This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
I'm receiving the following error while running the script,
%> ./windows-exploit-suggester.py -d 2016-09-20-mssb.xls -i /Volumes/qq/1.txt
[*] initiating winsploit version 3.2...
[*] database file detected as xls or xlsx based on extension
Traceback (most recent call last):
File "./windows-exploit-suggester.py", line 1529, in <module>
main()
File "./windows-exploit-suggester.py", line 413, in main
sh = wb.sheet_by_name('Bulletin Search')
File "/Users/xxx/Library/Python/2.7/lib/python/site-packages/xlrd/book.py", line 441, in sheet_by_name
raise XLRDError('No sheet named <%r>' % sheet_name)
xlrd.biffh.XLRDError: No sheet named <'Bulletin Search'>
I'm receiving the following error while running the script,
Can you check it?