:34 | golang/go | https://api.github.com/repos/golang/go | closed | cmd/compile: optimize division for positive integers | NeedsInvestigation Performance | <!-- Please answer these questions before submitting your issue. Thanks! -->
### What version of Go are you using (`go version`)?
go version go1.13.1 windows/amd64
### Does this issue reproduce with the latest release?
yes
### What did you do?
~~~go
func Indent(width int) string {
const tabsAndSpac... | True | cmd/compile: optimize division for positive integers - <!-- Please answer these questions before submitting your issue. Thanks! -->
### What version of Go are you using (`go version`)?
go version go1.13.1 windows/amd64
### Does this issue reproduce with the latest release?
yes
### What did you do?
~~~... | non_secu | cmd compile optimize division for positive integers what version of go are you using go version go version windows does this issue reproduce with the latest release yes what did you do go func indent width int string const tabsandspaces t t t t t t t t t ... | 0 |
83,008 | 15,683,138,024 | IssuesEvent | 2021-03-25 08:22:27 | raindigi/site-preview | https://api.github.com/repos/raindigi/site-preview | opened | CVE-2020-36048 (High) detected in engine.io-3.5.0.tgz | security vulnerability | ## CVE-2020-36048 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>engine.io-3.5.0.tgz</b></p></summary>
<p>The realtime engine behind Socket.IO. Provides the foundation of a bidirectio... | True | CVE-2020-36048 (High) detected in engine.io-3.5.0.tgz - ## CVE-2020-36048 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>engine.io-3.5.0.tgz</b></p></summary>
<p>The realtime engine b... | secu | cve high detected in engine io tgz cve high severity vulnerability vulnerable library engine io tgz the realtime engine behind socket io provides the foundation of a bidirectional connection between client and server library home page a href path to dependency file sit... | 1 |
243,683 | 26,287,391,090 | IssuesEvent | 2023-01-08 01:04:36 | kaidisn/twilio-video.js | https://api.github.com/repos/kaidisn/twilio-video.js | opened | CVE-2022-0536 (Medium) detected in follow-redirects-1.14.5.tgz | security vulnerability | ## CVE-2022-0536 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>follow-redirects-1.14.5.tgz</b></p></summary>
<p>HTTP and HTTPS modules that follow redirects.</p>
<p>Library home pa... | True | CVE-2022-0536 (Medium) detected in follow-redirects-1.14.5.tgz - ## CVE-2022-0536 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>follow-redirects-1.14.5.tgz</b></p></summary>
<p>HTT... | secu | cve medium detected in follow redirects tgz cve medium severity vulnerability vulnerable library follow redirects tgz http and https modules that follow redirects library home page a href path to dependency file package json path to vulnerable library node modules... | 1 |
232,984 | 25,719,001,883 | IssuesEvent | 2022-12-07 12:24:42 | RG4421/mmRTLS | https://api.github.com/repos/RG4421/mmRTLS | opened | CVE-2022-37603 (High) detected in loader-utils-1.4.0.tgz | security vulnerability | ## CVE-2022-37603 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>loader-utils-1.4.0.tgz</b></p></summary>
<p>utils for webpack loaders</p>
<p>Library home page: <a href="https://regis... | True | CVE-2022-37603 (High) detected in loader-utils-1.4.0.tgz - ## CVE-2022-37603 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>loader-utils-1.4.0.tgz</b></p></summary>
<p>utils for webpa... | secu | cve high detected in loader utils tgz cve high severity vulnerability vulnerable library loader utils tgz utils for webpack loaders library home page a href dependency hierarchy smelte tgz root library rollup plugin postcss tgz postcss ... | 1 |
12,189 | 8,636,080,360 | IssuesEvent | 2018-11-23 04:46:34 | AOSC-Dev/aosc-os-abbs | https://api.github.com/repos/AOSC-Dev/aosc-os-abbs | closed | flashplayer-ppapi: security update to 31.0.0.148 | security to-stable upgrade | <!-- Please remove items do not apply. -->
**CVE IDs:** CVE-2018-15978
**Other security advisory IDs:** APSB18-39, MGASA-2018-0453, RHSA-2018:3618-01
**Descriptions:**
An important vulnerability in Adobe Flash Player 31.0.0.122 and earlier
