From e6b2ddbc024fcb45f6eaacf231b87f0cd04f0a96 Mon Sep 17 00:00:00 2001 From: William Vu Date: Mon, 22 Oct 2018 15:32:14 -0500 Subject: [PATCH] Land #10845, glassfish_traversal typo fix --- modules/auxiliary/scanner/http/glassfish_traversal.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/auxiliary/scanner/http/glassfish_traversal.rb b/modules/auxiliary/scanner/http/glassfish_traversal.rb index 5774ec3b74..faabc792f5 100644 --- a/modules/auxiliary/scanner/http/glassfish_traversal.rb +++ b/modules/auxiliary/scanner/http/glassfish_traversal.rb @@ -13,7 +13,7 @@ class MetasploitModule < Msf::Auxiliary 'Name' => 'Path Traversal in Oracle GlassFish Server Open Source Edition', 'Description' => %q{ This module exploits an unauthenticated directory traversal vulnerability - which exits in administration console of Oracle GlassFish Server 4.1, which is + which exists in administration console of Oracle GlassFish Server 4.1, which is listening by default on port 4848/TCP. }, 'References' =>