Automatic SQL injection and database takeover tool
Go to file
Bernardo Damele 206191d164 Major bug fix so that when the expected value of a query (count variable)
is an integer and for some reason the resumed value from session file is
a string or a binary file, the query is executed again and and its new
output saved to the session file
2008-11-02 19:21:19 +00:00
doc Major bug fix so that the users' privileges enumeration now works properly also on both MySQL < 5.0 and MySQL >= 5.0 also if the user has provided one or more users with -U option; 2008-11-02 18:17:12 +00:00
extra/msfauxmod Minor improvements to sqlmap msf3 auxiliary modules based on Efrain Torres' commit on msf3 trunk, http://metasploit.com/dev/trac/changeset/5787 2008-10-25 19:43:13 +00:00
lib Major bug fix so that when the expected value of a query (count variable) 2008-11-02 19:21:19 +00:00
plugins Major bug fix so that when the expected value of a query (count variable) 2008-11-02 19:21:19 +00:00
shell After the storm, a restore.. 2008-10-15 15:38:22 +00:00
txt After the storm, a restore.. 2008-10-15 15:38:22 +00:00
xml Major bug fix so that the users' privileges enumeration now works properly also on both MySQL < 5.0 and MySQL >= 5.0 also if the user has provided one or more users with -U option; 2008-11-02 18:17:12 +00:00
sqlmap.conf Major bug fix to correctly dump tables entries 2008-10-26 16:10:28 +00:00
sqlmap.py Be more user friendly on messages and minor code layout improvement 2008-11-02 18:23:42 +00:00