Open hpriya19 opened 5 months ago
@chadlwilson I'll also be improving the error reporting around the NVD API Key (see ovc/55678e58084496f39ca6a92a9fc7dc90b5e82231). I've seen at least one CI with an incorrectly set NVD API Key provide an empty string - which can really cause some confusion and problems.
Yeah, I've seen issues before with Gradle system properties and project properties being read incorrectly (or at the wrong part of Gradle lifecycle) so it'll definitely help to have a bit more "it looks like you're doing something wrong..." here.
Good morning all, I have a big performance issue related to this topic the API 2.0 https://services.nvd.nist.gov/rest/json/cves/2.0 during the last 3/4 days has been returning HTTP code 503 most interrogation from plugin and the process of dependency-check needs up to 1h for finishing....this is unacceptable. I'm using the latest version of the plugin 11.1.0 with NVD API key. I have no others particular configuration on it, some one has some suggestion?
Thank you in advance.
Good morning all, I have a big performance issue related to this topic the API 2.0
All I can say: same here ...
Is it possible to use https://api.vulncheck.com/v3/backup/nist-nvd2 (more info https://docs.vulncheck.com/community/nist-nvd/nvd-2) ? Instead of https://services.nvd.nist.gov/rest/json/cves/2.0 in order to circumvent this issue?
@dspaeth-breuni I suppose so, there's a configuration item called nvdApiEndpoint, see https://jeremylong.github.io/DependencyCheck/dependency-check-maven/check-mojo.html
@ftiercelin thanks for your reply. The vulncheck API needs "Authorization: Bearer
The vulncheck API needs "Authorization: Bearer "
If this is not feasible via the client, you would have to set up some outbound reverse proxy (i.e. with nginx) that enriches your request accordingly.
We accept PRs...
Facing the same issues, 503 errors on all requests
We accept PRs...
This is not as simple as I thought. It's not just about shifting from header 'apiKey:{key}' to header 'Authorization: Bearer {key}' The Vulncheck API isn't working exactly as the NVD one.
I think we need a new type of client in package io.github.jeremylong.openvulnerability.client to handle this new API. Then we could work on using this new client type in this project.
I have created an enhancement request: https://github.com/jeremylong/Open-Vulnerability-Project/issues/231
cc @dspaeth-breuni
OWASP Client version: 9.0.8
We are seeing the services endpoint timeout from last couple of days
We have verified the nvdApiKey is valid. The curl response to the endpoint gives the response below
Is there a change in Service endpoint? Can we get some assistance with this.