From 5a978dca2e902ec2344cd7f85dc43ba0b96df108 Mon Sep 17 00:00:00 2001 From: Carsten Maartmann-Moe Date: Sat, 10 Nov 2018 23:00:54 +0100 Subject: [PATCH] Removed architecture to make payload selection work --- modules/exploits/windows/http/hp_imc_java_deserialize.rb | 1 - 1 file changed, 1 deletion(-) diff --git a/modules/exploits/windows/http/hp_imc_java_deserialize.rb b/modules/exploits/windows/http/hp_imc_java_deserialize.rb index 3f21f44f2e..5afb69ec65 100644 --- a/modules/exploits/windows/http/hp_imc_java_deserialize.rb +++ b/modules/exploits/windows/http/hp_imc_java_deserialize.rb @@ -40,7 +40,6 @@ class MetasploitModule < Msf::Exploit::Remote [ 'HPE IMC 7.3 E0504P2 and earlier / Windows', {} ] ], 'Privileged' => true, - 'Arch' => ARCH_JAVA, 'DisclosureDate' => "Oct 3 2017", 'DefaultTarget' => 0, 'DefaultOptions' => {