diff --git a/modules/exploits/windows/local/ms14_058_track_popup_menu.rb b/modules/exploits/windows/local/ms14_058_track_popup_menu.rb index b22204ccbd..4f66fa8b34 100644 --- a/modules/exploits/windows/local/ms14_058_track_popup_menu.rb +++ b/modules/exploits/windows/local/ms14_058_track_popup_menu.rb @@ -114,7 +114,6 @@ class Metasploit3 < Msf::Exploit::Local dll_file_name = 'cve-2014-4113.x64.dll' end - print_status("Using #{dll_file_name}") library_path = ::File.join(Msf::Config.data_directory, 'exploits', 'CVE-2014-4113', dll_file_name) library_path = ::File.expand_path(library_path)