We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent dfa426f commit 7828f61Copy full SHA for 7828f61
1 file changed
lib/controller/checks.py
@@ -748,7 +748,7 @@ def checkFilteredChars(injection):
748
warnMsg += "filtered by the back-end server. There is a strong "
749
warnMsg += "possibility that sqlmap won't be able to properly "
750
warnMsg += "exploit this vulnerability"
751
- logger.critical(warnMsg)
+ logger.warn(warnMsg)
752
753
# inference techniques depend on character '>'
754
if not any(_ in injection.data for _ in (PAYLOAD.TECHNIQUE.ERROR, PAYLOAD.TECHNIQUE.UNION, PAYLOAD.TECHNIQUE.QUERY)):
0 commit comments