diff --git a/htdocs/install/check.php b/htdocs/install/check.php
index 35efe1f36b2..99e9e38c958 100644
--- a/htdocs/install/check.php
+++ b/htdocs/install/check.php
@@ -100,7 +100,7 @@ print "
\n";
// Check PHP support for $_GET and $_POST
if (!isset($_GET["testget"]) && !isset($_POST["testpost"])) { // We must keep $_GET and $_POST here
print '
'.$langs->trans("PHPSupportPOSTGETKo");
- print ' ('.$langs->trans("Recheck").')';
+ print ' ('.$langs->trans("Recheck").')';
print "
\n";
$checksok = 0;
} else {
diff --git a/htdocs/main.inc.php b/htdocs/main.inc.php
index a30f02f7fba..cc9ff9e6297 100644
--- a/htdocs/main.inc.php
+++ b/htdocs/main.inc.php
@@ -80,7 +80,7 @@ function realCharForNumericEntities($matches)
* Warning: Such a protection can't be enough. It is not reliable as it will always be possible to bypass this. Good protection can
* only be guaranted by escaping data during output.
*
- * @param string $val Value brut found int $_GET, $_POST or PHP_SELF
+ * @param string $val Brut value found into $_GET, $_POST or PHP_SELF
* @param string $type 0=POST, 1=GET, 2=PHP_SELF, 3=GET without sql reserved keywords (the less tolerant test)
* @return int >0 if there is an injection, 0 if none
*/