1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-24 16:39:03 +00:00

Spelling fixes for Lua files

Mostly in documentation/comments, but a couple code bugs were caught,
including a call to stdnse.pirnt_debug and a mis-declared variable.
This commit is contained in:
dmiller
2014-02-19 04:15:46 +00:00
parent 54fa265f5c
commit 1b71f75aad
202 changed files with 532 additions and 532 deletions

View File

@@ -8,7 +8,7 @@
-- Each vulnerability must have its own state:
-- <code>NOT_VULN</code>: The program was confirmed to be not vulnerable.
-- <code>LIKELY_VULN</code>: The program is likely to be vulnerable,
-- this can be the case when we do a simple version comparaison. This
-- this can be the case when we do a simple version comparison. This
-- state should cover possible false positive situations.
-- <code>VULN</code>: The program was confirmed to be vulnerable.
-- <code>EXPLOIT</code>: The program was confirmed to be vulnerable and
@@ -157,7 +157,7 @@
-- </code>
--
-- @args vulns.showall If set, the library will show and report all the
-- registred vulnerabilities which includes the
-- registered vulnerabilities which includes the
-- <code>NOT VULNERABLE</code> ones. By default the library will only
-- report the <code>VULNERABLE</code> entries: <code>VULNERABLE</code>,
-- <code>LIKELY VULNERABLE</code>, <code>VULNERABLE (DoS)</code>
@@ -336,7 +336,7 @@ local VULNS
-- },
-- },
--
-- -- Entries whithout the vulnerability ID are stored here.
-- -- Entries without the vulnerability ID are stored here.
-- 'NMAP_ID' = {
-- 'XXXXX' = {
-- ...
@@ -600,7 +600,7 @@ local default_filter = function(vuln_table) return true end
-- This function just inserts the callback filters in the filters_db.
--
-- @param filters_db The filters database (a table in the registry).
-- @param filter_callback The callbackk function.
-- @param filter_callback The callback function.
-- @return FID The filter ID associated with the callback function.
local register_filter = function(filters_db, filter_callback)
if filter_callback and type(filter_callback) == "function" then
@@ -683,7 +683,7 @@ local l_update_id = function(fid_table, id_type, id, vuln_table)
-- Add the ID vulnerability type if it is missing
l_add_id_type(fid_table, id_type)
-- Make sure that we are referecing the correct tables
-- Make sure that we are referencing the correct tables
fid_table[id_type][id] = fid_table[id_type][id] or {}
fid_table[id_type][id]['ENTRIES'] = fid_table[id_type][id]['ENTRIES'] or {}
local push_table = fid_table[id_type][id]['ENTRIES']
@@ -1015,7 +1015,7 @@ local l_add = function(vulndb, vuln_table)
-- Search the Filters IDS for the vulnerability
for _, fid in ipairs(FIDS) do
for id_type, id in pairs(vuln_table.IDS) do
-- Count how many IDs should be refenrecing the vulnerability
-- Count how many IDs should be referencing the vulnerability
-- entry in all the FILTERS_IDS tables.
ids_count = ids_count + 1
@@ -1564,7 +1564,7 @@ end
-- This function can be used to see if there are any references to the
-- specified vulnerability in the database, it will return
-- <code>True</code> if so which means that one of the scripts has
-- attempted to check this vulnerabilty.
-- attempted to check this vulnerability.
--
-- Scripts must call <code>vulns.save_reports()</code> function first to
-- setup the vulnerability database.
@@ -1712,7 +1712,7 @@ end
--
-- The <code>selection_filter</code> is an optional table parameter of
-- optional fields which can be used to select which vulnerabilities to
-- report, if it is not set then all vulnerabilites entries will be
-- report, if it is not set then all vulnerabilities entries will be
-- returned.
--
-- @usage