diff --git a/modules/exploits/linux/upnp/belkin_wemo_upnp_exec.rb b/modules/exploits/linux/upnp/belkin_wemo_upnp_exec.rb index 3ebb4e61df..98dface3b1 100644 --- a/modules/exploits/linux/upnp/belkin_wemo_upnp_exec.rb +++ b/modules/exploits/linux/upnp/belkin_wemo_upnp_exec.rb @@ -61,7 +61,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Notes' => { 'Stability' => [CRASH_SAFE], 'SideEffects' => [ARTIFACTS_ON_DISK], - 'Reliablity' => [REPEATABLE_SESSION], + 'Reliability' => [REPEATABLE_SESSION], 'NOCVE' => 'Patched in 2.00.8643' } )) diff --git a/modules/exploits/unix/webapp/drupal_restws_unserialize.rb b/modules/exploits/unix/webapp/drupal_restws_unserialize.rb index d61ce7cf55..90061e329a 100644 --- a/modules/exploits/unix/webapp/drupal_restws_unserialize.rb +++ b/modules/exploits/unix/webapp/drupal_restws_unserialize.rb @@ -69,7 +69,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Notes' => { 'Stability' => [CRASH_SAFE], 'SideEffects' => [IOC_IN_LOGS], - 'Reliablity' => [UNRELIABLE_SESSION], # When using the GET method + 'Reliability' => [UNRELIABLE_SESSION], # When using the GET method 'AKA' => ['SA-CORE-2019-003'] } ))