WindowsVulnScan
WindowsVulnScan copied to clipboard
Bumps [requests](https://github.com/psf/requests) from 2.23.0 to 2.31.0. Release notes Sourced from requests's releases. v2.31.0 2.31.0 (2023-05-22) Security Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential forwarding of Proxy-Authorization...
Bumps [requests](https://github.com/psf/requests) from 2.23.0 to 2.31.0. Release notes Sourced from requests's releases. v2.31.0 2.31.0 (2023-05-22) Security Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential forwarding of Proxy-Authorization...
Bumps [requests](https://github.com/psf/requests) from 2.23.0 to 2.31.0. Release notes Sourced from requests's releases. v2.31.0 2.31.0 (2023-05-22) Security Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential forwarding of Proxy-Authorization...
重复更新
-U大U重复更新,更新一次需要17个小时,更新完使用-,-C-f往下运行 exp是空的, 更新完重新输入更新命令还会重新更新。这是啥情况啊?
输入python3 cve-check.py -C -f KB.json为什么什么都没有呀?每条命令输入后都没有信息回显 
**版本**:[WindowsVulnScan/blob/master/version2/cve-check.py](https://github.com/chroblert/WindowsVulnScan/blob/master/version2/cve-check.py) **错误信息** ``` 更新第20页 Exception in thread 7: Traceback (most recent call last): File "D:\0_tools\python\3.10.5\lib\threading.py", line 1016, in _bootstrap_inner self.run() File "D:\WindowsVulnScan-master\version2\cve-check.py", line 43, in run self.result = self.func(self.args[0],) File...
 前面的步骤都正常,最后运行脚本的时候报了这个错误。用必应说过,说是编码的问题。 https://blog.csdn.net/weixin_30402343/article/details/98493168 供大佬参考
有大哥知道这个怎么搞不? 用的管理员权限的cmd进的Powershell,然后报错。用powershell的管理员权限也报错 