typos
git-svn-id: file:///home/svn/framework3/trunk@4349 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
d894adbb00
commit
df10ee412d
|
@ -31,7 +31,7 @@ class DBManager
|
|||
begin
|
||||
begin
|
||||
require 'rubygems'
|
||||
require_gem 'activerecord'
|
||||
gem 'activerecord'
|
||||
@usable = true
|
||||
rescue LoadError
|
||||
require 'activerecord'
|
||||
|
|
|
@ -57,7 +57,7 @@ class Exploit < Msf::Module
|
|||
Safe = [ 0, "The target is not exploitable." ]
|
||||
|
||||
#
|
||||
# The target is running the service in requestion but may not be
|
||||
# The target is running the service in question but may not be
|
||||
# exploitable.
|
||||
#
|
||||
Detected = [ 1, "The target service is running, but could not be validated." ]
|
||||
|
|
|
@ -319,7 +319,7 @@ class Payload < Msf::Module
|
|||
##
|
||||
|
||||
#
|
||||
# Once an exploit completes and a payload has been created on behalf of the
|
||||
# Once an exploit completes and a session has been created on behalf of the
|
||||
# payload, the framework will call the payload's on_session notification
|
||||
# routine to allow it to manipulate the session prior to handing off
|
||||
# control to the user.
|
||||
|
|
Loading…
Reference in New Issue