Displaying test cases 283851 - 283875 of 291048 in total
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use str_replace to escape special chars - construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use preg_replace to keep only char, number and _ ,\, - construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use preg_replace to keep only char, number and _ ,\, - construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use preg_replace to keep only char, number and _ ,\, - construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use preg_replace to keep only char, number and _ ,\, - construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use preg_replace to keep only char, number and _ ,\, - construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use preg_replace to keep only char, number and _ ,\, - construction : concatenation with simple quote