diff --git a/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb b/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb index 3650d8aa2c..39e27c75f0 100644 --- a/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb +++ b/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb @@ -58,7 +58,6 @@ class Metasploit3 < Msf::Exploit::Remote OptString.new('INFILENAME', [ true, 'The Input PDF filename.']), OptString.new('EXENAME', [ false, 'The Name of payload exe.']), OptString.new('FILENAME', [ false, 'The output filename.', 'evil.pdf']), - OptString.new('OUTPUTPATH', [ false, 'The location to output the file.', './data/exploits/']), OptString.new('LAUNCH_MESSAGE', [ false, 'The message to display in the File: area', "To view the encrypted content please tick the \"Do not show this message again\" box and press Open."]), ], self.class) diff --git a/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe_nojs.rb b/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe_nojs.rb index fdc10751dc..41ed5d7085 100644 --- a/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe_nojs.rb +++ b/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe_nojs.rb @@ -68,7 +68,6 @@ class Metasploit3 < Msf::Exploit::Remote [ OptString.new('EXENAME', [ false, 'The Name of payload exe.', 'msf.exe']), OptString.new('FILENAME', [ false, 'The output filename.', 'evil.pdf']), - OptString.new('OUTPUTPATH', [ false, 'The location to output the file.', './data/exploits/']), OptString.new('LAUNCH_MESSAGE', [ false, 'The message to display in the File: area', "To view the encrypted content please tick the \"Do not show this message again\" box and press Open."]), ], self.class) diff --git a/modules/exploits/windows/fileformat/altap_salamander_pdb.rb b/modules/exploits/windows/fileformat/altap_salamander_pdb.rb index f32217a1f9..5137d1f847 100644 --- a/modules/exploits/windows/fileformat/altap_salamander_pdb.rb +++ b/modules/exploits/windows/fileformat/altap_salamander_pdb.rb @@ -59,8 +59,7 @@ class Metasploit3 < Msf::Exploit::Remote register_options( [ - OptString.new('FILENAME', [ false, 'The file name.', 'msf-salamander-pdb.exe']), - OptString.new('OUTPUTPATH', [ false, 'The location of the file.', './data/exploits/']), + OptString.new('FILENAME', [ false, 'The file name.', 'msf-salamander-pdb.exe']) ], self.class) end diff --git a/modules/exploits/windows/fileformat/foxit_title_bof.rb b/modules/exploits/windows/fileformat/foxit_title_bof.rb index 4f815f55ea..313a6d1954 100644 --- a/modules/exploits/windows/fileformat/foxit_title_bof.rb +++ b/modules/exploits/windows/fileformat/foxit_title_bof.rb @@ -65,8 +65,7 @@ class Metasploit3 < Msf::Exploit::Remote register_options( [ - OptString.new('FILENAME', [ false, 'The output filename.', 'corelan_foxit.pdf']), - OptString.new('OUTPUTPATH', [ false, 'The location to output the file.', './data/exploits/']) + OptString.new('FILENAME', [ false, 'The output filename.', 'corelan_foxit.pdf']) ], self.class) end diff --git a/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb b/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb index cb988cad5f..c4f986e59b 100644 --- a/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb +++ b/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb @@ -51,9 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote register_options( [ - OptString.new('FILENAME', [ false, 'The output filename.', 'corelannuance.pdf']), - OptString.new('OUTPUTPATH', [ false, 'The location to output the file.', './data/exploits/']), - + OptString.new('FILENAME', [ false, 'The output filename.', 'corelannuance.pdf']) ], self.class) end diff --git a/modules/exploits/windows/fileformat/xion_m3u_sehbof.rb b/modules/exploits/windows/fileformat/xion_m3u_sehbof.rb index e61a6e130b..11b9b6ec16 100644 --- a/modules/exploits/windows/fileformat/xion_m3u_sehbof.rb +++ b/modules/exploits/windows/fileformat/xion_m3u_sehbof.rb @@ -65,7 +65,6 @@ class Metasploit3 < Msf::Exploit::Remote register_options( [ OptString.new('FILENAME', [ false, 'The output filename.', 'm_101_xion.m3u']), - OptString.new('OUTPUTPATH', [ false, 'The location to output the file.', './data/exploits/']), # seh offset depends on path length OptString.new('TARGETPATH', [ false, 'The target output.', 'C:\\']) ], self.class)