Displaying test cases 223676 - 223700 of 248586 in total
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of intval File : use of untrusted data in a simple quoted string in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of intval File : use of untrusted data in a doubled quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of intval File : use of untrusted data in a simple quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of intval File : use of untrusted data in a unquoted attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of intval File : use of untrusted data in a div tag
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of intval File : use of untrusted data in the body
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of intval File : unsafe, use of untrusted data in CSS
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of intval File : unsafe, use of untrusted data in an tag name
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of intval File : unsafe, use of untrusted data in an attribute name
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of intval File : unsafe, use of untrusted data in a comment
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of intval File : unsafe, use of untrusted data in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlspecialchars. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in a double quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlspecialchars. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in a quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlspecialchars. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in one side of a double quoted expression in a...
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlspecialchars. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in one side of a quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlspecialchars. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in a double quoted string in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlspecialchars. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in a simple quoted string in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlspecialchars. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in a doubled quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlspecialchars. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in a simple quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlspecialchars. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in a div tag
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlspecialchars. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in the body
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlentities. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in a double quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlentities. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in a quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlentities. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in one side of a double quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function htmlentities. Sanitizes the query but has a high chance to produce unexpected results File : use of untrusted data in one side of a quoted expression in a script