Displaying test cases 223726 - 223750 of 248586 in total
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of floatval File : unsafe, use of untrusted data in a comment
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of floatval File : unsafe, use of untrusted data in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function addslashes File : use of untrusted data in a double quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function addslashes File : use of untrusted data in a quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function addslashes File : use of untrusted data in one side of a double quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function addslashes File : use of untrusted data in one side of a quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function addslashes File : use of untrusted data in a double quoted string in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function addslashes File : use of untrusted data in a simple quoted string in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function addslashes File : use of untrusted data in a doubled quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of the function addslashes File : use of untrusted data in a simple quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : unsafe, use of untrusted data in a property value in a span tag(CSS)
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : unsafe, use of untrusted data in a quoted property value (CSS)
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in a double quoted property value (CSS)
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in a property value (CSS)
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : unsafe, use of untrusted data in the function setInterval
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in a double quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in a quoted event handler in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in one side of a double quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in one side of a quoted expression in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in a double quoted string in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in a simple quoted string in a script
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in a doubled quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in a simple quote attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in a unquoted attribute
-
Safe sample input : use exec to execute the script /tmp/tainted.php and store the output in $tainted sanitize : use of settype_int File : use of untrusted data in a div tag