dmiller
f4619edece
Update http urls for nmap.org to https
2015-11-05 20:41:05 +00:00
batrick
91a106e7d5
more stdnse.print_debug -> stdnse.debug
...
Manual corrections.
2014-08-02 03:15:44 +00:00
batrick
5161b8642a
stdnse.print_debug -> stdnse.debug1
...
$ sed -i 's/stdnse.print_debug(1, "%s: \([^"]*\)", SCRIPT_NAME/stdnse.debug1("\1"/' *.nse
2014-08-01 21:29:42 +00:00
dmiller
1b71f75aad
Spelling fixes for Lua files
...
Mostly in documentation/comments, but a couple code bugs were caught,
including a call to stdnse.pirnt_debug and a mis-declared variable.
2014-02-19 04:15:46 +00:00
dmiller
fb67a6717e
Re-indent some libs and scripts, change 4 to 2-space indent
...
Mostly found with:
for i in nselib/*.lua scripts/*.nse; do
echo $(perl -lne 'BEGIN{$a=$p=0}next unless $_;/^(\s*)/;' \
-e '$l=length$1;next if$l==$p;$a+=(abs($l-$p)-$a)/$.;' \
-e '$p=$l;END{print$a}' $i) $i
done | sort -nr
And indented with: https://gist.github.com/bonsaiviking/8845871
whois-ip.nse was particularly mangled (probably my fault due to using
vim's built-in indentation script, but it could be structured better)
2014-02-06 23:25:28 +00:00
dmiller
620f9fdb34
Remove trailing whitespace in lua files
...
Whitespace is not significant, so this should not be a problem.
https://secwiki.org/w/Nmap/Code_Standards
2014-01-23 21:51:58 +00:00
perdo
5ac6c7d64a
Fixed errors found by nse_check_globals.
2012-06-06 22:23:02 +00:00
batrick
000f6dc4d9
Lua 5.2 upgrade [1] for NSE.
...
[1] http://seclists.org/nmap-dev/2012/q2/34
2012-05-27 08:53:32 +00:00
batrick
fd80c2d0a6
fixed bad escape sequences
2012-04-02 08:13:54 +00:00
djalal
36b535eba2
Removed an extra unused string.format argument :)
2011-07-11 15:33:52 +00:00
fyodor
511adcb497
Move the brief summary of both vulns into the summary sentence so people see them at a glance from the nsedoc script lists
2011-06-29 01:34:24 +00:00
djalal
b9237eac33
If sending the big body message fails, then just assume that this is
...
a network error, we are sending more than 50MB, but check and count
the result of the final "<CRLF>.<CRLF>" message.
2011-06-27 22:24:13 +00:00
djalal
a1eb090664
Changed the script argument 'smtp-vuln-cve2010-4344.command' to
...
'smtp-vuln-cve2010-4344.cmd' for consistency reasons.
2011-06-26 19:01:09 +00:00
djalal
49774ecf10
o [NSE] Added smtp-vuln-cve2010-4344 script that will check and exploit
...
two vulnerabilities in the Exim SMTP Server:
o CVE-2010-4344: A heap overflow vulnerability.
o CVE-2010-4345: A privileges escalation vulnerability.
2011-06-24 15:37:53 +00:00