1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-21 23:19:03 +00:00

more stdnse.print_debug -> stdnse.debug

$ sed -i 's/stdnse.print_debug( *\([0-9]*\) *, *" *%s *:* *\([^"]*\)" *, *SCRIPT_NAME/stdnse.debug\1("\2"/' *.nse
$ sed -i 's/stdnse.print_debug( *" *%s *:* *\([^"]*\)" *, *SCRIPT_NAME/stdnse.debug1("\1"/' *.nse
This commit is contained in:
batrick
2014-08-02 02:08:12 +00:00
parent a763dc81a8
commit d47acf9f5e
49 changed files with 162 additions and 162 deletions

View File

@@ -91,10 +91,10 @@ end
---
local function check_vuln(host, port)
local evil_uri = TRAVERSAL_QRY..DEFAULT_REMOTE_FILE
stdnse.print_debug(1, "%s:HTTP GET %s", SCRIPT_NAME, evil_uri)
stdnse.debug1("HTTP GET %s", evil_uri)
local response = http.get(host, port, evil_uri)
if response.body and response.status==200 and response.body:match("root:") then
stdnse.print_debug(1, "%s:Pattern 'root:' found.", SCRIPT_NAME, response.body)
stdnse.debug1("Pattern 'root:' found.", response.body)
return true
end
return false
@@ -134,7 +134,7 @@ Possibly vulnerable (Based on the same firmware): WR743ND,WR842ND,WA-901ND,WR941
if response.body and response.status==200 then
stdnse.print_debug(2, "%s", response.body)
if response.body:match("Error") then
stdnse.print_debug(1, "%s:[Error] File not found:%s", SCRIPT_NAME, rfile)
stdnse.debug1("[Error] File not found:%s", rfile)
vuln.extra_info = string.format("%s not found.\n", rfile)
return vuln_report:make_output(vuln)
end