Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3 values | title stringlengths 1 855 | labels stringlengths 4 721 | body stringlengths 1 261k | index stringclasses 13 values | text_combine stringlengths 96 261k | label stringclasses 2 values | text stringlengths 96 240k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
97,301 | 28,147,658,587 | IssuesEvent | 2023-04-02 17:16:18 | tensorflow/tensorflow | https://api.github.com/repos/tensorflow/tensorflow | closed | tflite_runtime wheel file import error in beaglebone black wireless | stat:awaiting tensorflower type:build/install comp:lite subtype: ubuntu/linux TF 2.11 | <details><summary>Click to expand!</summary>
### Issue Type
Build/Install
### Have you reproduced the bug with TF nightly?
Yes
### Source
binary
### Tensorflow Version
tf
### Custom Code
No
### OS Platform and Distribution
Debian GNU/Linux 10 (buster)
### Mobile device
_No response_
### Python version
3.7.3
### Bazel version
_No response_
### GCC/Compiler version
_No response_
### CUDA/cuDNN version
_No response_
### GPU model and memory
_No response_
### Current Behaviour?
```shell
i want to install tflite_runtime on beaglebone black wireless, and i build the wheel file follow the https://www.tensorflow.org/lite/guide/build_cmake_pip and i change the -mfpu=neon-vpfv4 to -mfpu=neon becauuse the beaglebone black wireless is not support the vpfv4, after build the wheel file and install in beaglebone black,
in python3 code: "from tflite_runtime.interpreter import Interpreter", it output
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "/home/debian/.local/lib/python3.7/site-packages/tflite_runtime/interpreter.py", line 33, in <module>
from tflite_runtime import _pywrap_tensorflow_interpreter_wrapper as _interpreter_wrapper
ImportError: /home/debian/.local/lib/python3.7/site-packages/tflite_runtime/_pywrap_tensorflow_interpreter_wrapper.so: undefined symbol: _ZN6tflite9telemetry20TelemetryReportEventEP13TfLiteContextPKc12TfLiteStatus
>>>
```
### Standalone code to reproduce the issue
```shell
from tflite_runtime.interpreter import Interpreter
```
### Relevant log output
_No response_</details> | 1.0 | tflite_runtime wheel file import error in beaglebone black wireless - <details><summary>Click to expand!</summary>
### Issue Type
Build/Install
### Have you reproduced the bug with TF nightly?
Yes
### Source
binary
### Tensorflow Version
tf
### Custom Code
No
### OS Platform and Distribution
Debian GNU/Linux 10 (buster)
### Mobile device
_No response_
### Python version
3.7.3
### Bazel version
_No response_
### GCC/Compiler version
_No response_
### CUDA/cuDNN version
_No response_
### GPU model and memory
_No response_
### Current Behaviour?
```shell
i want to install tflite_runtime on beaglebone black wireless, and i build the wheel file follow the https://www.tensorflow.org/lite/guide/build_cmake_pip and i change the -mfpu=neon-vpfv4 to -mfpu=neon becauuse the beaglebone black wireless is not support the vpfv4, after build the wheel file and install in beaglebone black,
in python3 code: "from tflite_runtime.interpreter import Interpreter", it output
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "/home/debian/.local/lib/python3.7/site-packages/tflite_runtime/interpreter.py", line 33, in <module>
from tflite_runtime import _pywrap_tensorflow_interpreter_wrapper as _interpreter_wrapper
ImportError: /home/debian/.local/lib/python3.7/site-packages/tflite_runtime/_pywrap_tensorflow_interpreter_wrapper.so: undefined symbol: _ZN6tflite9telemetry20TelemetryReportEventEP13TfLiteContextPKc12TfLiteStatus
>>>
```
### Standalone code to reproduce the issue
```shell
from tflite_runtime.interpreter import Interpreter
```