versions. Successful exploitation could lead to information disclosu... | True | flashplayer-ppapi: security update to 31.0.0.148 - <!-- Please remove items do not apply. -->
**CVE IDs:** CVE-2018-15978
**Other security advisory IDs:** APSB18-39, MGASA-2018-0453, RHSA-2018:3618-01
**Descriptions:**
An important vulnerability in Adobe Flash Player 31.0.0.122 and earlier
versions. Success... | secu | flashplayer ppapi security update to cve ids cve other security advisory ids mgasa rhsa descriptions an important vulnerability in adobe flash player and earlier versions successful exploitation could lead to information disclosure cve ar... | 1 |
147,578 | 19,522,846,333 | IssuesEvent | 2021-12-29 22:30:50 | swagger-api/swagger-codegen | https://api.github.com/repos/swagger-api/swagger-codegen | opened | CVE-2018-12023 (High) detected in multiple libraries | security vulnerability | ## CVE-2018-12023 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.8.9.jar</b>, <b>jackson-databind-2.4.5.jar</b>, <b>jackson-databind-2.6.4.jar</b>, <b>jackson-data... | True | CVE-2018-12023 (High) detected in multiple libraries - ## CVE-2018-12023 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.8.9.jar</b>, <b>jackson-databind-2.4.5.jar<... | secu | cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar jackson databind jar jackson databind jar jackson databind jar general data bi... | 1 |
43,987 | 13,046,216,556 | IssuesEvent | 2020-07-29 08:38:03 | orhanarifoglu/bitti | https://api.github.com/repos/orhanarifoglu/bitti | opened | CVE-2017-3589 (Low) detected in mysql-connector-java-5.1.6.jar | security vulnerability | ## CVE-2017-3589 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.6.jar</b></p></summary>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://d... | True | CVE-2017-3589 (Low) detected in mysql-connector-java-5.1.6.jar - ## CVE-2017-3589 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.6.jar</b></p></summary>
<p>MyS... | secu | cve low detected in mysql connector java jar cve low severity vulnerability vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file tmp ws scm bitti build gradle path to vulnerable library canner gradle ... | 1 |
77,060 | 15,496,264,521 | IssuesEvent | 2021-03-11 02:21:28 | bsbtd/Teste | https://api.github.com/repos/bsbtd/Teste | opened | WS-2019-0425 (Medium) detected in mocha-2.5.3.min.js | security vulnerability | ## WS-2019-0425 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mocha-2.5.3.min.js</b></p></summary>
<p>simple, flexible, fun test framework</p>
<p>Library home page: <a href="https:... | True | WS-2019-0425 (Medium) detected in mocha-2.5.3.min.js - ## WS-2019-0425 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mocha-2.5.3.min.js</b></p></summary>
<p>simple, flexible, fun t... | secu | ws medium detected in mocha min js ws medium severity vulnerability vulnerable library mocha min js simple flexible fun test framework library home page a href path to dependency file teste pro table node modules intersection observer intersection observer test html ... | 1 |
47,470 | 12,036,167,371 | IssuesEvent | 2020-04-13 19:16:22 | tensorflow/tensorflow | https://api.github.com/repos/tensorflow/tensorflow | opened | ImportError: DLL load failed: The specified module could not be found. Failed to load the native TensorFlow runtime. | type:build/install | **System information**
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Windows 10
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- TensorFlow installed from (source or binary): pip install
- TensorFlow version: 2
- Python version: 3.7
- Installed usi... | 1.0 | ImportError: DLL load failed: The specified module could not be found. Failed to load the native TensorFlow runtime. - **System information**
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Windows 10
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- Ten... | non_secu | importerror dll load failed the specified module could not be found failed to load the native tensorflow runtime system information os platform and distribution e g linux ubuntu windows mobile device e g iphone pixel samsung galaxy if the issue happens on mobile device n a tensor... | 0 |
