diff --git a/scripts/http-avaya-ipoffice-users.nse b/scripts/http-avaya-ipoffice-users.nse
index 81ab4e697..fca9857c5 100644
--- a/scripts/http-avaya-ipoffice-users.nse
+++ b/scripts/http-avaya-ipoffice-users.nse
@@ -62,7 +62,7 @@ action = function(host, port)
local _, _, name = string.find(user_block, '(.-)')
local _,_, fName = string.find(user_block, '(.-)')
local _,_, ext = string.find(user_block, '(.-)')
- stdnse.debug(1, string.format("User found!\nName: %s\nFull name: %s\nExt:%s", name, fName, ext))
+ stdnse.debug1("User found!\nName: %s\nFull name: %s\nExt:%s", name, fName, ext)
if name ~= nil or fName ~= nil or ext ~= nil then
local user = {}
user.name = name
diff --git a/scripts/http-shellshock.nse b/scripts/http-shellshock.nse
index 4bd90d4b4..625dbb164 100644
--- a/scripts/http-shellshock.nse
+++ b/scripts/http-shellshock.nse
@@ -90,13 +90,13 @@ function generate_http_req(host, port, uri, custom_header, cmd)
local options = {header={}}
options["no_cache"] = true
if custom_header == nil then
- stdnse.debug(1, string.format("Sending '%s' in HTTP headers:User-Agent,Cookie and Referer", cmd))
+ stdnse.debug1("Sending '%s' in HTTP headers:User-Agent,Cookie and Referer", cmd)
options["header"]["User-Agent"] = cmd
options["header"]["Referer"] = cmd
options["header"]["Cookie"] = cmd
options["header"][cmd] = cmd
else
- stdnse.debug(1, string.format("Sending '%s' in HTTP header '%s'", cmd, custom_header))
+ stdnse.debug1("Sending '%s' in HTTP header '%s'", cmd, custom_header)
options["header"][custom_header] = cmd
end
local req = http.get(host, port, uri, options)
@@ -133,7 +133,7 @@ is executing commands injected via malicious HTTP headers.
disclosure = {year = '2014', month = '09', day = '24'},
},
}
- stdnse.debug(1, string.format("Random pattern '%s' was found in page. Host seems vulnerable.", rnd))
+ stdnse.debug1("Random pattern '%s' was found in page. Host seems vulnerable.", rnd)
vuln.state = vulns.STATE.EXPLOIT
if cmd ~= nil then
req = generate_http_req(host, port, uri, http_header, cmd)