Skip to content

Commit 6004948

Browse files
author
jvazquez-r7
committed
Fix typo and target name
1 parent 9025b52 commit 6004948

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/linux/smtp/exim4_dovecot_exec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ def initialize(info = {})
2020
super(update_info(info,
2121
'Name' => 'Exim And Dovecot Insecure Configuration Command Injection',
2222
'Description' => %q{
23-
This module exploits a commnad injection vulnerability when using together
23+
This module exploits a command injection vulnerability when using together
2424
Exim and Dovecot with the use_shell option on the Exim configuration. This module
2525
uses the sender address to inject the arbitrary commands, since is one of the
2626
user-controlled variables used by default on example vulnerable configurations. The
@@ -49,7 +49,7 @@ module has been tested successfully on Debian Squeeze by using the default exim4
4949
},
5050
'Targets' =>
5151
[
52-
[ 'Automatic', { }],
52+
[ 'Linux x86', { }],
5353
],
5454
'DisclosureDate' => 'May 03 2013',
5555
'DefaultTarget' => 0))

0 commit comments

Comments
 (0)