112,619 | 17,093,082,574 | IssuesEvent | 2021-07-08 20:23:51 | mickelsonmichael/js-snackbar | https://api.github.com/repos/mickelsonmichael/js-snackbar | opened | WS-2021-0154 (Medium) detected in glob-parent-3.1.0.tgz, glob-parent-5.1.1.tgz | security vulnerability | ## WS-2021-0154 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-3.1.0.tgz</b>, <b>glob-parent-5.1.1.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-3.1.0.tgz... | True | WS-2021-0154 (Medium) detected in glob-parent-3.1.0.tgz, glob-parent-5.1.1.tgz - ## WS-2021-0154 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-3.1.0.tgz</b>, <b>glob-p... | secu | ws medium detected in glob parent tgz glob parent tgz ws medium severity vulnerability vulnerable libraries glob parent tgz glob parent tgz glob parent tgz strips glob magic from a string to provide the parent directory path library home page a... | 1 |
719,034 | 24,743,103,113 | IssuesEvent | 2022-10-21 07:28:03 | yugabyte/yugabyte-db | https://api.github.com/repos/yugabyte/yugabyte-db | opened | [YSQL] [Pessimistic Locking] [Colocation]: implicit-explicit and explicit-implicit locking not working for colocated tables | area/ysql priority/high QA status/awaiting-triage | ### Description
Version: 2.17.0.0-b1
Observed that waiting behaviour is absent for implicit-explicit and explicit-implicit types of conflicts for colocated tables. | 1.0 | [YSQL] [Pessimistic Locking] [Colocation]: implicit-explicit and explicit-implicit locking not working for colocated tables - ### Description
Version: 2.17.0.0-b1
Observed that waiting behaviour is absent for implicit-explicit and explicit-implicit types of conflicts for colocated tables. | non_secu | implicit explicit and explicit implicit locking not working for colocated tables description version observed that waiting behaviour is absent for implicit explicit and explicit implicit types of conflicts for colocated tables | 0 |
254,081 | 27,344,401,910 | IssuesEvent | 2023-02-27 02:50:07 | opensearch-project/security | https://api.github.com/repos/opensearch-project/security | closed | CVE-2023-25194 (High) detected in kafka-clients-3.0.2.jar | security vulnerability triaged | ## CVE-2023-25194 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>kafka-clients-3.0.2.jar</b></p></summary>
<p></p>
<p>Library home page: <a href="https://kafka.apache.org">https://kaf... | True | CVE-2023-25194 (High) detected in kafka-clients-3.0.2.jar - ## CVE-2023-25194 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>kafka-clients-3.0.2.jar</b></p></summary>
<p></p>
<p>Libra... | secu | cve high detected in kafka clients jar cve high severity vulnerability vulnerable library kafka clients jar library home page a href path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files org apache kafk... | 1 |
280,148 | 30,804,263,333 | IssuesEvent | 2023-08-01 05:40:33 | nidhi7598/hardware_nxp_nfc_AOSP_10_r33 | https://api.github.com/repos/nidhi7598/hardware_nxp_nfc_AOSP_10_r33 | opened | CVE-2020-0153 (Medium) detected in nfcandroid-10.0.0_r1 | Mend: dependency security vulnerability | ## CVE-2020-0153 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>nfcandroid-10.0.0_r1</b></p></summary>
<p>
<p>Bug: 68716290</p>
<p>Library home page: <a href=https://android.googles... | True | CVE-2020-0153 (Medium) detected in nfcandroid-10.0.0_r1 - ## CVE-2020-0153 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>nfcandroid-10.0.0_r1</b></p></summary>
<p>
<p>Bug: 68716290... | secu | cve medium detected in nfcandroid cve medium severity vulnerability vulnerable library nfcandroid bug library home page a href found in head commit a href found in base branch main vulnerable source files halimpl hal phnxpnci... | 1 |
88,832 | 25,515,214,910 | IssuesEvent | 2022-11-28 15:51:11 | NixOS/nixpkgs | https://api.github.com/repos/NixOS/nixpkgs | opened | Enabling Elasticsearch (non OSS) on 22.11 fails | 0.kind: build failure |
### Steps To Reproduce
Steps to reproduce the behavior:
services.elasticsearch.enable = true;
### Build log
https://gist.github.com/f2k1de/73ca3ac9a74424589ad423eef1eef41f
### Additional context
If services.elasticsearch.package is set to pkgs.elasticsearch-oss it works.