### Relevant log output
_No response_</details> | non_priority | tflite runtime wheel file import error in beaglebone black wireless click to expand issue type build install have you reproduced the bug with tf nightly yes source binary tensorflow version tf custom code no os platform and distribution debian gnu linux buster mobile device no response python version bazel version no response gcc compiler version no response cuda cudnn version no response gpu model and memory no response current behaviour shell i want to install tflite runtime on beaglebone black wireless and i build the wheel file follow the and i change the mfpu neon to mfpu neon becauuse the beaglebone black wireless is not support the after build the wheel file and install in beaglebone black in code from tflite runtime interpreter import interpreter it output traceback most recent call last file line in file home debian local lib site packages tflite runtime interpreter py line in from tflite runtime import pywrap tensorflow interpreter wrapper as interpreter wrapper importerror home debian local lib site packages tflite runtime pywrap tensorflow interpreter wrapper so undefined symbol standalone code to reproduce the issue shell from tflite runtime interpreter import interpreter relevant log output no response | 0 |
200,900 | 22,916,018,204 | IssuesEvent | 2022-07-17 01:10:01 | jnfaerch/elevator-dash | https://api.github.com/repos/jnfaerch/elevator-dash | opened | CVE-2022-32224 (High) detected in activerecord-5.2.0.gem | security vulnerability | ## CVE-2022-32224 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>activerecord-5.2.0.gem</b></p></summary>
<p>Databases on Rails. Build a persistent domain model by mapping database tables to Ruby classes. Strong conventions for associations, validations, aggregations, migrations, and testing come baked-in.</p>
<p>Library home page: <a href="https://rubygems.org/gems/activerecord-5.2.0.gem">https://rubygems.org/gems/activerecord-5.2.0.gem</a></p>
<p>
Dependency Hierarchy:
- rails-5.2.0.gem (Root Library)
- :x: **activerecord-5.2.0.gem** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jnfaerch/elevator-dash/commit/3128fc6068f038e9bc4e0217a3c10cf39316d88e">3128fc6068f038e9bc4e0217a3c10cf39316d88e</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
RCE bug with Serialized Columns in Active Record before 5.2.8.1, 6.0.0 and before 6.0.5.1, 6.1.0 and before 6.1.6.1, 7.0.0 and before 7.0.3.
When serialized columns that use YAML (the default) are deserialized, Rails uses YAML.unsafe_load to convert the YAML data in to Ruby objects. If an attacker can manipulate data in the database (via means like SQL injection), then it may be possible for the attacker to escalate to an RCE.
<p>Publish Date: 2022-06-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-32224>CVE-2022-32224</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-3hhc-qp5v-9p2j">https://github.com/advisories/GHSA-3hhc-qp5v-9p2j</a></p>
<p>Release Date: 2022-06-02</p>
<p>Fix Resolution: activerecord - 5.2.8.1,6.0.5.1,6.1.6.1,7.0.3.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-32224 (High) detected in activerecord-5.2.0.gem - ## CVE-2022-32224 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>activerecord-5.2.0.gem</b></p></summary>
<p>Databases on Rails. Build a persistent domain model by mapping database tables to Ruby classes. Strong conventions for associations, validations, aggregations, migrations, and testing come baked-in.</p>
<p>Library home page: <a href="https://rubygems.org/gems/activerecord-5.2.0.gem">https://rubygems.org/gems/activerecord-5.2.0.gem</a></p>
<p>
Dependency Hierarchy:
- rails-5.2.0.gem (Root Library)
- :x: **activerecord-5.2.0.gem** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jnfaerch/elevator-dash/commit/3128fc6068f038e9bc4e0217a3c10cf39316d88e">3128fc6068f038e9bc4e0217a3c10cf39316d88e</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
RCE bug with Serialized Columns in Active Record before 5.2.8.1, 6.0.0 and before 6.0.5.1, 6.1.0 and before 6.1.6.1, 7.0.0 and before 7.0.3.
When serialized columns that use YAML (the default) are deserialized, Rails uses YAML.unsafe_load to convert the YAML data in to Ruby objects. If an attacker can manipulate data in the database (via means like SQL injection), then it may be possible for the attacker to escalate to an RCE.
<p>Publish Date: 2022-06-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-32224>CVE-2022-32224</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-3hhc-qp5v-9p2j">https://github.com/advisories/GHSA-3hhc-qp5v-9p2j</a></p>
<p>Release Date: 2022-06-02</p>
<p>Fix Resolution: activerecord - 5.2.8.1,6.0.5.1,6.1.6.1,7.0.3.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in activerecord gem cve high severity vulnerability vulnerable library activerecord gem databases on rails build a persistent domain model by mapping database tables to ruby classes strong conventions for associations validations aggregations migrations and testing come baked in library home page a href dependency hierarchy rails gem root library x activerecord gem vulnerable library found in head commit a href vulnerability details rce bug with serialized columns in active record before and before and before and before when serialized columns that use yaml the default are deserialized rails uses yaml unsafe load to convert the yaml data in to ruby objects if an attacker can manipulate data in the database via means like sql injection then it may be possible for the attacker to escalate to an rce publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution activerecord step up your open source security game with mend | 0 |
11,191 | 13,957,699,394 | IssuesEvent | 2020-10-24 08:12:42 | alexanderkotsev/geoportal | https://api.github.com/repos/alexanderkotsev/geoportal | opened | MT - MITA: Harvest | Geoportal Harvesting process MT - Malta | Good Morning Angelo,
Kindly can you please perform a harvest on the Maltese CSW as we had a problem and we need to check some changes we did.
Thanks in advance for your help.
Regards,
Rene | 1.0 | MT - MITA: Harvest - Good Morning Angelo,
Kindly can you please perform a harvest on the Maltese CSW as we had a problem and we need to check some changes we did.
Thanks in advance for your help.
Regards,
Rene | non_priority | mt mita harvest good morning angelo kindly can you please perform a harvest on the maltese csw as we had a problem and we need to check some changes we did thanks in advance for your help regards rene | 0 |
90,099 | 15,856,061,788 | IssuesEvent | 2021-04-08 01:25:40 | rammatzkvosky/react-middle-truncate | https://api.github.com/repos/rammatzkvosky/react-middle-truncate | opened | CVE-2019-20920 (High) detected in handlebars-4.1.2.tgz | security vulnerability | ## CVE-2019-20920 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.1.2.tgz</b></p></summary>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz</a></p>
<p>Path to dependency file: react-middle-truncate/package.json</p>
<p>Path to vulnerable library: react-middle-truncate/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- nyc-14.1.1.tgz (Root Library)
- istanbul-reports-2.2.6.tgz
- :x: **handlebars-4.1.2.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).
<p>Publish Date: 2020-09-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20920>CVE-2019-20920</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p>
<p>Release Date: 2020-10-15</p>
<p>Fix Resolution: handlebars - 4.5.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"handlebars","packageVersion":"4.1.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"nyc:14.1.1;istanbul-reports:2.2.6;handlebars:4.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"handlebars - 4.5.3"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2019-20920","vulnerabilityDetails":"Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim\u0027s browser (effectively serving as XSS).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20920","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2019-20920 (High) detected in handlebars-4.1.2.tgz - ## CVE-2019-20920 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.1.2.tgz</b></p></summary>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz</a></p>
<p>Path to dependency file: react-middle-truncate/package.json</p>
<p>Path to vulnerable library: react-middle-truncate/node_modules/handlebars/package.json</p>
<p>
Dependency Hierarchy:
- nyc-14.1.1.tgz (Root Library)
- istanbul-reports-2.2.6.tgz
- :x: **handlebars-4.1.2.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).
<p>Publish Date: 2020-09-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20920>CVE-2019-20920</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1324">https://www.npmjs.com/advisories/1324</a></p>
<p>Release Date: 2020-10-15</p>
<p>Fix Resolution: handlebars - 4.5.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"handlebars","packageVersion":"4.1.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"nyc:14.1.1;istanbul-reports:2.2.6;handlebars:4.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"handlebars - 4.5.3"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2019-20920","vulnerabilityDetails":"Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim\u0027s browser (effectively serving as XSS).