Open galaris opened 6 years ago
Do you mind posting a redacted version of the systeminfo output? I just ran it against the 2018-06-02 database and it works fine for me.
I am just using this python script and I am having the same issue. Any help please?
C:\Python>python.exe windows-exploit-suggester.py -i systeminfo_result.txt -d 2018-06-01-mssb.xls [] initiating winsploit version 3.3... [] database file detected as xls or xlsx based on extension [] attempting to read from the systeminfo input file [+] systeminfo input file read successfully (utf-8) [] querying database file for potential vulnerabilities [] comparing the 203 hotfix(es) against the 266 potential bulletins(s) with a database of 137 known exploits [] there are now 111 remaining vulns [+] [E] exploitdb PoC, [M] Metasploit module, [] missing bulletin [+] windows version identified as 'Windows 2012 R2 64-bit' [] Traceback (most recent call last): File "windows-exploit-suggester.py", line 1639, in
main()
File "windows-exploit-suggester.py", line 451, in main
elif ARGS.systeminfo or ARGS.ostext: run(database)
File "windows-exploit-suggester.py", line 847, in run
if not ARGS.duplicates: alerted.add(lmsid)
UnboundLocalError: local variable 'lmsid' referenced before assignment