This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
line 390 : error
fix
except (IOError, Exception) as e:
line 679 : error
fix
except (csv.Error) as e:
line 847
if not ARGS.duplicates: alerted.add(lmsid)
fix :
space instead of tab
line 1567 :
fix:
except (urllib2.URLError, Exception) as e:
line 1607 :
print(message)
line 330 import module StringIO error :
replace module by : io.StringIO
line 333 about module urllib
just change theses lines :
import urllib.request
...
opener = urllib.request.build_opener()
line 390 : error fix except (IOError, Exception) as e: line 679 : error fix except (csv.Error) as e: line 847 if not ARGS.duplicates: alerted.add(lmsid) fix : space instead of tab line 1567 : fix: except (urllib2.URLError, Exception) as e:
line 1607 : print(message)
line 330 import module StringIO error : replace module by : io.StringIO
line 333 about module urllib just change theses lines : import urllib.request ... opener = urllib.request.build_opener()