diff --git a/modules/exploits/multi/misc/java_rmi_server.rb b/modules/exploits/multi/misc/java_rmi_server.rb index 53697867d1..a295e5e429 100644 --- a/modules/exploits/multi/misc/java_rmi_server.rb +++ b/modules/exploits/multi/misc/java_rmi_server.rb @@ -119,7 +119,7 @@ class Metasploit3 < Msf::Exploit::Remote send_header ack = recv_protocol_ack if ack.nil? - fail_with(Failure::NoTarget, "#{peer} - Filed to negotiate RMI protocol") + fail_with(Failure::NoTarget, "#{peer} - Failed to negotiate RMI protocol") end jar = rand_text_alpha(rand(8)+1) + '.jar' diff --git a/modules/exploits/windows/browser/persits_xupload_traversal.rb b/modules/exploits/windows/browser/persits_xupload_traversal.rb index 37963db69d..8d96cd5d2b 100644 --- a/modules/exploits/windows/browser/persits_xupload_traversal.rb +++ b/modules/exploits/windows/browser/persits_xupload_traversal.rb @@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote Code execution occurs by writing to the All Users Startup Programs directory. You may want to combine this module with the use of multi/handler since a - user would have to log for the payloda to execute. + user would have to log for the payload to execute. }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], diff --git a/modules/exploits/windows/games/racer_503beta5.rb b/modules/exploits/windows/games/racer_503beta5.rb index 304ddab98f..e5dc86d847 100644 --- a/modules/exploits/windows/games/racer_503beta5.rb +++ b/modules/exploits/windows/games/racer_503beta5.rb @@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'Racer v0.5.3 Beta 5 Buffer Overflow', 'Description' => %q{ - This module explots the Racer Car and Racing Simulator game + This module exploits the Racer Car and Racing Simulator game versions v0.5.3 beta 5 and earlier. Both the client and server listen on UDP port 26000. By sending an overly long buffer we are able to execute arbitrary code remotely. diff --git a/modules/exploits/windows/http/oracle_endeca_exec.rb b/modules/exploits/windows/http/oracle_endeca_exec.rb index 874127b370..fd94612b71 100644 --- a/modules/exploits/windows/http/oracle_endeca_exec.rb +++ b/modules/exploits/windows/http/oracle_endeca_exec.rb @@ -129,7 +129,7 @@ class Metasploit3 < Msf::Exploit::Remote command = cmd_psh_payload(payload.encoded, payload_instance.arch.first) if command.length > 8000 # Windows 2008 Command Prompt Max Length is 8191 - fail_with(Failure::BadConfig, "#{peer} - The selected paylod is too long to execute through powershell in one command") + fail_with(Failure::BadConfig, "#{peer} - The selected payload is too long to execute through powershell in one command") end print_status("#{peer} - Exploiting through Powershell...") execute_command(command) diff --git a/modules/exploits/windows/local/novell_client_nwfs.rb b/modules/exploits/windows/local/novell_client_nwfs.rb index ce5c2b73fc..735e01c70b 100644 --- a/modules/exploits/windows/local/novell_client_nwfs.rb +++ b/modules/exploits/windows/local/novell_client_nwfs.rb @@ -232,7 +232,7 @@ class Metasploit3 < Msf::Exploit::Local @addresses = disclose_addresses(my_target) if @addresses.nil? session.railgun.kernel32.CloseHandle(handle) - fail_with(Failure::Unknown, "Filed to disclose necessary addresses for exploitation. Aborting.") + fail_with(Failure::Unknown, "Failed to disclose necessary addresses for exploitation. Aborting.") else print_good("Addresses successfully disclosed.") end diff --git a/modules/exploits/windows/misc/hp_dataprotector_exec_bar.rb b/modules/exploits/windows/misc/hp_dataprotector_exec_bar.rb index 0e698d7ccb..81c51a11fd 100644 --- a/modules/exploits/windows/misc/hp_dataprotector_exec_bar.rb +++ b/modules/exploits/windows/misc/hp_dataprotector_exec_bar.rb @@ -98,7 +98,7 @@ class Metasploit3 < Msf::Exploit::Remote command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, {:remove_comspec => true, :encode_final_payload => true}) if command.length > 8000 # Windows 2008 Command Prompt Max Length is 8191 - fail_with(Failure::BadConfig, "#{peer} - The selected paylod is too long to execute through powershell in one command") + fail_with(Failure::BadConfig, "#{peer} - The selected payload is too long to execute through powershell in one command") end print_status("#{peer} - Exploiting through Powershell...") exec_bar(datastore['CMDPATH'], command, "\x00")