Displaying test cases 272001 - 272025 of 291048 in total
-
Unsafe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_string construction : concatenation with simple quote
-
Unsafe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_string construction : use of sprintf via a %s with simple quote
-
Unsafe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_string construction : interpretation with simple quote
-
Unsafe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_string construction : concatenation with simple quote
-
Unsafe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_string construction : use of sprintf via a %s with simple quote
-
Unsafe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_string construction : interpretation with simple quote
-
Unsafe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_string construction : concatenation with simple quote
-
Unsafe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_string construction : use of sprintf via a %s with simple quote
-
Unsafe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_string construction : interpretation with simple quote
-
Unsafe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_string construction : concatenation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : use of sprintf via a %s with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : interpretation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : concatenation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : use of sprintf via a %s with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : interpretation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : concatenation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : use of sprintf via a %s with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : interpretation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : concatenation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : use of sprintf via a %s with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : interpretation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use of pg_escape_literal construction : concatenation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use str_replace to escape special chars - construction : use of sprintf via a %s with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use str_replace to escape special chars - construction : use of sprintf via a %s with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use str_replace to escape special chars - construction : interpretation with simple quote