dmiller
cb4b46bd53
Canonicalize authors as tables instead of comma-separated strings
2016-06-09 22:46:42 +00:00
dmiller
f4619edece
Update http urls for nmap.org to https
2015-11-05 20:41:05 +00:00
dmiller
339f0ffd7d
Fix NSEdoc: wrap lines, fix bulleted lists
2015-07-11 04:01:05 +00:00
batrick
810f7d4803
more stdnse.print_debug -> stdnse.debug
...
This is a catchall pattern with a few exclusions.
$ sed -i 's/stdnse.print_debug( *\([0-9]*\) *, *\(.*\))/stdnse.debug\1(\2)/' *.nse
$ sed -i 's/stdnse.print_debug(\(.*\))/stdnse.debug1(\1)/' *.nse
Excluded:
$ svn revert db2-das-info.nse
$ svn revert flume-master-info.nse
$ svn revert http-headers.nse
$ svn revert http-methods.nse
$ svn revert http-unsafe-output-escaping.nse
$ svn revert http-userdir-enum.nse
$ svn revert http-vuln-cve2011-3192.nse
$ svn revert http-vuln-wnr1000-creds.nse
$ svn revert http-wordpress-plugins.nse
$ svn revert telnet-brute.nse
2014-08-02 02:46:16 +00:00
robert
926f3f7375
Tweaked the disclosure date in http-vuln-cve2012-1823 for consistency with other scripts that make use of the vulnerability library.
2014-05-04 15:13:57 +00:00
dmiller
620f9fdb34
Remove trailing whitespace in lua files
...
Whitespace is not significant, so this should not be a problem.
https://secwiki.org/w/Nmap/Code_Standards
2014-01-23 21:51:58 +00:00
sophron
f280a93538
[NSE] Added a detection method and the option to execute a payload. Patch by Paul Amar.
2013-12-09 15:54:43 +00:00
dmiller
31bc2847bd
Normalize script author fields
...
Clean up some typos and differences. Most have been normalized to
whatever form of the name occurred in the largest number of scripts.
Paulino was contacted directly and requested his email be added to all
of his credits.
2013-09-20 18:56:22 +00:00
fyodor
60baeb09b0
Cleaning up the descriptions for 28 scripts for consistency
2012-06-06 20:44:18 +00:00
batrick
000f6dc4d9
Lua 5.2 upgrade [1] for NSE.
...
[1] http://seclists.org/nmap-dev/2012/q2/34
2012-05-27 08:53:32 +00:00
paulino
96c6cd7780
Adds http-vuln-cve2012-1823.nse - This script detects PHP-CGI installations that are vulnerable to CVE-2012-1823. This vulnerability is critical and it allows attackers to retrieve source code and execute code remotely.
2012-05-08 05:56:04 +00:00