diff --git a/modules/auxiliary/scanner/http/glassfish_traversal.rb b/modules/auxiliary/scanner/http/glassfish_traversal.rb index 5774ec3b74..faabc792f5 100644 --- a/modules/auxiliary/scanner/http/glassfish_traversal.rb +++ b/modules/auxiliary/scanner/http/glassfish_traversal.rb @@ -13,7 +13,7 @@ class MetasploitModule < Msf::Auxiliary 'Name' => 'Path Traversal in Oracle GlassFish Server Open Source Edition', 'Description' => %q{ This module exploits an unauthenticated directory traversal vulnerability - which exits in administration console of Oracle GlassFish Server 4.1, which is + which exists in administration console of Oracle GlassFish Server 4.1, which is listening by default on port 4848/TCP. }, 'References' =>