diff --git a/scripts/smtp-vuln-cve2010-4344.nse b/scripts/smtp-vuln-cve2010-4344.nse
index 001ca81c3..18be34ac9 100644
--- a/scripts/smtp-vuln-cve2010-4344.nse
+++ b/scripts/smtp-vuln-cve2010-4344.nse
@@ -12,9 +12,9 @@ file using the -C option (CVE-2010-4345).
The smtp-vuln-cve2010-4344.exploit script argument will make
the script try to exploit the vulnerabilties, by sending more than 50MB of
data, it depends on the message size limit configuration option of the
-Exim server. If the exploit succeed the exploit.command or
-smtp-vuln-cve2010-4344.command script arguments can be used
-to run an arbitrary command on the remote system, under the
+Exim server. If the exploit succeed the exploit.cmd or
+smtp-vuln-cve2010-4344.cmd script arguments can be used to
+run an arbitrary command on the remote system, under the
Exim user privileges. If this script argument is set then it
will enable the smtp-vuln-cve2010-4344.exploit argument.
@@ -32,7 +32,7 @@ Reference:
---
-- @usage
-- nmap --script=smtp-vuln-cve2010-4344 --script-args="smtp-vuln-cve2010-4344.exploit" -pT:25,465,587
--- nmap --script=smtp-vuln-cve2010-4344 --script-args="exploit.command='uname -a'" -pT:25,465,587
+-- nmap --script=smtp-vuln-cve2010-4344 --script-args="exploit.cmd='uname -a'" -pT:25,465,587
--
-- @output
-- PORT STATE SERVICE
@@ -53,9 +53,9 @@ Reference:
-- be used.
-- @args smtp-vuln-cve2010-4344.mailto Define the destination email address
-- to be used.
--- @args exploit.command or smtp-vuln-cve2010-4344.command An arbitrary
--- command to run under the Exim user privileges on the
--- remote system. If this argument is set then, it will enable the
+-- @args exploit.cmd or smtp-vuln-cve2010-4344.cmd An arbitrary command to
+-- run under the Exim user privileges on the remote
+-- system. If this argument is set then, it will enable the
-- smtp-vuln-cve2010-4344.exploit argument.
author = "Djalal Harouni"
@@ -453,8 +453,8 @@ action = function(host, port)
mailfrom = stdnse.get_script_args('smtp-vuln-cve2010-4344.mailfrom'),
mailto = stdnse.get_script_args('smtp-vuln-cve2010-4344.mailto'),
exploit = stdnse.get_script_args('smtp-vuln-cve2010-4344.exploit'),
- shell_cmd = stdnse.get_script_args('exploit.command') or
- stdnse.get_script_args('smtp-vuln-cve2010-4344.command'),
+ shell_cmd = stdnse.get_script_args('exploit.cmd') or
+ stdnse.get_script_args('smtp-vuln-cve2010-4344.cmd'),
}
if smtp_opts.shell_cmd then
smtp_opts.exploit = true