// Now I can be sure that I found a vuln, we control the response
// time with the delay
desc = "Blind SQL injection using time delays was found at: %s"
desc = desc % mutant.found_at()
response_ids = [r.id for r in responses]
v = Vuln.from_mutant("Blind SQL injection vulnerability", desc,
severity.HIGH, response_ids, "blind_sqli",
mutant)
After Change
// Now I can be sure that I found a vuln, we control the response
// time with the delay
desc = "Blind SQL injection using time delays was found at: %s"
desc %= mutant.found_at()
response_ids = [r.id for r in responses]
v = Vuln.from_mutant("Blind SQL injection vulnerability", desc,
severity.HIGH, response_ids, "blind_sqli",
mutant)