## https://sploitus.com/exploit?id=4B32FBEA-2A27-53F6-87F7-79C53E20095D
# CVE-2023-35078
This script ethically checks for the presence of cve-2023-35078 via requesting the `/ping` endpoint from the Ivanti EPMM API.
`/ping` simply responds with the VSP version, rather than attemping to pull device or admin data.
Usage: `./CVE-2023-35078 <IP/Hostname>`
This script assumes https connections over default port.
## Setup
- Setup virtual env: `python3 -m venv env`
- Activate env: `source env/bin/activate`
- Install dependencies: `pip3 install -r requirements.txt`