rapid7/metasploit-framework

View on GitHub
Branch: master(View all)
NameLines of codeMaintainabilityTest coverage
modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_uro.rb100
A
0 mins
modules/exploits/windows/http/hp_nnm_snmp.rb84
A
1 hr
modules/exploits/windows/http/hp_nnm_snmpviewer_actapp.rb134
A
0 mins
modules/exploits/windows/http/hp_nnm_toolbar_01.rb48
A
2 hrs
modules/exploits/windows/http/hp_nnm_toolbar_02.rb113
A
0 mins
modules/exploits/windows/http/hp_nnm_webappmon_execvp.rb115
B
4 hrs
modules/exploits/windows/http/hp_nnm_webappmon_ovjavalocale.rb123
B
5 hrs
modules/exploits/windows/http/hp_openview_insight_backdoor.rb95
B
4 hrs
modules/exploits/windows/http/hp_pcm_snac_update_certificates.rb108
B
4 hrs
modules/exploits/windows/http/hp_pcm_snac_update_domain.rb106
B
4 hrs
modules/exploits/windows/http/hp_power_manager_filename.rb90
A
0 mins
modules/exploits/windows/http/hp_power_manager_login.rb65
A
1 hr
modules/exploits/windows/http/hp_sitescope_dns_tool.rb164
B
4 hrs
modules/exploits/windows/http/hp_sitescope_runomagentcommand.rb125
A
2 hrs
modules/exploits/windows/http/hpe_sim_76_amf_deserialization.rb147
B
5 hrs
modules/exploits/windows/http/httpdx_handlepeer.rb86
A
2 hrs
modules/exploits/windows/http/httpdx_tolog_format.rb186
B
6 hrs
modules/exploits/windows/http/ia_webmail.rb52
A
1 hr
modules/exploits/windows/http/ibm_tivoli_endpoint_bof.rb76
A
1 hr
modules/exploits/windows/http/ibm_tpmfosd_overflow.rb109
A
0 mins
modules/exploits/windows/http/ibm_tsm_cad_header.rb49
A
2 hrs
modules/exploits/windows/http/icecast_header.rb63
A
0 mins
modules/exploits/windows/http/integard_password_bof.rb108
A
0 mins
modules/exploits/windows/http/intersystems_cache.rb51
A
0 mins
modules/exploits/windows/http/intrasrv_bof.rb85
A
0 mins
modules/exploits/windows/http/ipswitch_wug_maincfgret.rb66
A
0 mins
modules/exploits/windows/http/ivanti_avalanche_filestoreconfig_upload.rb313
D
2 days
modules/exploits/windows/http/jira_collector_traversal.rb169
A
3 hrs
modules/exploits/windows/http/kaseya_uploader.rb104
B
5 hrs
modules/exploits/windows/http/kaseya_uploadimage_file_upload.rb83
A
3 hrs
modules/exploits/windows/http/kentico_staging_syncserver.rb102
A
3 hrs
modules/exploits/windows/http/kolibri_http.rb61
A
1 hr
modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb132
C
7 hrs
modules/exploits/windows/http/lexmark_markvision_gfd_upload.rb123
A
3 hrs
modules/exploits/windows/http/lg_simple_editor_rce.rb161
B
5 hrs
modules/exploits/windows/http/mailenable_auth_header.rb53
A
1 hr
modules/exploits/windows/http/manage_engine_opmanager_rce.rb138
B
7 hrs
modules/exploits/windows/http/manageengine_adaudit_plus_authenticated_rce.rb474
F
5 days
modules/exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb322
D
2 days
modules/exploits/windows/http/manageengine_admanager_plus_cve_2023_29084_auth_cmd_injection.rb238
C
1 day
modules/exploits/windows/http/manageengine_adselfservice_plus_cve_2021_40539.rb116
A
1 hr
modules/exploits/windows/http/manageengine_adselfservice_plus_cve_2022_28810.rb244
D
1 day
modules/exploits/windows/http/manageengine_adshacluster_rce.rb73
A
1 hr
modules/exploits/windows/http/manageengine_appmanager_exec.rb87
A
1 hr
modules/exploits/windows/http/manageengine_apps_mngr.rb256
D
2 days
modules/exploits/windows/http/manageengine_connectionid_write.rb155
A
3 hrs
modules/exploits/windows/http/manageengine_endpoint_central_saml_rce_cve_2022_47966.rb235
D
1 day
modules/exploits/windows/http/manageengine_servicedesk_plus_cve_2021_44077.rb103
A
2 hrs
modules/exploits/windows/http/maxdb_webdbm_database.rb61
A
0 mins
modules/exploits/windows/http/maxdb_webdbm_get_overflow.rb61
A
15 mins