diff --git a/modules/exploits/multi/http/sonicwall_scrutinizer_methoddetail_sqli.rb b/modules/exploits/multi/http/sonicwall_scrutinizer_methoddetail_sqli.rb index c25a11dee1..123d2b2b02 100644 --- a/modules/exploits/multi/http/sonicwall_scrutinizer_methoddetail_sqli.rb +++ b/modules/exploits/multi/http/sonicwall_scrutinizer_methoddetail_sqli.rb @@ -149,7 +149,7 @@ class MetasploitModule < Msf::Exploit::Remote case os when WINDOWS # On Windows, the full d4d path looks something like this: - # C:\Program Files\Scrutinizer\mysql\data\plixer + # C:\Program Files\Scrutinizer\html\d4d '../../html/d4d' when LINUX # On the Linux appliance, the d4d path looks exactly like this: @@ -368,7 +368,7 @@ class MetasploitModule < Msf::Exploit::Remote end - # Tries the set the target. If the user manually set one, then avoid automatic target. + # Tries to set the target. If the user manually set one, then avoid automatic target. # # @param os [String] OS information. # @return [void]