Open jesse-zhangh opened 11 months ago
go version go version go1.21.5 linux/amd64
OS Ubuntu 22.04
How can I solve this error? thanks
Error $ go install github.com/GhostTroops/scan4all@2.9.1 go: downloading github.com/GhostTroops/scan4all v0.0.0-20231221140312-fff03b51bf79 go: github.com/GhostTroops/scan4all@2.9.1: create zip: config/51pwn/CVE-2020–26073.yaml: malformed file path "config/51pwn/CVE-2020–26073.yaml": invalid char '–' config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml": invalid char '–' config/51pwn/TPALL/LFI/CVE-2018–14064.yaml: malformed file path "config/51pwn/TPALL/LFI/CVE-2018–14064.yaml": invalid char '–' config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml": invalid char '–' config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml: malformed file path "config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml": invalid char '(' config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml": invalid char '(' config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml": invalid char '(' config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml: malformed file path "config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml": invalid char '(' config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml": invalid char '(' config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml": invalid char '(' config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml: malformed file path "config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml": invalid char '(' config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml: malformed file path "config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml": invalid char '(' config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml: malformed file path "config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml": invalid char '(' config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml: malformed file path "config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml": invalid char '('
$ go install github.com/GhostTroops/scan4all@2.9.1 go: downloading github.com/GhostTroops/scan4all v0.0.0-20231221140312-fff03b51bf79 go: github.com/GhostTroops/scan4all@2.9.1: create zip: config/51pwn/CVE-2020–26073.yaml: malformed file path "config/51pwn/CVE-2020–26073.yaml": invalid char '–' config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml": invalid char '–' config/51pwn/TPALL/LFI/CVE-2018–14064.yaml: malformed file path "config/51pwn/TPALL/LFI/CVE-2018–14064.yaml": invalid char '–' config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml": invalid char '–' config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml: malformed file path "config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml": invalid char '(' config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml": invalid char '(' config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml": invalid char '(' config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml: malformed file path "config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml": invalid char '(' config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml": invalid char '(' config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml": invalid char '(' config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml: malformed file path "config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml": invalid char '(' config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml: malformed file path "config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml": invalid char '(' config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml: malformed file path "config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml": invalid char '(' config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml: malformed file path "config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml": invalid char '('
I am getting the same issue
I also encountered the same problem
update ?????
go version go version go1.21.5 linux/amd64
OS Ubuntu 22.04
How can I solve this error? thanks
Error
$ go install github.com/GhostTroops/scan4all@2.9.1 go: downloading github.com/GhostTroops/scan4all v0.0.0-20231221140312-fff03b51bf79 go: github.com/GhostTroops/scan4all@2.9.1: create zip: config/51pwn/CVE-2020–26073.yaml: malformed file path "config/51pwn/CVE-2020–26073.yaml": invalid char '–' config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/ARPSyndicate/nuclei/cvescan/high/CVE-2020–26073.yaml": invalid char '–' config/51pwn/TPALL/LFI/CVE-2018–14064.yaml: malformed file path "config/51pwn/TPALL/LFI/CVE-2018–14064.yaml": invalid char '–' config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml: malformed file path "config/51pwn/TPALL/Template -2/CVE-2020–26073.yaml": invalid char '–' config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml: malformed file path "config/51pwn/yaml/Adobe Experience Manager(AEM)/CVE-2016-0957.yaml": invalid char '(' config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-0929.yaml": invalid char '(' config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml: malformed file path "config/51pwn/yaml/DNN(前称DotNetNuke)/CVE-2017-9822.yaml": invalid char '(' config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml: malformed file path "config/51pwn/yaml/Intel McAfee Network Data Loss Prevention(NDLP)/CVE-2017-4011.yaml": invalid char '(' config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2000-0114.yaml": invalid char '(' config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml: malformed file path "config/51pwn/yaml/Internet Information Services(IIS)/CVE-2017-7269.yaml": invalid char '(' config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml: malformed file path "config/51pwn/yaml/Nordex NC2(Nordex Control 2)/CVE-2015-6477.yaml": invalid char '(' config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml: malformed file path "config/51pwn/yaml/Six Apart Movable Type(MT)/CVE-2021-20837.yaml": invalid char '(' config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml: malformed file path "config/51pwn/yaml/Smart Update Manager(SUM)/CVE-2020-7136.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-066512.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2014-078679.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/wooyun-2015-096676.yaml": invalid char '(' config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml: malformed file path "config/51pwn/yaml/用友人力资源管理系统(e-HR)/yonyou_EHR-xxe-smartweb2.yaml": invalid char '(' config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml: malformed file path "config/51pwn/yaml/绿盟综合威胁探针(NSFOCUS UTS)/lvmeng-uts-disclosure.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-1.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-SQLi-2.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/74cms-front-desk-getshell.yaml": invalid char '(' config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml: malformed file path "config/51pwn/yaml/骑士CMS(74CMS)/CVE-2020-22210.yaml": invalid char '('