null value in column "vulnerability_id" of relation "vulnerabilities_exploit" violates not-null constraint
DETAIL: Failing row contains (3, 2026-02-20, RoundCube Webmail contains a deserialization of untrusted data v..., Apply mitigations per vendor instructions, follow applicable BOD..., 2026-03-13, https://roundcube.net/news/2025/06/01/security-updates-1.6.11-an..., f, null, null, null, null, KEV, null, null).
Traceback:
File "/app/vulnerabilities/pipelines/__init__.py", line 110, in execute
step(self)
File "/app/vulnerabilities/pipelines/enhance_with_kev.py", line 60, in add_exploits
vulnerability_exploit_count += add_vulnerability_exploit(
^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/app/vulnerabilities/pipelines/enhance_with_kev.py", line 82, in add_vulnerability_exploit
Exploit.objects.update_or_create(
File "/usr/local/lib/python3.12/site-packages/django/db/models/manager.py", line 87, in manager_method
return getattr(self.get_queryset(), name)(*args, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/models/query.py", line 990, in update_or_create
obj, created = self.select_for_update().get_or_create(
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/models/query.py", line 955, in get_or_create
return self.create(**params), True
^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/models/query.py", line 665, in create
obj.save(force_insert=True, using=self.db)
File "/usr/local/lib/python3.12/site-packages/django/db/models/base.py", line 902, in save
self.save_base(
File "/usr/local/lib/python3.12/site-packages/django/db/models/base.py", line 1008, in save_base
updated = self._save_table(
^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/models/base.py", line 1169, in _save_table
results = self._do_insert(
^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/models/base.py", line 1210, in _do_insert
return manager._insert(
^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/models/manager.py", line 87, in manager_method
return getattr(self.get_queryset(), name)(*args, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/models/query.py", line 1873, in _insert
return query.get_compiler(using=using).execute_sql(returning_fields)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/models/sql/compiler.py", line 1882, in execute_sql
cursor.execute(sql, params)
File "/usr/local/lib/python3.12/site-packages/django/db/backends/utils.py", line 79, in execute
return self._execute_with_wrappers(
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/backends/utils.py", line 92, in _execute_with_wrappers
return executor(sql, params, many, context)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/backends/utils.py", line 100, in _execute
with self.db.wrap_database_errors:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/django/db/utils.py", line 91, in __exit__
raise dj_exc_value.with_traceback(traceback) from exc_value
File "/usr/local/lib/python3.12/site-packages/django/db/backends/utils.py", line 105, in _execute
return self.cursor.execute(sql, params)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
See the error logs below
MetasploitImproverPipeline Error Log 👇
https://public2.vulnerablecode.io/pipelines/enhance_with_metasploit/run/3e6120cd-c5e9-4bd2-b562-c6b7b8449ab7/
VulnerabilityKevPipeline Error Log 👇
https://public2.vulnerablecode.io/pipelines/enhance_with_kev/run/83635fa3-808e-4ea3-866d-f7d96842d2bc/
ExploitDBImproverPipeline Error Log 👇
https://public2.vulnerablecode.io/pipelines/enhance_with_exploitdb/run/1be779c9-2617-47f8-91c8-584c82726900/