AonCyberLabs / Windows-Exploit-Suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
GNU General Public License v3.0
3.97k stars 1.02k forks source link

Script does not work with Python v3.10 #56

Open grav3m1nd-byte opened 2 years ago

grav3m1nd-byte commented 2 years ago

While working on the OSCP labs, I found this script is not working well with the latest Python3 releases and also found a few errors referencing libraries from Python2 as well as Python2 syntax.

I've made the necessary changes locally and could contribute to provide those fixes if wanted.

nirzaa commented 2 years ago

Are you talking about the except IOError, e at line 390 for example? and more that follows? @grav3m1nd-byte

pjun666 commented 2 years ago

这是来自QQ邮箱的假期自动回复邮件。   您好,我最近正在休假中,无法亲自回复您的邮件。我将在假期结束后,尽快给您回复。

windowshopr commented 2 years ago

There's a lot not working in this script re: Python 3.10, not just syntax errors as there are a few of those too.

The BULLETIN_URL is no longer valid, along with the MSSB_URL, so that logic will need to be updated as well. Although since the last update on it was 6 years ago, my guess is it isn't actively maintained anymore, so someone will have to fork it and get it working with Python 3.

pjun666 commented 2 years ago

这是来自QQ邮箱的假期自动回复邮件。   您好,我最近正在休假中,无法亲自回复您的邮件。我将在假期结束后,尽快给您回复。