@@ -348,18 +348,18 @@ def __goError(expression, expected=None, resumeValue=True, dump=False):
348348 SQL injection vulnerability on the affected parameter.
349349 """
350350
351- result = None
352-
353- if conf .direct :
354- return direct (expression ), None
351+ output = None
355352
356353 if resumeValue :
357- result = resume (expression , None )
354+ output = resume (expression , None )
358355
359- if not result :
360- result = errorUse ( expression , expected , resumeValue , dump )
356+ if output and expected == EXPECTED . INT and not output . isdigit () :
357+ output = None
361358
362- return result
359+ if output is None :
360+ output = errorUse (expression , expected , resumeValue , dump )
361+
362+ return output
363363
364364def __goInband (expression , expected = None , sort = True , resumeValue = True , unpack = True , dump = False ):
365365 """
@@ -374,10 +374,10 @@ def __goInband(expression, expected=None, sort=True, resumeValue=True, unpack=Tr
374374 if resumeValue :
375375 output = resume (expression , None )
376376
377- if not output or (expected == EXPECTED .INT and not output .isdigit ()):
377+ if not output or (output and ( expected == EXPECTED .INT and not output .isdigit () )):
378378 partial = True
379379
380- if not output :
380+ if output is None :
381381 output = unionUse (expression , resetCounter = True , unpack = unpack , dump = dump )
382382
383383 if output :
@@ -490,7 +490,7 @@ def goStacked(expression, silent=False):
490490 expression = cleanQuery (expression )
491491
492492 if conf .direct :
493- return direct (expression ), None
493+ return direct (expression )
494494
495495 comment = queries [Backend .getIdentifiedDbms ()].comment .query
496496 query = agent .prefixQuery ("; %s" % expression )
0 commit comments