### Notify maintainers
<!... | 1.0 | Enabling Elasticsearch (non OSS) on 22.11 fails -
### Steps To Reproduce
Steps to reproduce the behavior:
services.elasticsearch.enable = true;
### Build log
https://gist.github.com/f2k1de/73ca3ac9a74424589ad423eef1eef41f
### Additional context
If services.elasticsearch.package is set to pkgs.elastics... | non_secu | enabling elasticsearch non oss on fails steps to reproduce steps to reproduce the behavior services elasticsearch enable true build log additional context if services elasticsearch package is set to pkgs elasticsearch oss it works notify maintainers please p... | 0 |
58,996 | 11,935,719,619 | IssuesEvent | 2020-04-02 09:04:34 | Regalis11/Barotrauma | https://api.github.com/repos/Regalis11/Barotrauma | closed | Small Pump does not require power | Bug Code | I have searched the issue tracker to check if the issue has already been reported.
Version: 0.9.7.1 (Window)
Reactor off, batteries drained to 0, and junction boxes say 0 power available.
Small pump is connected to power grid and its set state input is connected to a switch. It will still pump water out of the... | 1.0 | Small Pump does not require power - I have searched the issue tracker to check if the issue has already been reported.
Version: 0.9.7.1 (Window)
Reactor off, batteries drained to 0, and junction boxes say 0 power available.
Small pump is connected to power grid and its set state input is connected to a switch.... | non_secu | small pump does not require power i have searched the issue tracker to check if the issue has already been reported version window reactor off batteries drained to and junction boxes say power available small pump is connected to power grid and its set state input is connected to a switch ... | 0 |
136,583 | 18,750,321,313 | IssuesEvent | 2021-11-05 00:26:17 | AlexRogalskiy/github-action-user-contribution | https://api.github.com/repos/AlexRogalskiy/github-action-user-contribution | closed | CVE-2021-32804 (High) detected in tar-2.2.2.tgz, tar-6.1.0.tgz - autoclosed | security vulnerability | ## CVE-2021-32804 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tar-2.2.2.tgz</b>, <b>tar-6.1.0.tgz</b></p></summary>
<p>
<details><summary><b>tar-2.2.2.tgz</b></p></summary>
<p>t... | True | CVE-2021-32804 (High) detected in tar-2.2.2.tgz, tar-6.1.0.tgz - autoclosed - ## CVE-2021-32804 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tar-2.2.2.tgz</b>, <b>tar-6.1.0.tgz</b>... | secu | cve high detected in tar tgz tar tgz autoclosed cve high severity vulnerability vulnerable libraries tar tgz tar tgz tar tgz tar for node library home page a href path to dependency file github action user contribution package json pat... | 1 |
170,076 | 20,842,010,806 | IssuesEvent | 2022-03-21 02:04:55 | n-devs/create-library-react | https://api.github.com/repos/n-devs/create-library-react | opened | CVE-2022-24772 (High) detected in node-forge-0.7.5.tgz | security vulnerability | ## CVE-2022-24772 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.7.5.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI... | True | CVE-2022-24772 (High) detected in node-forge-0.7.5.tgz - ## CVE-2022-24772 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.7.5.tgz</b></p></summary>
<p>JavaScript implemen... | secu | cve high detected in node forge tgz cve high severity vulnerability vulnerable library node forge tgz javascript implementations of network transports cryptography ciphers pki message digests and various utilities library home page a href path to dependency file ... | 1 |
265,161 | 28,244,719,405 | IssuesEvent | 2023-04-06 09:50:26 | hshivhare67/platform_packages_apps_settings_AOSP10_r33 | https://api.github.com/repos/hshivhare67/platform_packages_apps_settings_AOSP10_r33 | closed | CVE-2021-0333 (High) detected in Settingsandroid-10.0.0_r33 - autoclosed | Mend: dependency security vulnerability | ## CVE-2021-0333 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Settingsandroid-10.0.0_r33</b></p></summary>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platfor... | True | CVE-2021-0333 (High) detected in Settingsandroid-10.0.0_r33 - autoclosed - ## CVE-2021-0333 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Settingsandroid-10.0.0_r33</b></p></summary>
