We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hello there.
I ran following command: echo https://vulnerabletarget.com/ | katana | httpx | nuclei -rl 10 . My output was following: error.txt
echo https://vulnerabletarget.com/ | katana | httpx | nuclei -rl 10
I hope you can fix this bug or help me to fix what I did wrong.
Thanks
I'v expected to get the normal scan results and not ... that.
When I ran that again I got the same output. Sometimes I also got it when I just ran 2. nuclei -u https://vulntargetyc.com/
(For nuclei -v I got the same output too)
__ __ / /_____ _/ /____ ____ ___ _ / '_/ _ / __/ _ / _ \/ _ / /_/\_\\_,_/\__/\_,_/_//_/\_,_/ projectdiscovery.io __ __ __ _ __ / /_ / /_/ /_____ | |/ / / __ \/ __/ __/ __ \| / / / / / /_/ /_/ /_/ / | /_/ /_/\__/\__/ .___/_/|_| /_/ projectdiscovery.io __ _ ____ __ _______/ /__ (_) / __ \/ / / / ___/ / _ \/ / / / / / /_/ / /__/ / __/ / /_/ /_/\__,_/\___/_/\___/_/ v3.3.5 projectdiscovery.io [INF] Current katana version v1.1.1 (latest) [INF] Current httpx version v1.6.9 (latest) [WRN] UI Dashboard is disabled, Use -dashboard option to enable [INF] Started standard crawling for => https://mytwasdaf.com/ many more lines here that i didnt copy goroutine 9586 gp=0xc0094cf6c0 m=nil [runnable]: syscall.Syscall6(0x101, 0xffffffffffffff9c, 0xc00396b320, 0x80000, 0x0, 0x0, 0x0) /usr/lib/go-1.22/src/syscall/syscall_linux.go:91 +0x39 fp=0xc0064d6678 sp=0xc0064d6618 pc=0x4ef059 syscall.openat(0xffffffffffffff9c, {0xc0017e2c00?, 0x58?}, 0x80000, 0x0) /usr/lib/go-1.22/src/syscall/zsyscall_linux_amd64.go:98 +0x90 fp=0xc0064d66e0 sp=0xc0064d6678 pc=0x4ebd90 syscall.Open(...) /usr/lib/go-1.22/src/syscall/syscall_linux.go:280 os.open({0xc0017e2c00?, 0x58?}, 0x1?, 0x58?) /usr/lib/go-1.22/src/os/file_open_unix.go:15 +0x2b fp=0xc0064d6718 sp=0xc0064d66e0 pc=0x51b68b os.openFileNolog({0xc0017e2c00, 0x58}, 0x0, 0x0) /usr/lib/go-1.22/src/os/file_unix.go:272 +0x92 fp=0xc0064d6760 sp=0xc0064d6718 pc=0x51c612 os.OpenFile({0xc0017e2c00, 0x58}, 0x0, 0x0) /usr/lib/go-1.22/src/os/file.go:374 +0x3e fp=0xc0064d6790 sp=0xc0064d6760 pc=0x51a39e os.Open(...) /usr/lib/go-1.22/src/os/file.go:354 github.com/projectdiscovery/nuclei/v3/pkg/catalog/disk.(*DiskCatalog).OpenFile(0xc000a10340, {0xc0017e2c00, 0x58}) /root/nuclei/pkg/catalog/disk/catalog.go:41 +0x6e fp=0xc0064d67f0 sp=0xc0064d6790 pc=0x1ca628e github.com/projectdiscovery/nuclei/v3/pkg/utils.ReaderFromPathOrURL({0xc0017e2c00, 0x58}, {0x3be2dc0, 0xc000a10340}) /root/nuclei/pkg/utils/utils.go:47 +0xd9 fp=0xc0064d6820 sp=0xc0064d67f0 pc=0xdacad9 github.com/projectdiscovery/nuclei/v3/pkg/templates.(*Parser).ParseTemplate(0xc000736f18, {0xc0017e2c00, 0x58}, {0x3be2dc0, 0xc000a10340}) /root/nuclei/pkg/templates/parser.go:88 +0x97 fp=0xc0064d68f8 sp=0xc0064d6820 pc=0x21bc457 github.com/projectdiscovery/nuclei/v3/pkg/templates.(*Parser).LoadTemplate(0x0?, {0xc0017e2c00, 0x58}, {0x28f9d60?, 0xc001988e40}, {0x0, 0x0, 0x0}, {0x3be2dc0, 0xc000a10340}) /root/nuclei/pkg/templates/parser.go:47 +0x8f fp=0xc0064d6a00 sp=0xc0064d68f8 pc=0x21bbf6f github.com/projectdiscovery/nuclei/v3/pkg/catalog/loader.(*Store).LoadTemplatesWithTags.func2({0xc0017e2c00, 0x58}) /root/nuclei/pkg/catalog/loader/loader.go:477 +0xe5 fp=0xc0064d6fc0 sp=0xc0064d6a00 pc=0x2201085 github.com/projectdiscovery/nuclei/v3/pkg/catalog/loader.(*Store).LoadTemplatesWithTags.gowrap1() /root/nuclei/pkg/catalog/loader/loader.go:544 +0x28 fp=0xc0064d6fe0 sp=0xc0064d6fc0 pc=0x2200f68 runtime.goexit({}) /usr/lib/go-1.22/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0064d6fe8 sp=0xc0064d6fe0 pc=0x47b081 created by github.com/projectdiscovery/nuclei/v3/pkg/catalog/loader.(*Store).LoadTemplatesWithTags in goroutine 1 /root/nuclei/pkg/catalog/loader/loader.go:474 +0x2b1 rax 0x0 rbx 0x19a0 rcx 0x7f624317fb1c rdx 0x6 rdi 0x199f rsi 0x19a0 rbp 0x7f61fc4ab8f0 rsp 0x7f61fc4ab8b0 r8 0x0 r9 0x0 r10 0x8 r11 0x246 r12 0x6 r13 0x599010 r14 0x16 r15 0xfffffffffffff rip 0x7f624317fb1c rflags 0x246 cs 0x33 fs 0x0 gs 0x0
- OS: Windows 11 WSL 2 - Nuclei: v3.3.5 - Go: go1.22.2 linux/amd64
No response
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Is there an existing issue for this?
Current Behavior
Hello there.
I ran following command:
echo https://vulnerabletarget.com/ | katana | httpx | nuclei -rl 10
. My output was following: error.txtI hope you can fix this bug or help me to fix what I did wrong.
Thanks
Expected Behavior
I'v expected to get the normal scan results and not ... that.
Steps To Reproduce
When I ran that again I got the same output. Sometimes I also got it when I just ran
2. nuclei -u https://vulntargetyc.com/
(For nuclei -v I got the same output too)
Relevant log output
Environment
Anything else?
No response
The text was updated successfully, but these errors were encountered: