Skip to content

Commit ef8c0aa

Browse files
committed
Land rapid7#5020, spelling fixes for some modules
2 parents 9cfafdd + 4f4bf9d commit ef8c0aa

File tree

6 files changed

+6
-6
lines changed

6 files changed

+6
-6
lines changed

modules/exploits/multi/misc/java_rmi_server.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ def primer
119119
send_header
120120
ack = recv_protocol_ack
121121
if ack.nil?
122-
fail_with(Failure::NoTarget, "#{peer} - Filed to negotiate RMI protocol")
122+
fail_with(Failure::NoTarget, "#{peer} - Failed to negotiate RMI protocol")
123123
end
124124

125125
jar = rand_text_alpha(rand(8)+1) + '.jar'

modules/exploits/windows/browser/persits_xupload_traversal.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ def initialize(info = {})
2222
2323
Code execution occurs by writing to the All Users Startup Programs directory.
2424
You may want to combine this module with the use of multi/handler since a
25-
user would have to log for the payloda to execute.
25+
user would have to log for the payload to execute.
2626
},
2727
'License' => MSF_LICENSE,
2828
'Author' => [ 'jduck' ],

modules/exploits/windows/games/racer_503beta5.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
super(update_info(info,
1515
'Name' => 'Racer v0.5.3 Beta 5 Buffer Overflow',
1616
'Description' => %q{
17-
This module explots the Racer Car and Racing Simulator game
17+
This module exploits the Racer Car and Racing Simulator game
1818
versions v0.5.3 beta 5 and earlier. Both the client and server listen
1919
on UDP port 26000. By sending an overly long buffer we are able to
2020
execute arbitrary code remotely.

modules/exploits/windows/http/oracle_endeca_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ def exploit
129129
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first)
130130
if command.length > 8000
131131
# Windows 2008 Command Prompt Max Length is 8191
132-
fail_with(Failure::BadConfig, "#{peer} - The selected paylod is too long to execute through powershell in one command")
132+
fail_with(Failure::BadConfig, "#{peer} - The selected payload is too long to execute through powershell in one command")
133133
end
134134
print_status("#{peer} - Exploiting through Powershell...")
135135
execute_command(command)

modules/exploits/windows/local/novell_client_nwfs.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -232,7 +232,7 @@ def exploit
232232
@addresses = disclose_addresses(my_target)
233233
if @addresses.nil?
234234
session.railgun.kernel32.CloseHandle(handle)
235-
fail_with(Failure::Unknown, "Filed to disclose necessary addresses for exploitation. Aborting.")
235+
fail_with(Failure::Unknown, "Failed to disclose necessary addresses for exploitation. Aborting.")
236236
else
237237
print_good("Addresses successfully disclosed.")
238238
end

modules/exploits/windows/misc/hp_dataprotector_exec_bar.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ def exploit
9898
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, {:remove_comspec => true, :encode_final_payload => true})
9999
if command.length > 8000
100100
# Windows 2008 Command Prompt Max Length is 8191
101-
fail_with(Failure::BadConfig, "#{peer} - The selected paylod is too long to execute through powershell in one command")
101+
fail_with(Failure::BadConfig, "#{peer} - The selected payload is too long to execute through powershell in one command")
102102
end
103103
print_status("#{peer} - Exploiting through Powershell...")
104104
exec_bar(datastore['CMDPATH'], command, "\x00")

0 commit comments

Comments
 (0)