diff --git a/modules/exploits/linux/local/udev_netlink.rb b/modules/exploits/linux/local/udev_netlink.rb index 91f560d713..c9fcd64d47 100644 --- a/modules/exploits/linux/local/udev_netlink.rb +++ b/modules/exploits/linux/local/udev_netlink.rb @@ -60,7 +60,7 @@ class Metasploit4 < Msf::Exploit::Local [ 'Linux x64', { 'Arch' => ARCH_X86_64 } ], #[ 'Command payload', { 'Arch' => ARCH_CMD } ], ], - 'DefaultOptons' => { 'WfsDelay' => 2 }, + 'DefaultOptions' => { 'WfsDelay' => 2 }, 'DefaultTarget' => 0, 'DisclosureDate' => "Apr 16 2009", } diff --git a/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb b/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb index fbea3a7691..f9c5a4b47f 100644 --- a/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb +++ b/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb @@ -43,7 +43,7 @@ class Metasploit4 < Msf::Exploit::Remote { 'BadChars' => "\x00\x3a\x3b\x3d\x3c\x3e\x0a\x0d\x22\x26\x27\x2f\x60\xb4", }, - 'Platforms' => [ 'win' ], + 'Platform' => [ 'win' ], 'Targets' => [ [