From 9d04aad062c75102ac2ba0e5ad421bc5e0cb0778 Mon Sep 17 00:00:00 2001 From: nnposter Date: Thu, 20 Oct 2016 01:15:24 +0000 Subject: [PATCH] Fixes a typo in the script description --- scripts/rmi-vuln-classloader.nse | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/rmi-vuln-classloader.nse b/scripts/rmi-vuln-classloader.nse index 2993ba1bd..132bb3f44 100644 --- a/scripts/rmi-vuln-classloader.nse +++ b/scripts/rmi-vuln-classloader.nse @@ -79,7 +79,7 @@ action = function (host, port) title = "RMI registry default configuration remote code execution vulnerability", description = [[ -Default configuration of RMI registry allows loading classes from remote URLs which can lead to remote code executeion. +Default configuration of RMI registry allows loading classes from remote URLs which can lead to remote code execution. ]], references = { 'https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/java_rmi_server.rb',