Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: nmap crash report
From: David Fifield <david () bamsoftware com>
Date: Thu, 22 Nov 2012 09:07:40 -0800

On Wed, Nov 21, 2012 at 08:47:53AM -0500, Jeff S. Spradling wrote:
Version: 6.01
Traceback (most recent call last):
  File "zenmapGUI\ScanInterface.pyo", line 539, in verify_execution
  File "zenmapGUI\ScanInterface.pyo", line 581, in load_from_command
  File "zenmapCore\NetworkInventory.pyo", line 143, in add_scan
  File "zenmapCore\NetworkInventory.pyo", line 217, in _update_host_info
  File "zenmapCore\NmapParser.pyo", line 675, in get_port_protocol_dict
ValueError: invalid literal for int() with base 10: ''

Thanks for making this report. This bug will be fixed in the next
release. In the meantime, if you use a port specification like this:
        -p T:1,2,3,U:
(one with no ports for a particular protocol), change your specification
to remove that protocol:
        -p T:1,2,3

http://seclists.org/nmap-dev/2012/q2/877

David Fifield
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
  • nmap crash report Jeff S. Spradling (Nov 22)
    • Re: nmap crash report David Fifield (Nov 22)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]