SYMBOL INDEX (9 symbols across 2 files) FILE: CVE-2023-20887.py function handler (line 28) | def handler(): function start_handler (line 40) | def start_handler(): function exploit (line 46) | def exploit(): FILE: vmware_vrni_rce_cve_2023_20887.rb class MetasploitModule (line 6) | class MetasploitModule < Msf::Exploit::Remote method initialize (line 13) | def initialize(info = {}) method check_vrni (line 77) | def check_vrni method execute_command (line 87) | def execute_command(cmd, _opts = {}) method check (line 109) | def check method exploit (line 124) | def exploit