Hi, I’m scanning a target and got the following error message:
(remote-detect-MDNS.nasl:66) In function 'grabHostInfos()': Missing argument: str_replace(string: s, find: f, replace: r [,count: c])
(remote-detect-MDNS.nasl:73) In function 'grabHostInfos()': make_array: bad value type 0 for arg #2
(remote-detect-MDNS.nasl:94) In function 'grabCpuInfos()': get_array_elem: requesting character after end of string stringa (144 >= 109)
(remote-detect-MDNS.nasl:101) In function 'grabCpuInfos()': make_array: bad value type 0 for arg #4
The reply from the target that being processed is:
Please note that these are no real errors but more or less cosmetic warnings due to some possible too lax response length checks in this aged and 3rdparty detection script.
The messages doesn’t have any affect on the functionality of the VT or the scan itself.
Nevertheless i have created an internal task to check if the response checks can be improved. Please do note that this currently has very low priority and a community provided patch might speed up a progress a lot.
Ah, yes. No worries and thanks a lot for posting such warnings, we really appreciate that because they might only happen when scanning specific environments or similar.
Just wanted to point out that messages like this are in most cases harmless and doesn’t affect a scan in general.