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20920","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in handlebars tgz cve high severity vulnerability vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file react middle truncate package json path to vulnerable library react middle truncate node modules handlebars package json dependency hierarchy nyc tgz root library istanbul reports tgz x handlebars tgz vulnerable library vulnerability details handlebars before and x before is vulnerable to arbitrary code execution the lookup helper fails to properly validate templates allowing attackers to submit templates that execute arbitrary javascript this can be used to run arbitrary code on a server processing handlebars templates or in a victim s browser effectively serving as xss publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree nyc istanbul reports handlebars isminimumfixversionavailable true minimumfixversion handlebars basebranches vulnerabilityidentifier cve vulnerabilitydetails handlebars before and x before is vulnerable to arbitrary code execution the lookup helper fails to properly validate templates allowing attackers to submit templates that execute arbitrary javascript this can be used to run arbitrary code on a server processing handlebars templates or in a victim browser effectively serving as xss vulnerabilityurl | 0 |
245,360 | 26,545,609,745 | IssuesEvent | 2023-01-19 23:44:45 | oxidecomputer/omicron | https://api.github.com/repos/oxidecomputer/omicron | opened | basic hardening | security mvp | Tracking issue for testing (and probably fixing) basic hardening of the external API/console server, like that we close connections that have been open and idle (several cases). | True | basic hardening - Tracking issue for testing (and probably fixing) basic hardening of the external API/console server, like that we close connections that have been open and idle (several cases). | non_priority | basic hardening tracking issue for testing and probably fixing basic hardening of the external api console server like that we close connections that have been open and idle several cases | 0 |
221,748 | 17,026,391,091 | IssuesEvent | 2021-07-03 16:00:10 | mjgiannelli/challenge-10-team-profile-generator | https://api.github.com/repos/mjgiannelli/challenge-10-team-profile-generator | closed | Create Directory | documentation | __tests__/
Employee.test.js
Engineer.test.js
Intern.test.js
Manager.test.js
dist/
lib/
src/
index.js | 1.0 | Create Directory - __tests__/
Employee.test.js
Engineer.test.js
Intern.test.js
Manager.test.js
dist/
lib/
src/
index.js | non_priority | create directory tests employee test js engineer test js intern test js manager test js dist lib src index js | 0 |
118,518 | 15,304,535,612 | IssuesEvent | 2021-02-24 17:01:07 | kids-first/kf-ui-data-tracker | https://api.github.com/repos/kids-first/kf-ui-data-tracker | closed | Investigator/Contacts | design feature | **Sender**: heathap@email.chop.edu
**Comment**: Was expecting being able to see the investigators(s) for the study on this page? Also wondering if we need three tabs or easier to see all of the details on one page?
[Open #62 in Usersnap Dashboard](https://usersnap.com/a/#/your-team-oy1k/p/data-tracker-cae9537d/62)
<a href='https://usersnappublic.s3.amazonaws.com/2020-09-18/18-20/dcf9519d-6bf6-4d37-b954-f9fe68994fe6.png'></a>
<a href='https://usersnappublic.s3.amazonaws.com/2020-09-18/18-20/dcf9519d-6bf6-4d37-b954-f9fe68994fe6.png'>Download original image</a>
**Browser**: Firefox 80 (macOS Mojave)
**Referer**: [https://kf-ui-data-tracker.kidsfirstdrc.org/study/SD_Q2F7XA29/basic-info/info](https://kf-ui-data-tracker.kidsfirstdrc.org/study/SD_Q2F7XA29/basic-info/info)
**Screen size**: 2560 x 1440 **Browser size**: 1765 x 1097
Powered by [usersnap.com](https://usersnap.com/?utm_source=github_entry&utm_medium=web&utm_campaign=product)
| 1.0 | Investigator/Contacts - **Sender**: heathap@email.chop.edu
**Comment**: Was expecting being able to see the investigators(s) for the study on this page? Also wondering if we need three tabs or easier to see all of the details on one page?
[Open #62 in Usersnap Dashboard](https://usersnap.com/a/#/your-team-oy1k/p/data-tracker-cae9537d/62)
<a href='https://usersnappublic.s3.amazonaws.com/2020-09-18/18-20/dcf9519d-6bf6-4d37-b954-f9fe68994fe6.png'></a>
<a href='https://usersnappublic.s3.amazonaws.com/2020-09-18/18-20/dcf9519d-6bf6-4d37-b954-f9fe68994fe6.png'>Download original image</a>
**Browser**: Firefox 80 (macOS Mojave)
**Referer**: [https://kf-ui-data-tracker.kidsfirstdrc.org/study/SD_Q2F7XA29/basic-info/info](https://kf-ui-data-tracker.kidsfirstdrc.org/study/SD_Q2F7XA29/basic-info/info)
**Screen size**: 2560 x 1440 **Browser size**: 1765 x 1097
Powered by [usersnap.com](https://usersnap.com/?utm_source=github_entry&utm_medium=web&utm_campaign=product)
| non_priority | investigator contacts sender heathap email chop edu comment was expecting being able to see the investigators s for the study on this page also wondering if we need three tabs or easier to see all of the details on one page a href browser firefox macos mojave referer screen size x browser size x powered by | 0 |
61,807 | 25,735,746,855 | IssuesEvent | 2022-12-08 00:33:13 | devssa/onde-codar-em-salvador | https://api.github.com/repos/devssa/onde-codar-em-salvador | closed | Analista de Sistemas Jr na [CAPGEMINI] | SALVADOR JUNIOR JSF GIT JSP JPA REST ANGULAR ORACLE DB JAVA EE SERVLETS FACELETS WEBSERVICES METODOLOGIAS ÁGEIS Stale | <!--
==================================================
POR FAVOR, SÓ POSTE SE A VAGA FOR PARA SALVADOR E CIDADES VIZINHAS!
