Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
855
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
13 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
240k
binary_label
int64
0
1
97,301
28,147,658,587
IssuesEvent
2023-04-02 17:16:18
tensorflow/tensorflow
https://api.github.com/repos/tensorflow/tensorflow
closed
tflite_runtime wheel file import error in beaglebone black wireless
stat:awaiting tensorflower type:build/install comp:lite subtype: ubuntu/linux TF 2.11
<details><summary>Click to expand!</summary> ### Issue Type Build/Install ### Have you reproduced the bug with TF nightly? Yes ### Source binary ### Tensorflow Version tf ### Custom Code No ### OS Platform and Distribution Debian GNU/Linux 10 (buster) ### Mobile device _No response_ ### Python version 3.7.3 ### Bazel version _No response_ ### GCC/Compiler version _No response_ ### CUDA/cuDNN version _No response_ ### GPU model and memory _No response_ ### Current Behaviour? ```shell i want to install tflite_runtime on beaglebone black wireless, and i build the wheel file follow the https://www.tensorflow.org/lite/guide/build_cmake_pip and i change the -mfpu=neon-vpfv4 to -mfpu=neon becauuse the beaglebone black wireless is not support the vpfv4, after build the wheel file and install in beaglebone black, in python3 code: "from tflite_runtime.interpreter import Interpreter", it output Traceback (most recent call last): File "<stdin>", line 1, in <module> File "/home/debian/.local/lib/python3.7/site-packages/tflite_runtime/interpreter.py", line 33, in <module> from tflite_runtime import _pywrap_tensorflow_interpreter_wrapper as _interpreter_wrapper ImportError: /home/debian/.local/lib/python3.7/site-packages/tflite_runtime/_pywrap_tensorflow_interpreter_wrapper.so: undefined symbol: _ZN6tflite9telemetry20TelemetryReportEventEP13TfLiteContextPKc12TfLiteStatus >>> ``` ### Standalone code to reproduce the issue ```shell from tflite_runtime.interpreter import Interpreter ``` ### Relevant log output _No response_</details>
1.0
tflite_runtime wheel file import error in beaglebone black wireless - <details><summary>Click to expand!</summary> ### Issue Type Build/Install ### Have you reproduced the bug with TF nightly? Yes ### Source binary ### Tensorflow Version tf ### Custom Code No ### OS Platform and Distribution Debian GNU/Linux 10 (buster) ### Mobile device _No response_ ### Python version 3.7.3 ### Bazel version _No response_ ### GCC/Compiler version _No response_ ### CUDA/cuDNN version _No response_ ### GPU model and memory _No response_ ### Current Behaviour? ```shell i want to install tflite_runtime on beaglebone black wireless, and i build the wheel file follow the https://www.tensorflow.org/lite/guide/build_cmake_pip and i change the -mfpu=neon-vpfv4 to -mfpu=neon becauuse the beaglebone black wireless is not support the vpfv4, after build the wheel file and install in beaglebone black, in python3 code: "from tflite_runtime.interpreter import Interpreter", it output Traceback (most recent call last): File "<stdin>", line 1, in <module> File "/home/debian/.local/lib/python3.7/site-packages/tflite_runtime/interpreter.py", line 33, in <module> from tflite_runtime import _pywrap_tensorflow_interpreter_wrapper as _interpreter_wrapper ImportError: /home/debian/.local/lib/python3.7/site-packages/tflite_runtime/_pywrap_tensorflow_interpreter_wrapper.so: undefined symbol: _ZN6tflite9telemetry20TelemetryReportEventEP13TfLiteContextPKc12TfLiteStatus >>> ``` ### Standalone code to reproduce the issue ```shell from tflite_runtime.interpreter import Interpreter ``` ### Relevant log output _No response_</details>
non_priority
tflite runtime wheel file import error in beaglebone black wireless click to expand issue type build install have you reproduced the bug with tf nightly yes source binary tensorflow version tf custom code no os platform and distribution debian gnu linux buster mobile device no response python version bazel version no response gcc compiler version no response cuda cudnn version no response gpu model and memory no response current behaviour shell i want to install tflite runtime on beaglebone black wireless and i build the wheel file follow the and i change the mfpu neon to mfpu neon becauuse the beaglebone black wireless is not support the after build the wheel file and install in beaglebone black in code from tflite runtime interpreter import interpreter it output traceback most recent call last file line in file home debian local lib site packages tflite runtime interpreter py line in from tflite runtime import pywrap tensorflow interpreter wrapper as interpreter wrapper importerror home debian local lib site packages tflite runtime pywrap tensorflow interpreter wrapper so undefined symbol standalone code to reproduce the issue shell from tflite runtime interpreter import interpreter relevant log output no response
