diff --git a/lib/core/settings.py b/lib/core/settings.py index a0f5f759c..0d943f8ee 100644 --- a/lib/core/settings.py +++ b/lib/core/settings.py @@ -20,7 +20,7 @@ from thirdparty import six from thirdparty.six import unichr as _unichr # sqlmap version (...) -VERSION = "1.7.9.0" +VERSION = "1.7.9.1" TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable" TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34} VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE) diff --git a/sqlmap.conf b/sqlmap.conf index df95a9e7f..c74c20d34 100644 --- a/sqlmap.conf +++ b/sqlmap.conf @@ -415,7 +415,7 @@ uFrom = # Column values to use for UNION query SQL injection. # Valid: string # Example: NULL,1,*,NULL -uChar = +uValues = # Domain name used for DNS exfiltration attack. # Valid: string