Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

malformed file path " #178

Open
climax0x opened this issue Mar 13, 2024 · 1 comment
Open

malformed file path " #178

climax0x opened this issue Mar 13, 2024 · 1 comment

Comments

@climax0x
Copy link

climax0x commented Mar 13, 2024

root$ go install github.com/GhostTroops/scan4all@2.8.9

go install github.com/GhostTroops/scan4all@2.8.9
go: downloading github.com/GhostTroops/scan4all v0.0.0-20231124083113-1878eca3657a
go: github.com/GhostTroops/scan4all@2.8.9: create zip: config/51pwn/CVE-2020–26073.yaml: malformed file path "config/51pwn/CVE-2020–26073.yaml": invalid char '–'
config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml": invalid char '–'
config/51pwn/TPALL/LFI/CVE-2018–14064.yaml: malformed file path "config/51pwn/TPALL/LFI/CVE-2018–14064.yaml": invalid char '–'
config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml": invalid char '–'
config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml: malformed file path "config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml": invalid char '('
config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml": invalid char '('
config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml": invalid char '('
config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml: malformed file path "config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml": invalid char '('
config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml": invalid char '('
config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml": invalid char '('
config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml: malformed file path "config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml": invalid char '('
config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml: malformed file path "config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml": invalid char '('
config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml: malformed file path "config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml": invalid char '('
config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml": invalid char '('
config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml": invalid char '('
config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml": invalid char '('
config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml": invalid char '('
config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml: malformed file path "config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml": invalid char '('
config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml": invalid char '('
config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml": invalid char '('
config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml": invalid char '('
config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml": invalid char '('

@a6thmfsin
Copy link

same issue any fix?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants