Skip to content

Commit 5326df1

Browse files
committed
Minor grammar fix
1 parent 9a2cdd4 commit 5326df1

File tree

8 files changed

+18
-18
lines changed

8 files changed

+18
-18
lines changed

lib/controller/checks.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -932,7 +932,7 @@ def checkSuhosinPatch(injection):
932932

933933
if injection.place == PLACE.GET:
934934
debugMsg = "checking for parameter length "
935-
debugMsg += "constrainting mechanisms"
935+
debugMsg += "constraining mechanisms"
936936
logger.debug(debugMsg)
937937

938938
pushValue(kb.injection)
@@ -941,7 +941,7 @@ def checkSuhosinPatch(injection):
941941
randInt = randomInt()
942942

943943
if not checkBooleanExpression("%d=%s%d" % (randInt, ' ' * SUHOSIN_MAX_VALUE_LENGTH, randInt)):
944-
warnMsg = "parameter length constrainting "
944+
warnMsg = "parameter length constraining "
945945
warnMsg += "mechanism detected (e.g. Suhosin patch). "
946946
warnMsg += "Potential problems in enumeration phase can be expected"
947947
logger.warn(warnMsg)

lib/core/common.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1014,7 +1014,7 @@ def readInput(message, default=None, checkBatch=True, boolean=False):
10141014

10151015
dataToStdout("\r%s%s\n" % (message, options), forceOutput=True, bold=True)
10161016

1017-
debugMsg = "used the default behaviour, running in batch mode"
1017+
debugMsg = "used the default behavior, running in batch mode"
10181018
logger.debug(debugMsg)
10191019

10201020
retVal = default
@@ -1893,7 +1893,7 @@ def isWindowsDriveLetterPath(filepath):
18931893

18941894
def posixToNtSlashes(filepath):
18951895
"""
1896-
Replaces all occurances of Posix slashes (/) in provided
1896+
Replaces all occurrences of Posix slashes (/) in provided
18971897
filepath with NT ones (\)
18981898
18991899
>>> posixToNtSlashes('C:/Windows')
@@ -1904,7 +1904,7 @@ def posixToNtSlashes(filepath):
19041904

19051905
def ntToPosixSlashes(filepath):
19061906
"""
1907-
Replaces all occurances of NT slashes (\) in provided
1907+
Replaces all occurrences of NT slashes (\) in provided
19081908
filepath with Posix ones (/)
19091909
19101910
>>> ntToPosixSlashes('C:\\Windows')
@@ -3764,7 +3764,7 @@ def filterPairValues(values):
37643764

37653765
def randomizeParameterValue(value):
37663766
"""
3767-
Randomize a parameter value based on occurances of alphanumeric characters
3767+
Randomize a parameter value based on occurrences of alphanumeric characters
37683768
37693769
>>> random.seed(0)
37703770
>>> randomizeParameterValue('foobar')

lib/core/convert.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ def stdoutencode(data):
193193
warnMsg = "cannot properly display Unicode characters "
194194
warnMsg += "inside Windows OS command prompt "
195195
warnMsg += "(http://bugs.python.org/issue1602). All "
196-
warnMsg += "unhandled occurances will result in "
196+
warnMsg += "unhandled occurrences will result in "
197197
warnMsg += "replacement with '?' character. Please, find "
198198
warnMsg += "proper character representation inside "
199199
warnMsg += "corresponding output files. "

lib/core/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
from lib.core.enums import OS
2020

2121
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
22-
VERSION = "1.1.12.18"
22+
VERSION = "1.1.12.19"
2323
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
2424
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
2525
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

lib/parse/cmdline.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -626,7 +626,7 @@ def cmdLineParser(argv=None):
626626

627627
general.add_option("--batch", dest="batch",
628628
action="store_true",
629-
help="Never ask for user input, use the default behaviour")
629+
help="Never ask for user input, use the default behavior")
630630

631631
general.add_option("--binary-fields", dest="binaryFields",
632632
help="Result fields having binary values (e.g. \"digest\")")

lib/takeover/metasploit.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -501,7 +501,7 @@ def _loadMetExtensions(self, proc, metSess):
501501

502502
send_all(proc, "getsystem\n")
503503

504-
infoMsg = "displaying the list of Access Tokens availables. "
504+
infoMsg = "displaying the list of available Access Tokens. "
505505
infoMsg += "Choose which user you want to impersonate by "
506506
infoMsg += "using incognito's command 'impersonate_token' if "
507507
infoMsg += "'getsystem' does not success to elevate privileges"

tamper/equaltolike.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def dependencies():
1919

2020
def tamper(payload, **kwargs):
2121
"""
22-
Replaces all occurances of operator equal ('=') with operator 'LIKE'
22+
Replaces all occurrences of operator equal ('=') with operator 'LIKE'
2323
2424
Tested against:
2525
* Microsoft SQL Server 2005

txt/checksum.md5

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -21,14 +21,14 @@ f96467fc5cd1d87f52dd7966c8ae6e79 extra/shutils/regressiontest.py
2121
5fb9aaf874daa47ea2b672a22740e56b extra/sqlharvest/__init__.py
2222
1fc7772edce5a01c31f3932b2fc4c1c6 extra/sqlharvest/sqlharvest.py
2323
21bf2b3a7a22b8cd5d96a6457a1b4997 lib/controller/action.py
24-
8c18f767d400a442f97c72c7d613f200 lib/controller/checks.py
24+
8266f1119366b0857d88f139de9b2035 lib/controller/checks.py
2525
2db2666dba713c710d248a62b2c1c1fe lib/controller/controller.py
2626
d2cdb9e832e18a81e936ca3348144b16 lib/controller/handler.py
2727
5fb9aaf874daa47ea2b672a22740e56b lib/controller/__init__.py
2828
f8a7165253874a9ce0c6e0d089e5fb8c lib/core/agent.py
2929
9eccf8db8b8e259e30c1eade4ee499b0 lib/core/bigarray.py
30-
8b9d75682900c0dc73dbe85293cd41ac lib/core/common.py
31-
54326d3a690f8b26fe5a5da1a589b369 lib/core/convert.py
30+
4c384d4c5af98c12f1dcc7eaa7fb3886 lib/core/common.py
31+
5c918135b3776bb129edbfdd422ece1b lib/core/convert.py
3232
90b1b08368ac8a859300e6fa6a8c796e lib/core/data.py
3333
1c14bdbf47b8dba31f73da9ad731a54a lib/core/datatype.py
3434
2c16cdbbccbfcfc0ddac2cff876ce9f3 lib/core/decorators.py
@@ -46,7 +46,7 @@ f872699e948d0692ce11b54781da814c lib/core/log.py
4646
760d9df2a27ded29109b390ab202e72d lib/core/replication.py
4747
a2466b62e67f8b31736bac4dac590e51 lib/core/revision.py
4848
02d4762140a72fd44668d3dab5eabda9 lib/core/session.py
49-
92cc67e770d2a170ab982f1d9d8ad3ed lib/core/settings.py
49+
abc5b37347c8ab56f108538d03eeda38 lib/core/settings.py
5050
35bffbad762eb9e03db9e93b1c991103 lib/core/shell.py
5151
a59ec28371ae067a6fdd8f810edbee3d lib/core/subprocessng.py
5252
d93501771b41315f9fb949305b6ed257 lib/core/target.py
@@ -57,7 +57,7 @@ e7fb8c09fe7520c32895b859c4edf77a lib/core/update.py
5757
c976dd450b663cb4455cd9efbbcf625b lib/core/wordlist.py
5858
5fb9aaf874daa47ea2b672a22740e56b lib/__init__.py
5959
040081c06de7f4859fdad94264e3ba58 lib/parse/banner.py
60-
dc4c194f9dd2131ff1049cd2674f3695 lib/parse/cmdline.py
60+
3cdffb2379b6e414f799394c40b7fa9e lib/parse/cmdline.py
6161
8247a5483caea5f3004d9ba5d00ab341 lib/parse/configfile.py
6262
c6b7ab146554b660ad264b147815be22 lib/parse/handler.py
6363
fb760bceedfbf70168eb2c4475038c09 lib/parse/headers.py
@@ -82,7 +82,7 @@ b3b351fb8d5e96f9243f7bfa3079d3c7 lib/request/rangehandler.py
8282
76c5ddf3dfeef6611277d6e10b2ab0ad lib/takeover/abstraction.py
8383
a53a068f7b5651fca1ae8da932ba4d96 lib/takeover/icmpsh.py
8484
5fb9aaf874daa47ea2b672a22740e56b lib/takeover/__init__.py
85-
ac3f47b2f8d2cd530512405b4a23a9db lib/takeover/metasploit.py
85+
376cd8d6887d175abb10604e0bc9bd24 lib/takeover/metasploit.py
8686
3309f439e0cb68a707dc3a3c807645b0 lib/takeover/registry.py
8787
21b6eff33f5d28c5e167a948976817cb lib/takeover/udf.py
8888
e49d1213f9ae0c0f922c5aef4febe205 lib/takeover/web.py
@@ -239,7 +239,7 @@ adb6ab6106b93ce9304513b3d72ae60c tamper/charunicodeencode.py
239239
3543785380bad0a5ce563cd998e183d8 tamper/commalessmid.py
240240
178ad9311184baa3e1d4a172fce77cbd tamper/commentbeforeparentheses.py
241241
e9d64dc52b02ae141bca2b2c69540ccc tamper/concat2concatws.py
242-
75f823d925e6f823b8f7dbbe9b72cd5e tamper/equaltolike.py
242+
75b7ebc02f1973e22e54436ce15ca35a tamper/equaltolike.py
243243
6b4e67782f4930b55348fe06f744fc78 tamper/escapequotes.py
244244
573e3304d0dd5977e5a8a93d24fa3f99 tamper/greatest.py
245245
fe4ce7c1d5219fce225048ef8b00a272 tamper/halfversionedmorekeywords.py

0 commit comments

Comments
 (0)