# Update the database$./windows-exploit-suggester.py--update[*] initiating...[*] successfully requested base url[*] scraped ms download url[+] writing to file 2014-06-06-mssb.xlsx[*] done# Install dependencies# (install python-xlrd)pipinstallxlrd--upgrade# Feed it "systeminfo" input, and point it to the microsoft database$./windows-exploit-suggester.py--database2014-06-06-mssb.xlsx--systeminfowin7sp1-systeminfo.txt[*] initiating...[*] database file detected as xls or xlsx based on extension[*] reading from the systeminfo input file[*] querying database file for potential vulnerabilities[*] comparing the 15 hotfix(es) against the 173 potential bulletins(s)[*] there are now 168 remaining vulns[+] windows version identified as 'Windows 7 SP1 32-bit'[*] [M] MS14-012: Cumulative Security Update for Internet Explorer (2925418) - Critical[E] MS13-101: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2880430) - Important [M] MS13-090: Cumulative Security Update of ActiveX Kill Bits (2900986) - Critical[M] MS13-080: Cumulative Security Update for Internet Explorer (2879017) - Critical[M] MS13-069: Cumulative Security Update for Internet Explorer (2870699) - Critical[M] MS13-059: Cumulative Security Update for Internet Explorer (2862772) - Critical[M] MS13-055: Cumulative Security Update for Internet Explorer (2846071) - Critical[M] MS13-053: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2850851) - Critical[M] MS13-009: Cumulative Security Update for Internet Explorer (2792100) - Critical[M] MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) - Important[*] done