Description
Unsafe sample
input : get the field userData from the variable $_GET via an object, which store it in a array
sanitize : use of ternary condition
File : use of untrusted data in a double quoted event handler in a script
Flaws
Test Suites
Have any comments on this test case? Please, send us an email.