-
Application of role failed on CVE-2015-7547.
Error:
```
fatal: [localhost]: FAILED! => {
"msg": "Unexpected templating type error occurred on ({{ item.1.package | regex_search('([^-]+)') }})…
-
***
🚨 **Reminder!** Less than one month left to migrate your repositories over to Snyk before Greenkeeper says goodbye on June 3rd! 💜 🚚💨 💚
[Find out how to migrate to Snyk at greenkeeper.io](https:/…
-
**Dasharo version**
Any
**Dasharo variant**
Any
**Question text**
In [CVE-2023-40238](https://nvd.nist.gov/vuln/detail/CVE-2023-40238) and highlighted in various industry publications…
-
**What steps did you take and what happened:**
After few days starboard operator stucks in following error:
`"level":"error","ts":1647269605.345396,"logger":"controller.job","msg":"Reconciler er…
-
### Current Behavior:
After implementation of #84, grouping different versions or environments into one project is a great feature and improves the overview in the project list. But it has one drawba…
-
## CVE-2009-2625 - Medium Severity Vulnerability
Vulnerable Library - xercesImpl-2.9.1.jar
Xerces2 is the next generation of high performance, fully compliant XML parsers in the
Apache Xerces fa…
-
## CVE-2009-2625 - Medium Severity Vulnerability
Vulnerable Library - xercesImpl-2.9.1.jar
Xerces2 is the next generation of high performance, fully compliant XML parsers in the
Apache Xerces fa…
-
## CVE-2009-2625 - Medium Severity Vulnerability
Vulnerable Library - xercesImpl-2.9.1.jar
Xerces2 is the next generation of high performance, fully compliant XML parsers in the
Apache Xerces fa…
-
## CVE-2009-2625 - Medium Severity Vulnerability
Vulnerable Library - xercesImpl-2.9.1.jar
Xerces2 is the next generation of high performance, fully compliant XML parsers in the
Apache Xerces fa…
-
## CVE-2009-2625 - Medium Severity Vulnerability
Vulnerable Library - xercesImpl-2.9.1.jar
Xerces2 is the next generation of high performance, fully compliant XML parsers in the
Apache Xerces fa…