Displaying test cases 280401 - 280425 of 291048 in total
-
Safe sample input : use proc_open to read /tmp/tainted.txt sanitize : check if there is only letters construction : concatenation with simple quote
-
Safe sample input : use proc_open to read /tmp/tainted.txt sanitize : check if there is only letters construction : use of sprintf via a %s with simple quote
-
Safe sample input : use proc_open to read /tmp/tainted.txt sanitize : check if there is only letters construction : use of sprintf via a %s with simple quote
-
Safe sample input : use proc_open to read /tmp/tainted.txt sanitize : check if there is only letters construction : interpretation with simple quote
-
Safe sample input : use proc_open to read /tmp/tainted.txt sanitize : check if there is only letters construction : interpretation with simple quote
-
Safe sample input : use proc_open to read /tmp/tainted.txt sanitize : check if there is only letters construction : concatenation with simple quote
-
Safe sample input : use proc_open to read /tmp/tainted.txt sanitize : check if there is only letters construction : concatenation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : get the field UserData from the variable $_POST sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote