We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent be118e8 commit 6caba63Copy full SHA for 6caba63
2 files changed
lib/core/settings.py
@@ -20,7 +20,7 @@
20
from thirdparty.six import unichr as _unichr
21
22
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
23
-VERSION = "1.7.9.0"
+VERSION = "1.7.9.1"
24
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
25
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
26
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)
sqlmap.conf
@@ -415,7 +415,7 @@ uFrom =
415
# Column values to use for UNION query SQL injection.
416
# Valid: string
417
# Example: NULL,1,*,NULL
418
-uChar =
+uValues =
419
420
# Domain name used for DNS exfiltration attack.
421
0 commit comments