Use: "Desenvolvedor Front-end" ao invés de
"Front-End Developer" \o/
Exemplo: `[JAVASCRIPT] [MYSQL] [NODE.JS] Desenvolvedor Front-End na [NOME DA EMPRESA]`
==================================================
-->
## Analista de Sistemas Jr
## Local
- Salvador
## Requisitos
**Obrigatórios:**
- Experiencia com programação utilizando plataforma Java EE (ex.:JSP/Servlets/EL, JSF/Facelets, JPA, JTA, EJB, JAX-WS/JAX-RS, JMS, CDI, JDBC, JNDI)
- Conhecimento no desenvolvimento de serviços (WebService, RestAPI);
- Experiencia em desenvolvimento de frontEnd em Angular, sem contabilizar experiência com AngularJS;
- Conhecimento PL/SQL (Oracle) nível de desenvolvedor;
- Conhecimento e experiência em metodologias ágeis;
- Experiência em ferramentas de build (ex.: Ant, Maven ou Gradle);
- Experiência em sistemas de controle de versão (CVS, SourceSafe, SVN, RTC ou Git);
## Como se candidatar
- Interessados enviar currículo para: maria-carolina.ferreira@capgemini.com
| 1.0 | Analista de Sistemas Jr na [CAPGEMINI] - <!--
==================================================
POR FAVOR, SÓ POSTE SE A VAGA FOR PARA SALVADOR E CIDADES VIZINHAS!
Use: "Desenvolvedor Front-end" ao invés de
"Front-End Developer" \o/
Exemplo: `[JAVASCRIPT] [MYSQL] [NODE.JS] Desenvolvedor Front-End na [NOME DA EMPRESA]`
==================================================
-->
## Analista de Sistemas Jr
## Local
- Salvador
## Requisitos
**Obrigatórios:**
- Experiencia com programação utilizando plataforma Java EE (ex.:JSP/Servlets/EL, JSF/Facelets, JPA, JTA, EJB, JAX-WS/JAX-RS, JMS, CDI, JDBC, JNDI)
- Conhecimento no desenvolvimento de serviços (WebService, RestAPI);
- Experiencia em desenvolvimento de frontEnd em Angular, sem contabilizar experiência com AngularJS;
- Conhecimento PL/SQL (Oracle) nível de desenvolvedor;
- Conhecimento e experiência em metodologias ágeis;
- Experiência em ferramentas de build (ex.: Ant, Maven ou Gradle);
- Experiência em sistemas de controle de versão (CVS, SourceSafe, SVN, RTC ou Git);
## Como se candidatar
- Interessados enviar currículo para: maria-carolina.ferreira@capgemini.com
| non_priority | analista de sistemas jr na por favor só poste se a vaga for para salvador e cidades vizinhas use desenvolvedor front end ao invés de front end developer o exemplo desenvolvedor front end na analista de sistemas jr local salvador requisitos obrigatórios experiencia com programação utilizando plataforma java ee ex jsp servlets el jsf facelets jpa jta ejb jax ws jax rs jms cdi jdbc jndi conhecimento no desenvolvimento de serviços webservice restapi experiencia em desenvolvimento de frontend em angular sem contabilizar experiência com angularjs conhecimento pl sql oracle nível de desenvolvedor conhecimento e experiência em metodologias ágeis experiência em ferramentas de build ex ant maven ou gradle experiência em sistemas de controle de versão cvs sourcesafe svn rtc ou git como se candidatar interessados enviar currículo para maria carolina ferreira capgemini com | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.