metasploit-framework icon indicating copy to clipboard operation
metasploit-framework copied to clipboard

Metasploit Framework

Results 550 metasploit-framework issues
Sort by recently updated
recently updated
newest added

# About This change adds a new exploit module (docs) that exploits CVE-2020-11531 and CVE-2020-11532 against ManageEngine DataSecurity Plus. The change also adds several JSON files that are required for...

module
library
docs
delayed

## Steps to reproduce set smbuser järvalv set smbpass whatever set rhost 192.168.1.10 run ## Current behavior Im getting failure due the character "ä" in smbuser Exploit failed [no-access]: Rex::Proto::SMB::Exceptions::loginError...

module
bug
not-stale
ascii-utf8-issues

When using a template APK file with msfvenom, injecting the Meterpreter payload may exceed the DEX 64K reference limit. > Android app (APK) files contain executable bytecode files in the...

bug
payload
android
not-stale

I am getting this type of error when I am executing the run command. Kindly resolve this issue. ![image](https://user-images.githubusercontent.com/46965638/96352956-318de180-10e1-11eb-8547-624a337e33c6.png)

question
confirmed
needs-issue-template

Based on the documentation here: https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/payload/windows/shell/reverse_ord_tcp.md I should be doing this right, but the result is no session, and a crashed smb service: ``` msf6 exploit(windows/smb/ms08_067_netapi) > show options Module...

bug
payload
confirmed

While landing https://github.com/rapid7/metasploit-framework/pull/16653 I noticed that closing the pivoted session brings down the session that the pivoted session went through: ``` msf6 payload(windows/x64/meterpreter/reverse_named_pipe) > sessions -i 4 [*] Starting interaction...

bug
not-stale

## Steps to reproduce Use exploit/solaris/ssh/pam_username_bof with a recent version of Metasploit. Target version (uname -a): SunOS solaris 5.10 Generic_147148-26 i86pc i386 i86pc ## Were you following a specific guide/tutorial...

bug
not-stale

Modern Java disabled the sun.misc.BASE64Decoder class so exploit will fail on any newer version of Jenkins. The java.util.Base64 class should be used now; the change has been confirmed to work...

module
bug
needs-linting

Closes https://github.com/rapid7/metasploit-framework/issues/11341 Before the module would crash: ![image](https://user-images.githubusercontent.com/60357436/177367846-f242d102-96c5-4ba2-ac2c-ab0c4e86c986.png) Now we should log the error and continue ## Verification **Verify** The module can run against a server that doesn't respond: ```...

rn-enhancement

I want to bring back #11688. One a Windows 10 target with many IPv6 routes, the meterpreter `route` command shows no IPv6 routes. `rout print -6` on the target shows...

newbie-friendly
suggestion