0
200,900
22,916,018,204
IssuesEvent
2022-07-17 01:10:01
jnfaerch/elevator-dash
https://api.github.com/repos/jnfaerch/elevator-dash
opened
CVE-2022-32224 (High) detected in activerecord-5.2.0.gem
security vulnerability
## CVE-2022-32224 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>activerecord-5.2.0.gem</b></p></summary> <p>Databases on Rails. Build a persistent domain model by mapping database tables to Ruby classes. Strong conventions for associations, validations, aggregations, migrations, and testing come baked-in.</p> <p>Library home page: <a href="https://rubygems.org/gems/activerecord-5.2.0.gem">https://rubygems.org/gems/activerecord-5.2.0.gem</a></p> <p> Dependency Hierarchy: - rails-5.2.0.gem (Root Library) - :x: **activerecord-5.2.0.gem** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jnfaerch/elevator-dash/commit/3128fc6068f038e9bc4e0217a3c10cf39316d88e">3128fc6068f038e9bc4e0217a3c10cf39316d88e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> RCE bug with Serialized Columns in Active Record before 5.2.8.1, 6.0.0 and before 6.0.5.1, 6.1.0 and before 6.1.6.1, 7.0.0 and before 7.0.3. When serialized columns that use YAML (the default) are deserialized, Rails uses YAML.unsafe_load to convert the YAML data in to Ruby objects. If an attacker can manipulate data in the database (via means like SQL injection), then it may be possible for the attacker to escalate to an RCE. <p>Publish Date: 2022-06-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-32224>CVE-2022-32224</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-3hhc-qp5v-9p2j">https://github.com/advisories/GHSA-3hhc-qp5v-9p2j</a></p> <p>Release Date: 2022-06-02</p> <p>Fix Resolution: activerecord - 5.2.8.1,6.0.5.1,6.1.6.1,7.0.3.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-32224 (High) detected in activerecord-5.2.0.gem - ## CVE-2022-32224 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>activerecord-5.2.0.gem</b></p></summary> <p>Databases on Rails. Build a persistent domain model by mapping database tables to Ruby classes. Strong conventions for associations, validations, aggregations, migrations, and testing come baked-in.</p> <p>Library home page: <a href="https://rubygems.org/gems/activerecord-5.2.0.gem">https://rubygems.org/gems/activerecord-5.2.0.gem</a></p> <p> Dependency Hierarchy: - rails-5.2.0.gem (Root Library) - :x: **activerecord-5.2.0.gem** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jnfaerch/elevator-dash/commit/3128fc6068f038e9bc4e0217a3c10cf39316d88e">3128fc6068f038e9bc4e0217a3c10cf39316d88e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> RCE bug with Serialized Columns in Active Record before 5.2.8.1, 6.0.0 and before 6.0.5.1, 6.1.0 and before 6.1.6.1, 7.0.0 and before 7.0.3. When serialized columns that use YAML (the default) are deserialized, Rails uses YAML.unsafe_load to convert the YAML data in to Ruby objects. If an attacker can manipulate data in the database (via means like SQL injection), then it may be possible for the attacker to escalate to an RCE. <p>Publish Date: 2022-06-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-32224>CVE-2022-32224</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-3hhc-qp5v-9p2j">https://github.com/advisories/GHSA-3hhc-qp5v-9p2j</a></p> <p>Release Date: 2022-06-02</p> <p>Fix Resolution: activerecord - 5.2.8.1,6.0.5.1,6.1.6.1,7.0.3.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in activerecord gem cve high severity vulnerability vulnerable library activerecord gem databases on rails build a persistent domain model by mapping database tables to ruby classes strong conventions for associations validations aggregations migrations and testing come baked in library home page a href dependency hierarchy rails gem root library x activerecord gem vulnerable library found in head commit a href vulnerability details rce bug with serialized columns in active record before and before and before and before when serialized columns that use yaml the default are deserialized rails uses yaml unsafe load to convert the yaml data in to ruby objects if an attacker can manipulate data in the database via means like sql injection then it may be possible for the attacker to escalate to an rce publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution activerecord step up your open source security game with mend
0
11,191
13,957,699,394
IssuesEvent
2020-10-24 08:12:42
alexanderkotsev/geoportal
https://api.github.com/repos/alexanderkotsev/geoportal
opened
MT - MITA: Harvest
Geoportal Harvesting process MT - Malta
Good Morning Angelo, Kindly can you please perform a harvest on the Maltese CSW as we had a problem and we need to check some changes we did. Thanks in advance for your help. Regards, Rene
