AonCyberLabs / Windows-Exploit-Suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
GNU General Public License v3.0
3.94k stars 1.02k forks source link

UnboundLocalError: local variable 'lmsid' referenced before assignment #32

Open galaris opened 6 years ago

galaris commented 6 years ago

C:\Python>python.exe windows-exploit-suggester.py -i systeminfo_result.txt -d 2018-06-01-mssb.xls [] initiating winsploit version 3.3... [] database file detected as xls or xlsx based on extension [] attempting to read from the systeminfo input file [+] systeminfo input file read successfully (utf-8) [] querying database file for potential vulnerabilities [] comparing the 203 hotfix(es) against the 266 potential bulletins(s) with a database of 137 known exploits [] there are now 111 remaining vulns [+] [E] exploitdb PoC, [M] Metasploit module, [] missing bulletin [+] windows version identified as 'Windows 2012 R2 64-bit' [] Traceback (most recent call last): File "windows-exploit-suggester.py", line 1639, in main() File "windows-exploit-suggester.py", line 451, in main elif ARGS.systeminfo or ARGS.ostext: run(database) File "windows-exploit-suggester.py", line 847, in run if not ARGS.duplicates: alerted.add(lmsid) UnboundLocalError: local variable 'lmsid' referenced before assignment

sammbertram commented 6 years ago

Do you mind posting a redacted version of the systeminfo output? I just ran it against the 2018-06-02 database and it works fine for me.

nightmare-wolf commented 2 years ago

I am just using this python script and I am having the same issue. Any help please?