diff --git a/lib/core/settings.py b/lib/core/settings.py index 2f3e06fa6..9d5d5cf78 100644 --- a/lib/core/settings.py +++ b/lib/core/settings.py @@ -18,7 +18,7 @@ from lib.core.enums import OS from thirdparty.six import unichr as _unichr # sqlmap version (...) -VERSION = "1.3.5.161" +VERSION = "1.3.5.162" TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable" TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34} VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE) diff --git a/lib/utils/hash.py b/lib/utils/hash.py index a3314b656..fd2695d75 100644 --- a/lib/utils/hash.py +++ b/lib/utils/hash.py @@ -651,7 +651,7 @@ def attackDumpedTable(): if binary_fields: _ = ','.join(binary_fields) - warnMsg = "potential binary fields detected ('%s'). You are " % _ + warnMsg = "potential binary fields detected ('%s'). In case of any problems you are " % _ warnMsg += "advised to rerun table dump with '--fresh-queries --binary-fields=\"%s\"'" % _ logger.warn(warnMsg)