1.0
MT - MITA: Harvest - Good Morning Angelo, Kindly can you please perform a harvest on the Maltese CSW as we had a problem and we need to check some changes we did. Thanks in advance for your help. Regards, Rene
non_priority
mt mita harvest good morning angelo kindly can you please perform a harvest on the maltese csw as we had a problem and we need to check some changes we did thanks in advance for your help regards rene
0
90,099
15,856,061,788
IssuesEvent
2021-04-08 01:25:40
rammatzkvosky/react-middle-truncate
https://api.github.com/repos/rammatzkvosky/react-middle-truncate
opened
CVE-2019-20920 (High) detected in handlebars-4.1.2.tgz
security vulnerability
## CVE-2019-20920 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.1.2.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz</a></p> <p>Path to dependency file: react-middle-truncate/package.json</p> <p>Path to vulnerable library: react-middle-truncate/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - nyc-14.1.1.tgz (Root Library) - istanbul-reports-2.2.6.tgz - :x: **handlebars-4.1.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS). <p>Publish Date: 2020-09-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20920>CVE-2019-20920</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p> <p>Release Date: 2020-10-15</p> <p>Fix Resolution: handlebars - 4.5.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"handlebars","packageVersion":"4.1.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"nyc:14.1.1;istanbul-reports:2.2.6;handlebars:4.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"handlebars - 4.5.3"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2019-20920","vulnerabilityDetails":"Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim\u0027s browser (effectively serving as XSS).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20920","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-20920 (High) detected in handlebars-4.1.2.tgz - ## CVE-2019-20920 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.1.2.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz</a></p> <p>Path to dependency file: react-middle-truncate/package.json</p> <p>Path to vulnerable library: react-middle-truncate/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - nyc-14.1.1.tgz (Root Library) - istanbul-reports-2.2.6.tgz - :x: **handlebars-4.1.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS). <p>Publish Date: 2020-09-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20920>CVE-2019-20920</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p> <p>Release Date: 2020-10-15</p> <p>Fix Resolution: handlebars - 4.5.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"handlebars","packageVersion":"4.1.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"nyc:14.1.1;istanbul-reports:2.2.6;handlebars:4.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"handlebars - 4.5.3"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2019-20920","vulnerabilityDetails":"Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim\u0027s browser (effectively serving as XSS).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20920","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in handlebars tgz cve high severity vulnerability vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file react middle truncate package json path to vulnerable library react middle truncate node modules handlebars package json dependency hierarchy nyc tgz root library istanbul reports tgz x handlebars tgz vulnerable library vulnerability details handlebars before and x before is vulnerable to arbitrary code execution the lookup helper fails to properly validate templates allowing attackers to submit templates that execute arbitrary javascript this can be used to run arbitrary code on a server processing handlebars templates or in a victim s browser effectively serving as xss publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree nyc istanbul reports handlebars isminimumfixversionavailable true minimumfixversion handlebars basebranches vulnerabilityidentifier cve vulnerabilitydetails handlebars before and x before is vulnerable to arbitrary code execution the lookup helper fails to properly validate templates allowing attackers to submit templates that execute arbitrary javascript this can be used to run arbitrary code on a server processing handlebars templates or in a victim browser effectively serving as xss vulnerabilityurl
0
245,360
26,545,609,745
IssuesEvent
2023-01-19 23:44:45
oxidecomputer/omicron
https://api.github.com/repos/oxidecomputer/omicron
opened
basic hardening
security mvp
Tracking issue for testing (and probably fixing) basic hardening of the external API/console server, like that we close connections that have been open and idle (several cases).
