502 Bad Gateway when searching for exploits #2
Comments
Ah, yeah I was using pre tags. Thanks for the tip! |
Are you able to execute a normal search? I'm getting a |
Oh, and if you check out @achillean's twitter account. You'll seen there were some problems going on in the last few days. |
Regular search works. ExploitDB and MSF search return 502, with both the Python and Ruby libraries. |
I rewrote the Exploits search, put it on a separate domain and in the process also normalized the data (so there isn't a need for different classes for ExploitDB and Metasploit). But I didn't yet update the API to make use of the new Exploits website. The new endpoint for the API calls is https://exploits.shodan.io/api and I'm in the process of updating the wrapper classes to use that new URL. Note that the search results now contain the contents of the files, so you don't need to do a separate call anymore to grab/ download the contents of a script. |
From irb with a fresh install of the shodan gem:
The text was updated successfully, but these errors were encountered: