This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
GNU General Public License v3.0
3.94k
stars
1.02k
forks
source link
Fixed issue#34 OS name parsing for Server 2016 #41
The osnamearray defined in getname() needs an update for server 2016
def getname(ostext):
if ostext == False: return False
osname=False
osnamearray=[["xp","XP"], ["2000","2000"], ["2003","2003"], ["vista","Vista"], ["2008","2008"], [" 7","7"], [" 8","8"], ["2012","2012"], ["2016","2016"], <== Added ["8.1","8.1"], [" 10","10"]]