Displaying test cases 11601 - 11625 of 113211 in total
-
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
-
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
-
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
-
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
-
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
-
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
-
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
-
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
-
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
-
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
-
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : uses indirect reference construction : prepared query and right verification
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : uses indirect reference construction : prepared query and no right verification
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : uses indirect reference construction : right verification
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : uses indirect reference construction : interpretation with simple quote
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : uses of ESAPI, an OWASP API construction : prepared query and right verification
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : uses of ESAPI, an OWASP API construction : prepared query and no right verification
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : uses of ESAPI, an OWASP API construction : right verification
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : uses of ESAPI, an OWASP API construction : interpretation with simple quote
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : use in_array to check if $tainted is in the white list construction : prepared query and right verification
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : use in_array to check if $tainted is in the white list construction : prepared query and no right verification
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : use in_array to check if $tainted is in the white list construction : right verification
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : use in_array to check if $tainted is in the white list construction : interpretation with simple quote
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of ternary condition construction : prepared query and right verification
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of ternary condition construction : prepared query and no right verification