Description
Safe sample
input : reads the field UserData from the variable $_GET
SANITIZE : use of mysql_real_escape string
construction : use of sprintf via a %d with simple quote
Test Suites
Have any comments on this test case? Please, send us an email.