Skip to content

Commit 220dffb

Browse files
committed
Couple of wording updates
1 parent 9fab2c9 commit 220dffb

File tree

7 files changed

+15
-15
lines changed

7 files changed

+15
-15
lines changed

lib/controller/checks.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1054,13 +1054,13 @@ def _(page):
10541054

10551055
if value.lower() in (page or "").lower():
10561056
infoMsg = "heuristic (XSS) test shows that %s parameter " % paramType
1057-
infoMsg += "'%s' might be vulnerable to cross-site scripting attacks" % parameter
1057+
infoMsg += "'%s' might be vulnerable to cross-site scripting (XSS) attacks" % parameter
10581058
logger.info(infoMsg)
10591059

10601060
for match in re.finditer(FI_ERROR_REGEX, page or ""):
10611061
if randStr1.lower() in match.group(0).lower():
10621062
infoMsg = "heuristic (FI) test shows that %s parameter " % paramType
1063-
infoMsg += "'%s' might be vulnerable to file inclusion attacks" % parameter
1063+
infoMsg += "'%s' might be vulnerable to file inclusion (FI) attacks" % parameter
10641064
logger.info(infoMsg)
10651065
break
10661066

lib/core/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
from lib.core.enums import OS
2020

2121
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
22-
VERSION = "1.1.12.1"
22+
VERSION = "1.1.12.2"
2323
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
2424
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
2525
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

lib/request/connect.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1162,7 +1162,7 @@ def _randomizeParameter(paramString, randomParameter):
11621162

11631163
if conf.tor:
11641164
warnMsg = "it's highly recommended to avoid usage of switch '--tor' for "
1165-
warnMsg += "time-based injections because of its high latency time"
1165+
warnMsg += "time-based injections because of inherent high latency time"
11661166
singleTimeWarnMessage(warnMsg)
11671167

11681168
warnMsg = "[%s] [WARNING] %stime-based comparison requires " % (time.strftime("%X"), "(case) " if kb.responseTimeMode else "")

lib/techniques/error/use.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -330,7 +330,7 @@ def errorUse(expression, dump=False):
330330
else:
331331
stopLimit = int(count)
332332

333-
infoMsg = "the SQL query used returns "
333+
infoMsg = "used SQL query returns "
334334
infoMsg += "%d entries" % stopLimit
335335
logger.info(infoMsg)
336336

lib/techniques/union/use.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -262,7 +262,7 @@ def unionUse(expression, unpack=True, dump=False):
262262
else:
263263
stopLimit = int(count)
264264

265-
infoMsg = "the SQL query used returns "
265+
infoMsg = "used SQL query returns "
266266
infoMsg += "%d entries" % stopLimit
267267
logger.info(infoMsg)
268268

plugins/generic/users.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -307,9 +307,9 @@ def getPasswordHashes(self):
307307

308308
if not kb.data.cachedUsersPasswords:
309309
errMsg = "unable to retrieve the password hashes for the "
310-
errMsg += "database users (probably because the session "
311-
errMsg += "user has no read privileges over the relevant "
312-
errMsg += "system database table)"
310+
errMsg += "database users (probably because the DBMS "
311+
errMsg += "current user has no read privileges over the relevant "
312+
errMsg += "system database table(s))"
313313
logger.error(errMsg)
314314
else:
315315
for user in kb.data.cachedUsersPasswords:

txt/checksum.md5

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ f96467fc5cd1d87f52dd7966c8ae6e79 extra/shutils/regressiontest.py
2121
5fb9aaf874daa47ea2b672a22740e56b extra/sqlharvest/__init__.py
2222
1fc7772edce5a01c31f3932b2fc4c1c6 extra/sqlharvest/sqlharvest.py
2323
21bf2b3a7a22b8cd5d96a6457a1b4997 lib/controller/action.py
24-
beb3207c65d01c1e5d959cd6393cd420 lib/controller/checks.py
24+
c0c9a87e5829c76efc69067081edb8b1 lib/controller/checks.py
2525
2db2666dba713c710d248a62b2c1c1fe lib/controller/controller.py
2626
d2cdb9e832e18a81e936ca3348144b16 lib/controller/handler.py
2727
5fb9aaf874daa47ea2b672a22740e56b lib/controller/__init__.py
@@ -46,7 +46,7 @@ e1c000db9be27f973569b1a430629037 lib/core/option.py
4646
760d9df2a27ded29109b390ab202e72d lib/core/replication.py
4747
a2466b62e67f8b31736bac4dac590e51 lib/core/revision.py
4848
02d4762140a72fd44668d3dab5eabda9 lib/core/session.py
49-
4a2c73dcb44a0982c61e35afee07aada lib/core/settings.py
49+
faf4f1fadbe9ab2c911e8e8b9e382c11 lib/core/settings.py
5050
35bffbad762eb9e03db9e93b1c991103 lib/core/shell.py
5151
a59ec28371ae067a6fdd8f810edbee3d lib/core/subprocessng.py
5252
d93501771b41315f9fb949305b6ed257 lib/core/target.py
@@ -68,7 +68,7 @@ d8d9bcf9e7107a5e2cf2dd10f115ac28 lib/parse/payloads.py
6868
d2f13a0e2fef5273d419d06e516122e1 lib/request/basicauthhandler.py
6969
9ef264b5c0f9e7989b8c2ab91d40400d lib/request/basic.py
7070
28348595147a731677c8bef470c6f57a lib/request/comparison.py
71-
5a2d97c7b672228e695855ff43fb7960 lib/request/connect.py
71+
ae823462aad7cd1081e6609192ba3109 lib/request/connect.py
7272
ad6f76839408d827abfcdc57813f8518 lib/request/direct.py
7373
4853bd0d523646315607a6a9a4c0b745 lib/request/dns.py
7474
effa0c3e4efceaf4932855e8e6677bf7 lib/request/httpshandler.py
@@ -93,11 +93,11 @@ ca47f20b11f58ce60a0ddfcfca242d3f lib/techniques/blind/inference.py
9393
95331b2826f28db9ff962670391aa7d6 lib/techniques/dns/test.py
9494
82cc907fb335250703072337d8f8cceb lib/techniques/dns/use.py
9595
5fb9aaf874daa47ea2b672a22740e56b lib/techniques/error/__init__.py
96-
5953b814b91e6a03d26f319203b48d01 lib/techniques/error/use.py
96+
6ac0636513e7e009034fec33d6a6af7e lib/techniques/error/use.py
9797
5fb9aaf874daa47ea2b672a22740e56b lib/techniques/__init__.py
9898
5fb9aaf874daa47ea2b672a22740e56b lib/techniques/union/__init__.py
9999
882bed15db948bd0487d24ff072a1593 lib/techniques/union/test.py
100-
505682f95cb23573dd60bf6d0063a632 lib/techniques/union/use.py
100+
a958a3e7113b2e0d5a3c30ef1114cdc4 lib/techniques/union/use.py
101101
452cb280aa51a4ddf38d94534a6e8d5f lib/utils/api.py
102102
48c3f8216b64825c50f5304cb4dadd95 lib/utils/brute.py
103103
7e0078da1dff59530d64f9b1e2f68607 lib/utils/crawler.py
@@ -213,7 +213,7 @@ c4f4c6754e09a2418a08d1002184f260 plugins/generic/fingerprint.py
213213
136f56e9b7c56c81dec8a2d6ee231b90 plugins/generic/search.py
214214
f65197bb16a0c7b243a322cf89715891 plugins/generic/syntax.py
215215
659b5821b3bfc4c8ef94759bbf968b25 plugins/generic/takeover.py
216-
65524d3fc3373c4ec241a6358f634bbd plugins/generic/users.py
216+
c8e0d8b79d4378d466b1006cff930f7d plugins/generic/users.py
217217
5fb9aaf874daa47ea2b672a22740e56b plugins/__init__.py
218218
b04db3e861edde1f9dd0a3850d5b96c8 shell/backdoors/backdoor.asp_
219219
158bfa168128393dde8d6ed11fe9a1b8 shell/backdoors/backdoor.aspx_

0 commit comments

Comments
 (0)