We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent e9c511c commit 4d485acCopy full SHA for 4d485ac
modules/exploits/multi/fileformat/ghostscript_format_string_cve_2024_29510.rb
@@ -50,18 +50,6 @@ def initialize(info = {})
50
'PAYLOAD' => 'cmd/linux/http/x64/meterpreter_reverse_tcp'
51
}
52
53
- ],
54
- [
55
- 'Windows Command',
56
- {
57
- 'Arch' => ARCH_CMD,
58
- 'Platform' => 'win',
59
- 'DefaultOptions' => {
60
- # Payload is not set automatically when selecting this target.
61
- # Select a x64 fetch payload by default.
62
- 'PAYLOAD' => 'cmd/windows/http/x64/meterpreter_reverse_tcp'
63
- }
64
65
]
66
],
67
'DefaultTarget' => 0,
0 commit comments