Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: [NSE] Check for CVE-2011-1720 - Postfix SMTP Cyrus SASL memory corruption
From: Henri Doreau <henri.doreau () greenbone net>
Date: Sun, 15 May 2011 16:29:29 +0200

2011/5/14 Martin Holst Swende <martin () swende se>:
Hi,
Did a quick test against a server which appears not to be vulnerable. I
have just one minor correction; in the usage-field, you have written "

nmap --script smtp-check-vuln.nse [--script-args smtp.domain=<domain>] -pT:25,465,587 <host>
"

i.e. "smtp-check-vuln.nse" but the script name is "smtp-check-vulns.nse" (plural 's'). Very minor, but annoying when 
a user does copy-paste from the usage-field. So, either change the script name or the docs.
Regards,
Martin Holst Swende

Djalal can you fix this and commit? As I told you the script looks very good.

That will be our 200th NSE script! :)

Regards.

-- 
Henri Doreau |  Greenbone Networks GmbH  |  http://www.greenbone.net
Neuer Graben 17, 49074 Osnabrueck, Germany | AG Osnabrueck, HR B 202460
Executive Directors: Lukas Grunwald, Dr. Jan-Oliver Wagner
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault