GPars is participating 2021 OSC China Open Source Project Selection , please vote for it!
GPars in 2021 OSC China Open Source Project Selection {{projectVoteCount} has been obtained in, please vote for it!
2021 OSC China Open Source Project Selection It is in hot progress. Come and vote for your favorite open source project!
2021 OSC China Open Source Project Selection>>> Midfield Review
GPars won the 2021 OSC China Open Source Project Selection "The Best Popularity Project" !
Authorization Agreement Apache
development language Groovy
operating system Cross platform
Software type Open source software
Open source organizations nothing
region Unknown
deliverer Small editor
intended for unknown
Recording time 2010-05-20

Software Introduction

With the wide application of parallel computing in computers (the notebooks used by ourselves are already dual core), parallel computing software has gradually come to the front of the stage, and GPars will be used for us Groovy It is convenient to write parallel programs.

GPar (Apache 2 License), formerly GParallelizer. It is an open source parallel class library for Groovy, which provides us with a variety of high-level abstractions, including map/reduce, fork/join, asynchronous closures, actors, agents, dataflow concurrency, and other concepts. It is much easier to write parallel programs with Groovy.

Expand to read the full text

code

Gitee index of is
exceed Items for

comment

Click to lead the topic 📣 Post and join the discussion 🔥
Published information
2012/12/13 00:00

GPars 1.0 release, Groovy concurrency framework

Groovy concurrency framework GPars ushered in a major release of its 1.0!!! GPar (Apache 2 License), formerly GParallelizer. It is an open source parallel class library for Groovy, which provides us with a variety of high-level abstractions, including map/reduce, fork/join, asynchronous closures, actors, agents, dataflow concurrency, and other concepts. It is much easier to write parallel programs with Groovy. Gpars (Groovy Parallel Systems) - Version 1.0.0 Improvement Record: Bug [GPARS-198] - Download l

zero
twelve
Published information
2010/12/20 00:00

GPars 0.11 release, Groovy parallel processing framework

GPar (Apache 2 License), formerly GParallelizer. It is an open source parallel class library for Groovy, which provides us with a variety of high-level abstractions, including map/reduce, fork/join, asynchronous closures, actors, agents, dataflow concurrency, and other concepts. It is much easier to write parallel programs with Groovy. Download address: http://gpars.codehaus.org/Download Improvements include: * Great actor speed up, so now you don't have to shop elsewhere for fast actors * Full-blo...

zero
zero
Published information
2010/05/20 00:00

Gpars 0.10 released

GPars 0.10 has been released. Compared with 0.9, it has made many changes and improvements. Parallel collections renamed the Parallelizer and Asynchronous to GParsPool and GParsExecutorsPool (the method is also renamed accordingly). The GparsPool. withPool() method can use asynchronous closures internally to reorganize the asynchronous closure calling function to unify GParsPool and GParsExecutorsPool functions, without the need to mix two classes to eliminate unnecessary conversions, Improve map/reduce performance Seed values are now allowed to be used for fold () and reduce () methods to increase findAny

zero
zero
No more
Loading failed, please refresh the page
Click to load more
Loading
next page
{{o.pubDate | formatDate}}

{{formatAllHtml(o.title)}}

{{parseInt(o.replyCount) | bigNumberTransform}}
{{parseInt(o.viewCount) | bigNumberTransform}}
No more
No content temporarily
Issued a question and answer
{{o.pubDate | formatDate}}

