-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue with tls handshake with tls10 #6095
Issue with tls handshake with tls10 #6095
Comments
try urlencode your payload? |
No, it's still the same problem |
@Superhero-zero thanks for reporting this! looks like issue related to tls connection: @dwisiswant0 FYI
|
Related PR - #4753 |
@Superhero-zero - In the meantime, you can temporarily bypass this issue by running The issue will remain open until the related fix PR is merged and the necessary dependency is bumped here. Once that happens, the issue will be resolved, and no further action will be needed from your end. |
Is there an existing issue for this?
Current Behavior
I discovered an issue when using Nuclei with a self-written PoC. When specifying the Burp proxy using the -p option, the vulnerability is successfully detected. However, when not using the -p option to specify a proxy, Nuclei reports that the vulnerability does not exist.
Test objective:https://119.163.194.78:843
POC:
Expected Behavior
"Expected Behavior: Vulnerability detection should succeed without requiring the -p (proxy) parameter."
Steps To Reproduce
nuclei.exe -u https://119.163.194.78:843/ -t ./test.yaml --debug
Relevant log output
Environment
Anything else?
No response
The text was updated successfully, but these errors were encountered: