Displaying test cases 284176 - 284200 of 291048 in total
-
Unsafe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : interpretation
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : concatenation with simple quote
-
Unsafe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : concatenation
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %u with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %u
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %d with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %d
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : interpretation with simple quote
-
Unsafe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : interpretation
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : concatenation with simple quote
-
Unsafe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : concatenation
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %u with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %u
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %d with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %d
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : interpretation with simple quote
-
Unsafe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : interpretation
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : concatenation with simple quote
-
Unsafe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : concatenation
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET SANITIZE : use of mysql_real_escape string construction : use of sprintf via a %d with simple quote