... | secu | cve high detected in settingsandroid autoclosed cve high severity vulnerability vulnerable library settingsandroid library home page a href found in head commit a href found in base branch main vulnerable source files src com an... | 1 |
606,288 | 18,759,124,659 | IssuesEvent | 2021-11-05 14:32:14 | eoscostarica/eos-rate | https://api.github.com/repos/eoscostarica/eos-rate | closed | Snackbar component alignment | low priority | Please make sure all snackbar components are centered horizontally. Although I do not have a screenshot I've spotted error messages showing aligned to the left. Thanks. | 1.0 | Snackbar component alignment - Please make sure all snackbar components are centered horizontally. Although I do not have a screenshot I've spotted error messages showing aligned to the left. Thanks. | non_secu | snackbar component alignment please make sure all snackbar components are centered horizontally although i do not have a screenshot i ve spotted error messages showing aligned to the left thanks | 0 |
92,676 | 11,697,277,224 | IssuesEvent | 2020-03-06 11:27:49 | TouK/nussknacker | https://api.github.com/repos/TouK/nussknacker | closed | sliding panels UX | design needed ui | - they look coarse, there are better ways (handle bars)
- right one could be reactive
| 1.0 | sliding panels UX - - they look coarse, there are better ways (handle bars)
- right one could be reactive
| non_secu | sliding panels ux they look coarse there are better ways handle bars right one could be reactive | 0 |
157,111 | 19,914,025,232 | IssuesEvent | 2022-01-25 20:19:59 | dmyers87/LetsPoint | https://api.github.com/repos/dmyers87/LetsPoint | opened | CVE-2020-15168 (Medium) detected in multiple libraries | security vulnerability | ## CVE-2020-15168 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-fetch-1.7.3.tgz</b>, <b>node-fetch-2.6.0.tgz</b>, <b>node-fetch-2.3.0.tgz</b></p></summary>
<p>
<details><sum... | True | CVE-2020-15168 (Medium) detected in multiple libraries - ## CVE-2020-15168 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-fetch-1.7.3.tgz</b>, <b>node-fetch-2.6.0.tgz</b>, <b>... | secu | cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries node fetch tgz node fetch tgz node fetch tgz node fetch tgz a light weight module that brings window fetch to node js and io js library home page a hre... | 1 |
191,301 | 15,284,214,301 | IssuesEvent | 2021-02-23 11:55:48 | neuronsimulator/nrn | https://api.github.com/repos/neuronsimulator/nrn | closed | Linux install instructions recommend installing Python packages from apt | documentation enhancement | The section here https://github.com/neuronsimulator/nrn/blob/master/INSTALL.md#linux-1 recommends installing several Python dependencies from `apt`. This is a nono as they will always install the dependency to the system pythons, which might not be what the user wants. On top of that there is a much larger delay in re... | 1.0 | Linux install instructions recommend installing Python packages from apt - The section here https://github.com/neuronsimulator/nrn/blob/master/INSTALL.md#linux-1 recommends installing several Python dependencies from `apt`. This is a nono as they will always install the dependency to the system pythons, which might not... | non_secu | linux install instructions recommend installing python packages from apt the section here recommends installing several python dependencies from apt this is a nono as they will always install the dependency to the system pythons which might not be what the user wants on top of that there is a much larger dela... | 0 |
66,948 | 20,776,031,458 | IssuesEvent | 2022-03-16 10:33:34 | vector-im/element-web | https://api.github.com/repos/vector-im/element-web | opened | Most of the timeline is missing | T-Defect | ### Steps to reproduce
1. Enter a room
2. Notice there is an upward arrow to scroll up to unread messages
3. Scroll up, but there is nothing to see
### Outcome
#### What did you expect?
I know there are more messages in this room, and I expected to see them.
