Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 40e4422

Browse files
committed
Trivial cosmetics (breaking help into two lines)
1 parent 98ac1cf commit 40e4422

2 files changed

Lines changed: 3 additions & 3 deletions

File tree

lib/core/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
from thirdparty.six import unichr as _unichr
1919

2020
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
21-
VERSION = "1.5.3.11"
21+
VERSION = "1.5.3.12"
2222
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
2323
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
2424
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

lib/parse/cmdline.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -704,7 +704,7 @@ def cmdLineParser(argv=None):
704704
help="Regexp for filtering targets")
705705

706706
general.add_argument("--skip-heuristics", dest="skipHeuristics", action="store_true",
707-
help="Skip heuristic detection of SQLi/XSS/FI vulnerabilities")
707+
help="Skip heuristic detection of vulnerabilities")
708708

709709
general.add_argument("--skip-waf", dest="skipWaf", action="store_true",
710710
help="Skip heuristic detection of WAF/IPS protection")
@@ -731,7 +731,7 @@ def cmdLineParser(argv=None):
731731
help="Run host OS command(s) when SQL injection is found")
732732

733733
miscellaneous.add_argument("--beep", dest="beep", action="store_true",
734-
help="Beep on question and/or when SQLi/XSS/FI is found")
734+
help="Beep on question and/or when vulnerability is found")
735735

736736
miscellaneous.add_argument("--dependencies", dest="dependencies", action="store_true",
737737
help="Check for missing (optional) sqlmap dependencies")

0 commit comments

Comments
 (0)