-
-
Notifications
You must be signed in to change notification settings - Fork 286
Open
Description
The reference_id field is too long and exceeds the database limit character pipeline v1: varying(200)
We should either truncate the value or increase the size limit in the database.
CVE-2015-2147;OSVDB-118879;OSVDB-118878;OSVDB-118877;OSVDB-118876;OSVDB-118875;OSVDB-118874;OSVDB-118873;OSVDB-118872;OSVDB-118871;OSVDB-118870;OSVDB-118869;OSVDB-118868;OSVDB-118867;OSVDB-118866;OSVDB-118865;OSVDB-118864;OSVDB-118863;OSVDB-118862;OSVDB-118861;OSVDB-118860;OSVDB-118859;OSVDB-118858;OSVDB-11718;CVE-2015-2145;CVE-2015-2143;CVE-2015-2142;CVE-2004-1519
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/backends/utils.py", line 92, in _execute_with_wrappers
return executor(sql, params, many, context)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/backends/utils.py", line 100, in _execute
with self.db.wrap_database_errors:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/utils.py", line 91, in __exit__
raise dj_exc_value.with_traceback(traceback) from exc_value
File "/usr/local/lib/python3.12/site-packages/django/db/backends/utils.py", line 105, in _execute
return self.cursor.execute(sql, params)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
django.db.utils.DataError: value too long for type character varying(200)
2026-02-25 15:35:00.455498 UTC Failed to Create the Vulnerability Exploit-DB with error DataError('value too long for type character varying(200)\n'):
Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/django/db/backends/utils.py", line 105, in _execute
return self.cursor.execute(sql, params)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
psycopg2.errors.StringDataRightTruncation: value too long for type character varying(200)
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels