-
## CVE-2019-16943 - Critical Severity Vulnerability
Vulnerable Library - jackson-databind-2.9.8.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: htt…
-
## CVE-2019-16942 - Critical Severity Vulnerability
Vulnerable Library - jackson-databind-2.9.8.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: htt…
-
## CVE-2019-17531 - Critical Severity Vulnerability
Vulnerable Library - jackson-databind-2.9.8.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: htt…
-
### Expected behavior
```
// 1
var users = dsl.selectFrom(USERS).where(USERS.ID.in(3L)).fetch();
System.out.println(users);
// 2
var multiUser = DSL.multiset(dsl.selectFrom…
-
```
What steps will reproduce the problem?
1. Upload attached form on http://opendatakit.org/use/xlsform/
What is the expected output? What do you see instead?
Successful transformation to XForm ex…
-
```
What steps will reproduce the problem?
1. Upload attached form on http://opendatakit.org/use/xlsform/
What is the expected output? What do you see instead?
Successful transformation to XForm ex…
-
## CVE-2018-12023 - High Severity Vulnerability
Vulnerable Library - jackson-databind-2.9.2.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://…
-
### Is there an existing issue for this?
- [X] I have searched the [existing issues](https://github.com/flutter/flutter/issues)
- [X] I have read the [guide to filing a bug](https://flutter.dev/docs/…
-
```
The help at http://opendatakit.org/help/form-design/binding warns that complex
regex patterns may cause stack overflow crashes. But I think I'm encountering a
different problem with similar symp…
-
```
The help at http://opendatakit.org/help/form-design/binding warns that complex
regex patterns may cause stack overflow crashes. But I think I'm encountering a
different problem with similar symp…