{{formatAllHtml(o.title)}}

{{parseInt(o.replyCount) | bigNumberTransform}}
{{parseInt(o.viewCount) | bigNumberTransform}}
No more
No content temporarily
Apache Groovy Code Injection Vulnerability
injection
Apache Groovy is an object-oriented programming language based on the Java platform of the Apache Software Foundation, which combines many powerful features of Python, Ruby and Smalltalk. There is a security vulnerability in the MethodClosure class in the runtime/MethodClosure.java file of Apache Groovy from 1.7.0 to 2.4.3. Remote attackers can use this vulnerability to execute arbitrary code or cause a denial of service via a specially crafted serialized object.
CVE-2015-3253 MPS-2015-3848
2023-12-20 19:41
Deserialization vulnerability of untrusted data in Google Guava
Unrestricted or regulated resource allocation
Google Guava is a Java core library of Google, which includes graphic library, function type, I/O and string processing. In Google Guava 11.0 to 24. x, because the AtomicDoubleArray class (when Java serialization is used) and the CompoundOrdering class (when GWT serialization is used) use the immediate allocation method, the content sent by the client and the data size are not checked for rationality. A remote attacker can use this vulnerability to conduct a denial of service attack on the server that relies on this library, and deserialize the data provided by the attacker.
CVE-2018-10237 MPS-2018-5515
2023-12-20 19:41
Netty has HTTP request smuggling vulnerability
HTTP request smuggling
Netty is a non blocking I/O client server framework, which is mainly used to develop Java network applications, such as protocol servers and clients. The affected version of Netty is vulnerable to HTTP request smuggling attacks because Netty incorrectly handles the space before the colon in the HTTP header, such as Transfer Encoding: chunked. Attackers can use this vulnerability to carry out HTTP request smuggling attacks, bypass security controls, and access sensitive data without authorization.
CVE-2019-16869 MPS-2019-12064
2023-12-20 19:41
Netty<=4.1.43. Final has an HTTP request smuggling vulnerability
HTTP request smuggling
Netty is an asynchronous event driven network application framework for rapid development of maintainable high-performance protocol servers and clients. Due to the incomplete repair of CVE-2019-16869, HTTP request smuggling exists in Netty versions before 4.1.43.Final, because Netty incorrectly handles whitespace in Transfer Encoding, such as ([space] Transfer Encoding: Chunked) and Content Length headers. Attackers can maliciously construct request headers to conduct HTTP request smuggling attacks when ELB (Elastic load balancer) sends malicious requests to Netty, so as to obtain sensitive information transmitted in Netty.
CVE-2020-7238 MPS-2020-1320
2023-12-20 19:41
Netty<4.1.44. Final has an HTTP request smuggling vulnerability
HTTP request smuggling
Netty is an asynchronous event driven network application framework for rapid development of maintainable high-performance protocol servers and clients. The HttpObjectDecoder.java class in Netty before 4.1.44. Final lacks the monitoring of the colon in the HTTP header. As a result, the HTTP header without a colon will be interpreted as a separate header or invalid fold (invalid fold) with incorrect syntax. Attackers can use this vulnerability to carry out HTTP request smuggling attacks by sending maliciously constructed http requests to obtain sensitive information transmitted in Netty.
CVE-2019-20444 MPS-2020-1526
2023-12-20 19:41
Netty<4.1.44. Final has an HTTP request smuggling vulnerability
HTTP request smuggling
Netty is a network application framework for rapid development of maintainable high-performance protocol servers and clients. Due to the incomplete repair of CVE-2019-16869, the HttpObjectDecoder.java class in Netty before 4.1.44.Final has an HTTP request smuggling vulnerability due to improper authentication of HTTP/1.1 request headers. Because Netty allows the Content Length header to be accompanied by a second Content Length header or Transfer Encoding header, an attacker can conduct HTTP request smuggling attacks by sending HTTP/1.1 containing maliciously constructed headers, thereby obtaining sensitive file information transmitted by Netty services.
CVE-2019-20445 MPS-2020-1527
2023-12-20 19:41
Google Guava Access Control Error Vulnerability
Improper allocation of key resource permissions
Google Guava is a Java core library of Google, which includes graphic library, function type, I/O and string processing. There is an access control error vulnerability in Guava before 30.0. The vulnerability originates from a temporary directory creation vulnerability in Guava, which allows attackers accessing machines to potentially access data in the temporary directory created by Guava com. google. common. io. Files. createTempDir(). An attacker can use this vulnerability to access the temporary file directory.
CVE-2020-8908 MPS-2020-17429
2023-12-20 19:41
Apache Groovy Temporary Directory Information Disclosure Vulnerability
Incorrect default permissions
Apache Groovy is an object-oriented programming language based on the Java platform. The affected version of Apache Groovy will create a temporary directory shared by all users on the system in the temporary directory of the operating system. This vulnerability only affects Unix like systems and very old versions of Mac OSX and Windows. An attacker can obtain sensitive information in the temporary directory through this vulnerability.
CVE-2020-17521 MPS-2020-17573
2023-12-20 19:41
Guava<32.0.0 has a competitive condition vulnerability
Create a temporary file with insecure permissions
Guava is an open source Java code library developed by Google, which provides commonly used Java tools and data structures. The FileBackedOutputStream class in Guava 1.0 to 31.1 uses Java's default temporary directory to create files. Because the created file name is easy to guess by attackers, in Unix and Android Ice Cream Sandwich systems, attackers with access to the default Java temporary directory are allowed to create malicious files with the same name, causing file conflicts, If an application relies on malicious files created by an attacker, the attacker can manipulate the application's behavior. Version 32.0.0 fixes this vulnerability but is incompatible with the Windows system. It is recommended to upgrade the Windows system to version 32.0.1.
CVE-2023-2976 MPS-mfku-xzh3
2023-12-20 19:41
No more
Loading failed, please refresh the page
Click to load more
Loading
next page
zero comment
thirty-one Collection
 OSCHINA
Log in to view more high-quality content
 Back to top
Top