Thanks to visit codestin.com Credit goes to github.com
We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 6d53d8d commit 5150172Copy full SHA for 5150172
1 file changed
lib/core/common.py
@@ -530,8 +530,7 @@ def paramToDict(place, parameters=None):
530
or re.search(r'\A9{3,}', _) or re.search(DUMMY_USER_INJECTION, _):
531
warnMsg = "it appears that you have provided tainted parameter values "
532
warnMsg += "('%s') with most probably leftover " % element
533
- warnMsg += "chars from manual SQL injection "
534
- warnMsg += "tests (%s) or non-valid numerical value. " % DUMMY_SQL_INJECTION_CHARS
+ warnMsg += "chars/statements from manual SQL injection test(s). "
535
warnMsg += "Please, always use only valid parameter values "
536
warnMsg += "so sqlmap could be able to properly run "
537
logger.warn(warnMsg)
0 commit comments