DetExploit icon indicating copy to clipboard operation
DetExploit copied to clipboard

[4984] Failed to execute script main

Open keides2 opened this issue 5 years ago • 1 comments

Hi, I have an error below:

C:\Users\xxxxx\Desktop\DetExploit_1.1_Release\DetExploit_1.1_Release>DetExploit.exe
    ____       _   _____            _       _ _
   |  _ \  ___| |_| ____|_  ___ __ | | ___ (_) |_
   | | | |/ _ \ __|  _| \ \/ / '_ \| |/ _ \| | __|
   | |_| |  __/ |_| |___ >  <| |_) | | (_) | | |_
   |____/ \___|\__|_____/_/\_\ .__/|_|\___/|_|\__|
                             |_|
===========================================================
   Hello, W0rld!! Welcome to DetExploit v1.4-alpha :D
===========================================================
   Downloading vulnerability data from ExploitDB GitHub repo.
   Download complete.
===========================================================
   Extracting Windows platform exploit from exploitdb.detexploit......
   Extracted successfully.
===========================================================
   Downloading vulnerability data from JVN.
   This may need a long time to process.
   Do not exit the program.

2010: 100%|██████████████████████████████████████████████████████████████████████████████████████| 12/12 [04:55<00:00, 23.42s/it]
2011: 100%|██████████████████████████████████████████████████████████████████████████████████████| 12/12 [05:19<00:00, 25.93s/it]
2012: 100%|██████████████████████████████████████████████████████████████████████████████████████| 12/12 [05:06<00:00, 25.56s/it]
2013: 100%|██████████████████████████████████████████████████████████████████████████████████████| 12/12 [05:23<00:00, 27.48s/it]
2014: 100%|██████████████████████████████████████████████████████████████████████████████████████| 12/12 [04:41<00:00, 24.66s/it]
2015: 100%|██████████████████████████████████████████████████████████████████████████████████████| 12/12 [04:58<00:00, 21.24s/it]
2016: 100%|██████████████████████████████████████████████████████████████████████████████████████| 12/12 [04:45<00:00, 22.67s/it]
2017: 100%|██████████████████████████████████████████████████████████████████████████████████████| 12/12 [04:36<00:00, 22.17s/it]
2018: 100%|██████████████████████████████████████████████████████████████████████████████████████| 12/12 [05:14<00:00, 27.29s/it]
2019: 100%|██████████████████████████████████████████████████████████████████████████████████████| 12/12 [04:52<00:00, 24.10s/it]

   Download complete.
===========================================================
   Downloading vulnerability data from NVD.
   Download complete.
===========================================================
   Running update searcher script to gather not-installed update.
Traceback (most recent call last):
  File "main.py", line 158, in <module>
  File "main.py", line 147, in main_init
  File "main.py", line 108, in main
  File "report.py", line 172, in generate_report
UnboundLocalError: local variable 'ext' referenced before assignment
[4984] Failed to execute script main

Could you tell me th solution? I usually set up a proxy in a Linux environment. Do I need to configure a proxy even in a Windows command prompt environment? I 'd like to avoid re-downloading the JVN and NVD DB if possible.

Thank you,

keides2 avatar Jan 07 '20 08:01 keides2

Thank you for posting an issue. This error was already known stuff, which will happen in an environment that uses a proxy. (Currently, DetExploit doesn't support downloading data against the proxy.) I will try to work out with supporting proxy soon, so please wait for a while. Actually, avoiding re-downloading vulnerability data is not realistic at this point, because of data from JVN and NVD are saved inside memory (on v1.1). I'll really apologize for your inconvenience but please re-download data by executing the binary file on further versions. I'm going to keep these issues open and try to tell you about the info of new versions that solves your problem. Again, thank you for reporting the issue!!!

mopisec avatar Jan 07 '20 09:01 mopisec