diff --git a/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb b/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb index 474fd1bf85..b40764efa4 100644 --- a/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb +++ b/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Description' => %q{ This module exploits a file upload vulnerability found in Symantec Web Gateway's HTTP service. Due to the incorrect use of file extensions in the upload_file() - function, this allows us to abuse the spywall/blocked_file.php file in order to + function, attackers may to abuse the spywall/blocked_file.php file in order to upload a malicious PHP file without any authentication, which results in arbitrary code execution. }, diff --git a/modules/exploits/multi/ids/snort_dce_rpc.rb b/modules/exploits/multi/ids/snort_dce_rpc.rb index ee70a92509..972e42e149 100644 --- a/modules/exploits/multi/ids/snort_dce_rpc.rb +++ b/modules/exploits/multi/ids/snort_dce_rpc.rb @@ -96,7 +96,7 @@ class Metasploit3 < Msf::Exploit::Remote p = buildpacket(shost, rhost, rport.to_i) - print_status("Sending crafted SMB packet from #{shost} to #{rhost}:#{rport}...") + print_status("#{rhost}:#{rport} Sending crafted SMB packet from #{shost}...") capture_sendto(p, rhost)