Skip to content

Conversation

@securestep9
Copy link
Collaborator

detect Ivanti EPMM CVE-2023-35082 vulnerability

Checklist

  • I have followed the Contributor Guidelines.
  • The code has been thoroughly tested in my local development environment with flake8 and pylint.
  • The code is Python 3 compatible.
  • The code follows the PEP8 styling guidelines with 4 spaces indentation.
  • This Pull Request relates to only one issue or only one feature
  • I have referenced the corresponding issue number in my commit message
  • I have added the relevant documentation.
  • My branch is up-to-date with the Upstream master branch.

Changes proposed in this pull request

New Module Ivanti EPMM CVE-2023-35082 Vulnerability Detection (CISA KEV)

Your development environment

  • OS: macOS
  • OS Version: 14.2
  • Python Version: 3.11

detect Ivanti EPMM CVE-2023-35082 vulnerability 

Signed-off-by: Sam Stepanyan <[email protected]>
@securestep9 securestep9 merged commit dadc22c into master Jan 20, 2024
@securestep9 securestep9 deleted the securestep9-ivanti_epmm_cve_2023_35082-1 branch January 20, 2024 20:16
@securestep9 securestep9 added the new module pull request with new module(s) label Jan 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

new module pull request with new module(s)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants