-
Notifications
You must be signed in to change notification settings - Fork 666
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Installation error for 2.9.1 #171
Comments
I am getting the same issue |
2 similar comments
I am getting the same issue |
I am getting the same issue |
I also encountered the same problem |
update ????? |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
go version
go version go1.21.5 linux/amd64
OS
Ubuntu 22.04
How can I solve this error?
thanks
Error
$ go install github.com/GhostTroops/[email protected] go: downloading github.com/GhostTroops/scan4all v0.0.0-20231221140312-fff03b51bf79 go: github.com/GhostTroops/[email protected]: create zip: config/51pwn/CVE-2020–26073.yaml: malformed file path "config/51pwn/CVE-2020–26073.yaml": invalid char '–' config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml": invalid char '–' config/51pwn/TPALL/LFI/CVE-2018–14064.yaml: malformed file path "config/51pwn/TPALL/LFI/CVE-2018–14064.yaml": invalid char '–' config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml": invalid char '–' config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml: malformed file path "config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml": invalid char '(' config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml": invalid char '(' config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml": invalid char '(' config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml: malformed file path "config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml": invalid char '(' config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml": invalid char '(' config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml": invalid char '(' config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml: malformed file path "config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml": invalid char '(' config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml: malformed file path "config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml": invalid char '(' config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml: malformed file path "config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml": invalid char '(' config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml: malformed file path "config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml": invalid char '('
The text was updated successfully, but these errors were encountered: