From be338214a03562dfd777fbaefbfc9445bf356aa1 Mon Sep 17 00:00:00 2001 From: djalal Date: Thu, 19 May 2011 18:32:20 +0000 Subject: [PATCH] Update the script name --- scripts/smtp-vuln-cve2011-1720.nse | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/scripts/smtp-vuln-cve2011-1720.nse b/scripts/smtp-vuln-cve2011-1720.nse index 006bf84d1..067eb74f3 100644 --- a/scripts/smtp-vuln-cve2011-1720.nse +++ b/scripts/smtp-vuln-cve2011-1720.nse @@ -8,12 +8,12 @@ Checks for SMTP, SMTPS and Submission vulnerabilities: --- -- @usage --- nmap --script=smtp-check-vulns --script-args='smtp.domain=' -pT:25,465,587 +-- nmap --script=smtp-vuln-cve2011-1720 --script-args='smtp.domain=' -pT:25,465,587 -- -- @output -- PORT STATE SERVICE -- 25/tcp open smtp --- | smtp-check-vulns: +-- | smtp-vuln-cve2011-1720: -- | Postfix Cyrus SASL (CVE-2011-1720): -- | AUTH MECHANISMS: CRAM-MD5 DIGEST-MD5 NTLM PLAIN LOGIN -- | AUTH tests: CRAM-MD5 @@ -85,7 +85,7 @@ function get_domain(host) -- Use the user provided options. local result = stdnse.get_script_args("smtp.domain") or - stdnse.get_script_args("smtp-check-vulns.domain") + stdnse.get_script_args("smtp-vuln-cve2011-1720.domain") if not result then if type(host) == "table" then