1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-27 18:09:01 +00:00

more stdnse.print_debug -> stdnse.debug

This is a catchall pattern with a few exclusions.

$ sed -i 's/stdnse.print_debug( *\([0-9]*\) *, *\(.*\))/stdnse.debug\1(\2)/' *.nse
$ sed -i 's/stdnse.print_debug(\(.*\))/stdnse.debug1(\1)/' *.nse

Excluded:
$ svn revert db2-das-info.nse
$ svn revert flume-master-info.nse
$ svn revert http-headers.nse
$ svn revert http-methods.nse
$ svn revert http-unsafe-output-escaping.nse
$ svn revert http-userdir-enum.nse
$ svn revert http-vuln-cve2011-3192.nse
$ svn revert http-vuln-wnr1000-creds.nse
$ svn revert http-wordpress-plugins.nse
$ svn revert telnet-brute.nse
This commit is contained in:
batrick
2014-08-02 02:46:16 +00:00
parent 5e9a8d0777
commit 810f7d4803
135 changed files with 438 additions and 438 deletions

View File

@@ -62,7 +62,7 @@ local probes = {}
--@param response Response table
--@return True if attack vector is found in response's body
local function check_probe_response(response)
stdnse.print_debug(3, "Probe response:\n%s", response.body)
stdnse.debug3("Probe response:\n%s", response.body)
if string.find(response.body, "'\"/><script>alert(1)</script>", 1, true) ~= nil then
return true
end