#### What happened instead?
I see only a couple o... | 1.0 | Most of the timeline is missing - ### Steps to reproduce
1. Enter a room
2. Notice there is an upward arrow to scroll up to unread messages
3. Scroll up, but there is nothing to see
### Outcome
#### What did you expect?
I know there are more messages in this room, and I expected to see them.
#### What happen... | non_secu | most of the timeline is missing steps to reproduce enter a room notice there is an upward arrow to scroll up to unread messages scroll up but there is nothing to see outcome what did you expect i know there are more messages in this room and i expected to see them what happen... | 0 |
11,536 | 8,405,833,655 | IssuesEvent | 2018-10-11 16:12:58 | MicrosoftDocs/windows-itpro-docs | https://api.github.com/repos/MicrosoftDocs/windows-itpro-docs | closed | Office 365 Pro Plus 1808 and ProductName | assigned-to-author information protection security | In 1808 version of Office 365 Pro Plus you updated the product name to "Microsoft Office" from "Microsoft Office 2016" which has resulted in previously working enlightened apps for WIP stopping to work if you leveraged template in ZIP.. XML linked in ZIP above also is not updated...
The root cause of this problem... | True | Office 365 Pro Plus 1808 and ProductName - In 1808 version of Office 365 Pro Plus you updated the product name to "Microsoft Office" from "Microsoft Office 2016" which has resulted in previously working enlightened apps for WIP stopping to work if you leveraged template in ZIP.. XML linked in ZIP above also is not upd... | secu | office pro plus and productname in version of office pro plus you updated the product name to microsoft office from microsoft office which has resulted in previously working enlightened apps for wip stopping to work if you leveraged template in zip xml linked in zip above also is not updated ... | 1 |
674,900 | 23,069,440,991 | IssuesEvent | 2022-07-25 16:35:08 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | closed | System.Text.RegularExpressions work planned for .NET 7 | Epic area-System.Text.RegularExpressions Priority:1 Team:Libraries | **This issue captures the planned work for .NET 7. This list is expected to change throughout the release cycle according to ongoing planning and discussions, with possible additions and subtractions to the scope.**
## Summary
There are currently several efforts for fixing/improving our RegularExpressions engines... | 1.0 | System.Text.RegularExpressions work planned for .NET 7 - **This issue captures the planned work for .NET 7. This list is expected to change throughout the release cycle according to ongoing planning and discussions, with possible additions and subtractions to the scope.**
## Summary
There are currently several ef... | non_secu | system text regularexpressions work planned for net this issue captures the planned work for net this list is expected to change throughout the release cycle according to ongoing planning and discussions with possible additions and subtractions to the scope summary there are currently several ef... | 0 |
21,947 | 4,759,675,171 | IssuesEvent | 2016-10-24 23:31:50 | scikit-learn/scikit-learn | https://api.github.com/repos/scikit-learn/scikit-learn | closed | MultiTaskElasticNet User Guide links to MultiTaskLasso | Documentation Easy Need Contributor | #### Description
MultiTaskElasticNet User Guide links to MultiTaskLasso, press the "Read more in the User guide" link @ http://scikit-learn.org/dev/modules/generated/sklearn.linear_model.MultiTaskElasticNet.html#sklearn.linear_model.MultiTaskElasticNet | 1.0 | MultiTaskElasticNet User Guide links to MultiTaskLasso - #### Description
MultiTaskElasticNet User Guide links to MultiTaskLasso, press the "Read more in the User guide" link @ http://scikit-learn.org/dev/modules/generated/sklearn.linear_model.MultiTaskElasticNet.html#sklearn.linear_model.MultiTaskElasticNet | non_secu | multitaskelasticnet user guide links to multitasklasso description multitaskelasticnet user guide links to multitasklasso press the read more in the user guide link | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.