Skip to content

Commit 956b0eb

Browse files
committed
Trivial message update
1 parent 2f5a5e5 commit 956b0eb

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

lib/core/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
from thirdparty.six import unichr as _unichr
1919

2020
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
21-
VERSION = "1.3.5.161"
21+
VERSION = "1.3.5.162"
2222
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
2323
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
2424
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

lib/utils/hash.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -651,7 +651,7 @@ def attackDumpedTable():
651651

652652
if binary_fields:
653653
_ = ','.join(binary_fields)
654-
warnMsg = "potential binary fields detected ('%s'). You are " % _
654+
warnMsg = "potential binary fields detected ('%s'). In case of any problems you are " % _
655655
warnMsg += "advised to rerun table dump with '--fresh-queries --binary-fields=\"%s\"'" % _
656656
logger.warn(warnMsg)
657657

0 commit comments

Comments
 (0)