True
basic hardening - Tracking issue for testing (and probably fixing) basic hardening of the external API/console server, like that we close connections that have been open and idle (several cases).
non_priority
basic hardening tracking issue for testing and probably fixing basic hardening of the external api console server like that we close connections that have been open and idle several cases
0
221,748
17,026,391,091
IssuesEvent
2021-07-03 16:00:10
mjgiannelli/challenge-10-team-profile-generator
https://api.github.com/repos/mjgiannelli/challenge-10-team-profile-generator
closed
Create Directory
documentation
__tests__/ Employee.test.js Engineer.test.js Intern.test.js Manager.test.js dist/ lib/ src/ index.js
1.0
Create Directory - __tests__/ Employee.test.js Engineer.test.js Intern.test.js Manager.test.js dist/ lib/ src/ index.js
non_priority
create directory tests employee test js engineer test js intern test js manager test js dist lib src index js
0
118,518
15,304,535,612
IssuesEvent
2021-02-24 17:01:07
kids-first/kf-ui-data-tracker
https://api.github.com/repos/kids-first/kf-ui-data-tracker
closed
Investigator/Contacts
design feature
**Sender**: heathap@email.chop.edu **Comment**: Was expecting being able to see the investigators(s) for the study on this page? Also wondering if we need three tabs or easier to see all of the details on one page? [Open #62 in Usersnap Dashboard](https://usersnap.com/a/#/your-team-oy1k/p/data-tracker-cae9537d/62) <a href='https://usersnappublic.s3.amazonaws.com/2020-09-18/18-20/dcf9519d-6bf6-4d37-b954-f9fe68994fe6.png'>![⚠️ - Investigator/Contacts](https://usersnappublic.s3.amazonaws.com/2020-09-18/18-20/4ad2c4b0-fc08-45f6-a4bf-0a924e9a9f24.jpg)</a> <a href='https://usersnappublic.s3.amazonaws.com/2020-09-18/18-20/dcf9519d-6bf6-4d37-b954-f9fe68994fe6.png'>Download original image</a> **Browser**: Firefox 80 (macOS Mojave) **Referer**: [https://kf-ui-data-tracker.kidsfirstdrc.org/study/SD_Q2F7XA29/basic-info/info](https://kf-ui-data-tracker.kidsfirstdrc.org/study/SD_Q2F7XA29/basic-info/info) **Screen size**: 2560 x 1440 **Browser size**: 1765 x 1097 Powered by [usersnap.com](https://usersnap.com/?utm_source=github_entry&utm_medium=web&utm_campaign=product)
1.0
Investigator/Contacts - **Sender**: heathap@email.chop.edu **Comment**: Was expecting being able to see the investigators(s) for the study on this page? Also wondering if we need three tabs or easier to see all of the details on one page? [Open #62 in Usersnap Dashboard](https://usersnap.com/a/#/your-team-oy1k/p/data-tracker-cae9537d/62) <a href='https://usersnappublic.s3.amazonaws.com/2020-09-18/18-20/dcf9519d-6bf6-4d37-b954-f9fe68994fe6.png'>![⚠️ - Investigator/Contacts](https://usersnappublic.s3.amazonaws.com/2020-09-18/18-20/4ad2c4b0-fc08-45f6-a4bf-0a924e9a9f24.jpg)</a> <a href='https://usersnappublic.s3.amazonaws.com/2020-09-18/18-20/dcf9519d-6bf6-4d37-b954-f9fe68994fe6.png'>Download original image</a> **Browser**: Firefox 80 (macOS Mojave) **Referer**: [https://kf-ui-data-tracker.kidsfirstdrc.org/study/SD_Q2F7XA29/basic-info/info](https://kf-ui-data-tracker.kidsfirstdrc.org/study/SD_Q2F7XA29/basic-info/info) **Screen size**: 2560 x 1440 **Browser size**: 1765 x 1097 Powered by [usersnap.com](https://usersnap.com/?utm_source=github_entry&utm_medium=web&utm_campaign=product)
non_priority
investigator contacts sender heathap email chop edu comment was expecting being able to see the investigators s for the study on this page also wondering if we need three tabs or easier to see all of the details on one page a href browser firefox macos mojave referer screen size x browser size x powered by
