mirror of
https://github.com/nmap/nmap.git
synced 2025-12-27 18:09:01 +00:00
more stdnse.print_debug -> stdnse.debug
This is a catchall pattern with a few exclusions. $ sed -i 's/stdnse.print_debug( *\([0-9]*\) *, *\(.*\))/stdnse.debug\1(\2)/' *.nse $ sed -i 's/stdnse.print_debug(\(.*\))/stdnse.debug1(\1)/' *.nse Excluded: $ svn revert db2-das-info.nse $ svn revert flume-master-info.nse $ svn revert http-headers.nse $ svn revert http-methods.nse $ svn revert http-unsafe-output-escaping.nse $ svn revert http-userdir-enum.nse $ svn revert http-vuln-cve2011-3192.nse $ svn revert http-vuln-wnr1000-creds.nse $ svn revert http-wordpress-plugins.nse $ svn revert telnet-brute.nse
This commit is contained in:
@@ -62,7 +62,7 @@ local probes = {}
|
||||
--@param response Response table
|
||||
--@return True if attack vector is found in response's body
|
||||
local function check_probe_response(response)
|
||||
stdnse.print_debug(3, "Probe response:\n%s", response.body)
|
||||
stdnse.debug3("Probe response:\n%s", response.body)
|
||||
if string.find(response.body, "'\"/><script>alert(1)</script>", 1, true) ~= nil then
|
||||
return true
|
||||
end
|
||||
|
||||
Reference in New Issue
Block a user