Vulnerability: SQL Injection (Blind)
	{$WarningHtml}
	
";
if( $vulnerabilityFile == 'high.php' ) {
	$page[ 'body' ] .= "Click 
here to change your ID.";
}
else {
	$page[ 'body' ] .= "
		
";
}
$page[ 'body' ] .= "
		{$html}
	
 
	More Information
	
		- " . dvwaExternalLinkUrlGet( 'http://www.securiteam.com/securityreviews/5DP0N1P76E.html' ) . "
 
		- " . dvwaExternalLinkUrlGet( 'https://en.wikipedia.org/wiki/SQL_injection' ) . "
 
		- " . dvwaExternalLinkUrlGet( 'http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/' ) . "
 
		- " . dvwaExternalLinkUrlGet( 'http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet' ) . "
 
		- " . dvwaExternalLinkUrlGet( 'https://www.owasp.org/index.php/Blind_SQL_Injection' ) . "
 
		- " . dvwaExternalLinkUrlGet( 'http://bobby-tables.com/' ) . "
 
	
 \n";
dvwaHtmlEcho( $page );
?>