Robert Lichtenberger
Robert Lichtenberger
TODO: I should write about the DefaultDecoration in the README.md ...
The leak also occurs with JDK-1.8.0_202
I think the actual bug is in `com.profesorfalken.wmi4java.WMIVBScript.executeScript(String)`.
By adding ``` process.getInputStream().close(); process.getOutputStream().close(); process.getErrorStream().close(); ``` at the end of `executeScript` the leak can be made smaller, but it does not disappear altogether.
> By adding > > ``` > process.getInputStream().close(); > process.getOutputStream().close(); > process.getErrorStream().close(); > ``` > > at the end of `executeScript` the leak can be made smaller, but it does...
> Agreed. Is this something you want to contribute? Yes, depending on strategic decisions within our product, I may be able to look into this.
FWIW I have worked around the problem for the moment, by putting my own `PayloadMethodArgumentResolver` to the top of the list by overriding `afterPropertiesSet` in `RequestMappingHandlerAdapter`, like this: ```java @Override...
> Someone raised a bogus CVE for this project: https://nvd.nist.gov/vuln/detail/CVE-2024-22949. Behind that seems to be someone running an LLM to look for bugs: https://gist.github.com/LLM4IG I've reported that account to GitHub,...
I think I've found the correct way of disputing this CVE. Since the issue is assigned to MITRE, one can use https://cveform.mitre.org/ to send a reject request (which I have...
Technically you can try to workaround be implementing a ``` public class ConnectTimeoutSocket extends Socket { @Override public void connect(SocketAddress endpoint) throws IOException { connect(endpoint, 10000); } } ``` and...