From c04e5a4eb1f9e49b02d9d34428144b6109a84f1c Mon Sep 17 00:00:00 2001 From: henri Date: Fri, 3 Jun 2011 09:24:51 +0000 Subject: [PATCH] Minor typo fixes --- scripts/firewalk.nse | 2 +- scripts/netbus-auth-bypass.nse | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/scripts/firewalk.nse b/scripts/firewalk.nse index a295335af..4e5849ecd 100644 --- a/scripts/firewalk.nse +++ b/scripts/firewalk.nse @@ -119,7 +119,7 @@ local ICMP_TIME_EXCEEDED = 11 local function gateway_ttl(traceroute, gw) for ttl, hop in ipairs(traceroute) do - -- chekc hop.ip ~= nil as timedout hops are represented by empty tables + -- check hop.ip ~= nil as timedout hops are represented by empty tables if hop.ip and hop.ip == gw then return ttl end diff --git a/scripts/netbus-auth-bypass.nse b/scripts/netbus-auth-bypass.nse index cac451535..3c8863fb6 100644 --- a/scripts/netbus-auth-bypass.nse +++ b/scripts/netbus-auth-bypass.nse @@ -1,6 +1,6 @@ description = [[ Checks if a NetBus server is vulnerable to an authentication bypass -vulnerability which allows ful access without knowing the password. +vulnerability which allows full access without knowing the password. For example a server running on TCP port 12345 on localhost with this vulnerability is accessible to anyone. An attacker could