Displaying test cases 22051 - 22075 of 113211 in total
-
Source: _GET Sanitization: bin2hex Dataflow: assignment Context: sql_quotes Sink: mysqli_real_query_method_prm__<$>(db)
-
Source: _REQUEST Sanitization: intval Dataflow: assignment Context: sql_plain Sink: pdo_query_prm__<$>(pdo)
-
Source: _REQUEST Sanitization: bin2hex Dataflow: assignment Context: sql_plain Sink: pg_query_prm__<$>(db)
-
Source: _GET Sanitization: crc32 Dataflow: assignment Context: sql_apostrophe Sink: mssql_sqlsrv_prepare_prm__<$>(db)
-
Source: _REQUEST Sanitization: bindec Dataflow: assignment Context: sql_apostrophe Sink: mysqli_real_query_prm__<$>(db)
-
Source: _GET Sanitization: intval Dataflow: assignment Context: sql_plain Sink: pdo_query_prm__<$>(pdo)
-
Source: _COOKIE Sanitization: ord Dataflow: assignment Context: sql_apostrophe Sink: mysqli_multi_query_prm__<$>(db)
-
Source: _GET Sanitization: floatval Dataflow: assignment Context: sql_apostrophe Sink: sqlite3_query_prm__<$>(db)
-
Source: _REQUEST Sanitization: addslashes Dataflow: assignment Context: sql_plain Sink: pdo_query_prm__<$>(pdo)
-
Source: _COOKIE Sanitization: doubleval Dataflow: assignment Context: sql_apostrophe Sink: mysqli_multi_query_method_prm__<$>(db)
-
Source: _GET Sanitization: bindec Dataflow: assignment Context: sql_apostrophe Sink: pdo_prepare_prm__<$>(pdo)
-
Source: _COOKIE Sanitization: nosanitization Dataflow: assignment Context: sql_apostrophe Sink: mysqli_real_query_method_prm__<$>(db)
-
Source: _COOKIE Sanitization: hexdec Dataflow: assignment Context: sql_quotes Sink: sqlite3_query_prm__<$>(db)
-
Source: _REQUEST Sanitization: addslashes Dataflow: assignment Context: sql_plain Sink: mysqli_real_query_method_prm__<$>(db)
-
Source: getallheaders Sanitization: addslashes Dataflow: assignment Context: sql_plain Sink: db2_exec_prm__<$>(db)
-
Source: _POST Sanitization: hexdec Dataflow: assignment Context: sql_plain Sink: mysqli_prepare_prm__<$>(db)
-
Source: getallheaders Sanitization: crc32 Dataflow: assignment Context: sql_apostrophe Sink: mysqli_multi_query_prm__<$>(db)
-
Source: _COOKIE Sanitization: crc32 Dataflow: assignment Context: sql_plain Sink: mysqli_multi_query_prm__<$>(db)
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache POI - Source Taint: SOCKET - Data Type: simple - Data Flow: basic - Control Flow: in...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Apache Lenya - Source Taint: ENVIRONMENT_VARIABLE - Data Type: SIMPLE - Data Flow: IN...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache Jena - Source Taint: FILE_CONTENTS - Data Type: void_pointer - Data Flow: basic - Co...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Apache Lenya - Source Taint: ENVIRONMENT_VARIABLE - Data Type: VOID_POINTER - Data Fl...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: JTree - Source Taint: SOCKET - Data Type: SIMPLE - Data Flow: BASIC - Control Flow: ...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Elastic Search - Source Taint: FILE_CONTENTS - Data Type: void_pointer - Data Flow: var_arg...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Apache Jena - Source Taint: SOCKET - Data Type: SIMPLE - Data Flow: ADDRESS_AS_CONSTA...