-
``` shell
Extract most know archives with one command
extract , archive , tar
extract () {
if [ -f $1 ] ; then
case $1 in
*.tar.bz2) tar xjf $1 ;;
*.tar.gz) tar xz…
-
## Why?
It would be useful to be able to find how resources are related by allowing use of variables in property path syntax.
## Previous work
_not known_
## Proposed solution
…
-
## CVE-2016-3093 - Medium Severity Vulnerability
Vulnerable Library - ognl-3.0.9.jar
OGNL - Object Graph Navigation Library
Library home page: http://ognl.org
Path to dependency file: /modules/objec…
-
**This starter issue is currently on hold because we do not have the capacity to support new contributors working on it.**
--------------
We aim to document all the files listed below.
Each …
-
@vincenzocoia @gvdr @ksedivyhaley @JoeyBernhardt @mynamedaike @pgonzaleze @derekcho
-
### 🚀 Motivation and context
**Context:** The `CriticalPathAnalysis.critical_path_analysis(...)` API provides access to a networkX DiGraph `CPGraph`, which is constructed using multiple `CallStackG…
-
Hello,
I have attempted to use Amcharts in one of my Angular 2 projects. But I am unable to succeed. It does not show any error, but the charts are not displayed. Can somebody find where the mistak…
-
## Finding vulnerable dependencies
Security vulnerabilities can cause a range of problems for your project or the people who use it. A vulnerability could affect the confidentiality, integrity, or a…
-
## Finding vulnerable dependencies
Security vulnerabilities can cause a range of problems for your project or the people who use it. A vulnerability could affect the confidentiality, integrity, or a…
-
## Finding vulnerable dependencies
Security vulnerabilities can cause a range of problems for your project or the people who use it. A vulnerability could affect the confidentiality, integrity, or a…