metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
43 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- CyberArk Conjur Policy Factory ERB SSTI RCE (CVE-2025-49828)
- LaRecipe Blade SSTI Unauthenticated RCE (CVE-2025-53833)
- Apache HugeGraph PD Hessian2 Deserialization RCE (CVE-2025-26866)
- Langflow custom_component eval_custom_component_code() RCE (CVE-2026-0769)
- FUXA SCADA/HMI Referer Authentication Bypass to RCE (CVE-2025-69985)
- Open WebUI Tools API exec() Code Injection RCE (CVE-2026-0766)
- GNU inetutils telnetd CREDENTIALS_DIRECTORY privilege escalation (CVE-2026-28372)
- Add Apache Zeppelin environment variable injection RCE module (CVE-2024-31866)
- Add Grafana Image Renderer arbitrary file write RCE module (CVE-2025-11539)
- Updates description for BeyondTrust command injection
- Docs
- Msf::Payload::Linux::Riscv32le::Prepends#appends_map
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv32le::Prepends#appends_order
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_order
- Msf::Payload::Linux::Riscv64le::Prepends#appends_map
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv64le::Prepends#appends_order
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_order
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_shared_headers
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_basic_auth_credentials