| skipped 71 lines |
72 | 72 | | if port != 80: |
73 | 73 | | url += ":%s" % str(port) |
74 | 74 | | |
75 | | - | url += "?q=%s" % args.get("bad_word") |
| 75 | + | if args.get("bad_word"): |
| 76 | + | url += "?q=%s" % args.get("bad_word") |
76 | 77 | | |
77 | 78 | | injected_http = args.get("injected_http_contains") |
78 | 79 | | try: |
| skipped 24 lines |