From b0e730d5ae88ac0c0ead08b25c178509ca6e53a6 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Hans-Martin=20M=C3=BCnch=20=28h0ng10=29?= Date: Fri, 13 Mar 2015 20:41:14 +0100 Subject: [PATCH] Typo --- modules/exploits/windows/local/ipass_local_privesc.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/local/ipass_local_privesc.rb b/modules/exploits/windows/local/ipass_local_privesc.rb index e522ba7a27..fc5ef18408 100644 --- a/modules/exploits/windows/local/ipass_local_privesc.rb +++ b/modules/exploits/windows/local/ipass_local_privesc.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Local 'Description' => %q{ The named pipe, \IPEFSYSPCPIPE, can be accessed by normal users to interact with the iPass service. The service provides a LaunchAppSysMode command which - allows to execute abitrary commands as SYSTEM. + allows to execute arbitrary commands as SYSTEM. }, 'License' => MSF_LICENSE,