Description
Unsafe sample
input : get the field userData from the variable $_GET via an object, which store it in a array
SANITIZE : use of mysql_real_escape string
File : use of untrusted data in the body
Flaws
Test Suites
Trace
Files
xxxxxxxxxx
1
Have any comments on this test case? Please, send us an email.