From 7cc80c418be31e15f9a0a4cdfe7ef989850d0af8 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Wed, 15 Apr 2015 15:32:55 -0500 Subject: [PATCH] Correct a bad spelling in ms15_034_ulonglongadd.rb --- modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb b/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb index 5224b89012..ddf0bae554 100644 --- a/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb +++ b/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Auxiliary 'Description' => %q{ This module will check if your hosts are vulnerable to CVE-2015-1635 (MS15-034). A vulnerability in the HTTP Protocol stack (HTTP.sys) that could result in arbitrary code - execution. This module will try to cause a denail-of-service. + execution. This module will try to cause a denial-of-service. Please note that you must supply a valid file resource for the TARGETURI option. By default, IIS may come with these settings that you could try: iisstart.htm,