Displaying test cases 223601 - 223625 of 248586 in total
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of http_build_query File : use of untrusted data in a double quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of http_build_query File : use of untrusted data in a quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of http_build_query File : use of untrusted data in one side of a double quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of http_build_query File : use of untrusted data in one side of a quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of http_build_query File : use of untrusted data in a double quoted string in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of http_build_query File : use of untrusted data in a simple quoted string in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of http_build_query File : use of untrusted data in a doubled quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of http_build_query File : use of untrusted data in a simple quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of http_build_query File : use of untrusted data in a div tag
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of http_build_query File : use of untrusted data in the body
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of rawurlencode File : use of untrusted data in a double quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of rawurlencode File : use of untrusted data in a quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of rawurlencode File : use of untrusted data in one side of a double quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of rawurlencode File : use of untrusted data in one side of a quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of rawurlencode File : use of untrusted data in a double quoted string in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of rawurlencode File : use of untrusted data in a simple quoted string in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of rawurlencode File : use of untrusted data in a doubled quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of rawurlencode File : use of untrusted data in a simple quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of rawurlencode File : use of untrusted data in a div tag
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of rawurlencode File : use of untrusted data in the body
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of urlencode File : use of untrusted data in a double quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of urlencode File : use of untrusted data in a quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of urlencode File : use of untrusted data in one side of a double quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of urlencode File : use of untrusted data in one side of a quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted SANITIZE : use of urlencode File : use of untrusted data in a double quoted string in a script