-
For converting from Py2 to Py3, it's helpful to know if we can work in subsets. However, you can't convert `c.py` to Py3 if it imports `a` and `b` from `a.py` and `b.py` which are still written in Py…
-
Dear LSC-project team,
the lsc is installed on one of our ubuntu servers and synchronizes some OUs between two LDAP servers. A [Qualys Cloud Agent](https://www.qualys.com/cloud-agent/) has been ins…
-
* terrascan version: v1.10.0
* Operating System: all
### Description
Dockerfiles now support the [heredocs syntax](https://www.docker.com/blog/introduction-to-heredocs-in-dockerfiles/). I tried…
-
Issue Level: Low
First Discovered: 10/12/2018
Remediation Date: 2/9/2019
-
### Feature Description
The title basically explains it. Remive/disable the stale bot.
### Rationale
It closes many valuable and useful issues.
### Mockup
_No response_
### Additiona…
-
## CVE-2023-4732 - Medium Severity Vulnerability
Vulnerable Libraries - linuxlinux-4.19.87, linuxlinux-4.19.87, linuxlinux-4.19.87, linuxlinux-4.19.87
Vulnerability Details
A flaw was fo…
-
## Background
The "Surface macOS and Windows OS vulnerabilities story" (#4345), which was shipped as part of Fleet 4.44, didn't add vulnerability automations for OS vulns. See Figma [here](https://…
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0x1bb39d8990b4949ad2fbf39f4fa27c53e84144613cf7ae081c7f208c44ea996d
**Severity:** low
**Description:**
**Description**…
-
- Suggested list of criteria - add standard code checksum requirement
- Forking code - formal process required to clearly identify code forking, why it was required, who will be responsible for maint…
-
Is there an easy way for the security team in an organization to look at all dependabot results in one place?
From a vulnerability management perspective, it would be helpful to have a list of all…