http://192.168.56.101/webapps/sqli/sqli.php The developers were notified about the vulnerability, and they were asked to fix the vulnerability. After fixing the vulnerability, the new code has been promoted to the following URL. http://192.168.56.101/webapps/sqli/sqliv2.php Analyze the fixed code and check if the vulnerability is properly fixed. If not, spot the vulnerability. Source code has been provided for both original code and fixed code. The original code can be accessed from: http://192.168.56.101/webapps/sqli/original.txt The fixed code for your review can be accessed from http://192.168.56.101/webapps/sqli/review.txt Let us begin with reviewing what is reported. Following is the vulnerable code. As highlighted in red, the application takes user input and concatenates it to the existing query to form the final query. If you notice, there is no sanitization performed on the user input thus leaving the application at serious risk.