0
61,807
25,735,746,855
IssuesEvent
2022-12-08 00:33:13
devssa/onde-codar-em-salvador
https://api.github.com/repos/devssa/onde-codar-em-salvador
closed
Analista de Sistemas Jr na [CAPGEMINI]
SALVADOR JUNIOR JSF GIT JSP JPA REST ANGULAR ORACLE DB JAVA EE SERVLETS FACELETS WEBSERVICES METODOLOGIAS ÁGEIS Stale
<!-- ================================================== POR FAVOR, SÓ POSTE SE A VAGA FOR PARA SALVADOR E CIDADES VIZINHAS! Use: "Desenvolvedor Front-end" ao invés de "Front-End Developer" \o/ Exemplo: `[JAVASCRIPT] [MYSQL] [NODE.JS] Desenvolvedor Front-End na [NOME DA EMPRESA]` ================================================== --> ## Analista de Sistemas Jr ## Local - Salvador ## Requisitos **Obrigatórios:** - Experiencia com programação utilizando plataforma Java EE (ex.:JSP/Servlets/EL, JSF/Facelets, JPA, JTA, EJB, JAX-WS/JAX-RS, JMS, CDI, JDBC, JNDI) - Conhecimento no desenvolvimento de serviços (WebService, RestAPI); - Experiencia em desenvolvimento de frontEnd em Angular, sem contabilizar experiência com AngularJS; - Conhecimento PL/SQL (Oracle) nível de desenvolvedor; - Conhecimento e experiência em metodologias ágeis; - Experiência em ferramentas de build (ex.: Ant, Maven ou Gradle); - Experiência em sistemas de controle de versão (CVS, SourceSafe, SVN, RTC ou Git); ## Como se candidatar - Interessados enviar currículo para: maria-carolina.ferreira@capgemini.com
1.0
Analista de Sistemas Jr na [CAPGEMINI] - <!-- ================================================== POR FAVOR, SÓ POSTE SE A VAGA FOR PARA SALVADOR E CIDADES VIZINHAS! Use: "Desenvolvedor Front-end" ao invés de "Front-End Developer" \o/ Exemplo: `[JAVASCRIPT] [MYSQL] [NODE.JS] Desenvolvedor Front-End na [NOME DA EMPRESA]` ================================================== --> ## Analista de Sistemas Jr ## Local - Salvador ## Requisitos **Obrigatórios:** - Experiencia com programação utilizando plataforma Java EE (ex.:JSP/Servlets/EL, JSF/Facelets, JPA, JTA, EJB, JAX-WS/JAX-RS, JMS, CDI, JDBC, JNDI) - Conhecimento no desenvolvimento de serviços (WebService, RestAPI); - Experiencia em desenvolvimento de frontEnd em Angular, sem contabilizar experiência com AngularJS; - Conhecimento PL/SQL (Oracle) nível de desenvolvedor; - Conhecimento e experiência em metodologias ágeis; - Experiência em ferramentas de build (ex.: Ant, Maven ou Gradle); - Experiência em sistemas de controle de versão (CVS, SourceSafe, SVN, RTC ou Git); ## Como se candidatar - Interessados enviar currículo para: maria-carolina.ferreira@capgemini.com
non_priority
analista de sistemas jr na por favor só poste se a vaga for para salvador e cidades vizinhas use desenvolvedor front end ao invés de front end developer o exemplo desenvolvedor front end na analista de sistemas jr local salvador requisitos obrigatórios experiencia com programação utilizando plataforma java ee ex jsp servlets el jsf facelets jpa jta ejb jax ws jax rs jms cdi jdbc jndi conhecimento no desenvolvimento de serviços webservice restapi experiencia em desenvolvimento de frontend em angular sem contabilizar experiência com angularjs conhecimento pl sql oracle nível de desenvolvedor conhecimento e experiência em metodologias ágeis experiência em ferramentas de build ex ant maven ou gradle experiência em sistemas de controle de versão cvs sourcesafe svn rtc ou git como se candidatar interessados enviar currículo para maria carolina ferreira capgemini com
0