Skip to content

Commit 4d485ac

Browse files
Remove Windows target since it doesn't work for now
1 parent e9c511c commit 4d485ac

File tree

1 file changed

+0
-12
lines changed

1 file changed

+0
-12
lines changed

modules/exploits/multi/fileformat/ghostscript_format_string_cve_2024_29510.rb

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -50,18 +50,6 @@ def initialize(info = {})
5050
'PAYLOAD' => 'cmd/linux/http/x64/meterpreter_reverse_tcp'
5151
}
5252
}
53-
],
54-
[
55-
'Windows Command',
56-
{
57-
'Arch' => ARCH_CMD,
58-
'Platform' => 'win',
59-
'DefaultOptions' => {
60-
# Payload is not set automatically when selecting this target.
61-
# Select a x64 fetch payload by default.
62-
'PAYLOAD' => 'cmd/windows/http/x64/meterpreter_reverse_tcp'
63-
}
64-
}
6553
]
6654
],
6755
'DefaultTarget' => 0,

0 commit comments

Comments
 (0)