diff --git a/modules/auxiliary/admin/oracle/osb_execqr3.rb b/modules/auxiliary/admin/oracle/osb_execqr3.rb index 254d079d1e..aa1e1186f8 100644 --- a/modules/auxiliary/admin/oracle/osb_execqr3.rb +++ b/modules/auxiliary/admin/oracle/osb_execqr3.rb @@ -55,7 +55,7 @@ class Metasploit3 < Msf::Auxiliary if (res.headers['Set-Cookie'] and res.headers['Set-Cookie'].match(/PHPSESSID=(.*);(.*)/i)) sessionid = res.headers['Set-Cookie'].split(';')[0] - + print_status("Sending command: #{datastore['CMD']}...") send_request_cgi( diff --git a/modules/exploits/windows/browser/ms09_043_owc_msdso.rb b/modules/exploits/windows/browser/ms09_043_owc_msdso.rb index a1959251e7..2d92a445e9 100644 --- a/modules/exploits/windows/browser/ms09_043_owc_msdso.rb +++ b/modules/exploits/windows/browser/ms09_043_owc_msdso.rb @@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'Microsoft OWC Spreadsheet msDataSourceObject Memory Corruption', 'Description' => %q{ This module exploits a memory corruption vulnerability within versions 10 and 11 of - the Office Web Component Spreadsheet ActiveX control. This module was based on + the Office Web Component Spreadsheet ActiveX control. This module was based on an exploit found in the wild. }, 'License' => MSF_LICENSE, @@ -97,7 +97,7 @@ try { xobj = new ActiveXObject("OWC10.Spreadsheet"); } catch(err) { try { - xobj = new ActiveXObject("OWC11.Spreadsheet"); + xobj = new ActiveXObject("OWC11.Spreadsheet"); } catch(err) { } }