New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug #2
Comments
In nistAPI modificare https://nvd.nist.gov/general/news/change-timeline cpe23Uri -> cpeName nistAPI.getCPEs(cpe.toCpeString()).execute(); -> genera un null pointer |
exploits-url-github: https://raw.githubusercontent.com/offensive-security/exploitdb/master/files_exploits.csv |
La versione presente nel maven è 1.18.22 non è più supportata per la JDK 21. Si bisogna passare alla 1.18.30 <dependency>
<groupId>org.projectlombok</groupId>
<artifactId>lombok</artifactId>
<version>1.18.30</version>
<scope>true</scope>
</dependency> |
Promemoria per 35729 -> Si dovre provare su macchina linux per vedere se lancia la configurazione |
WP Core works, I'll start eval process as soon as possible (tested with ids 36844, 47720 and 47800). |
Sono cambiate le API del NIST e quindi il programma crasha
The text was updated successfully, but these errors were encountered: