Displaying test cases 224301 - 224325 of 248586 in total
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a magic_quotes_filter via filter_var function File : use of untrusted data in a doubled quote attribute
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a magic_quotes_filter via filter_var function File : use of untrusted data in a simple quote attribute
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a full_special_chars_filter via filter_var function File : use of untrusted data in a double quoted event handler in a script
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a full_special_chars_filter via filter_var function File : use of untrusted data in a quoted event handler in a script
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a full_special_chars_filter via filter_var function File : use of untrusted data in one side of a double quoted expression in a script
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a full_special_chars_filter via filter_var function File : use of untrusted data in one side of a quoted expression in a script
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a full_special_chars_filter via filter_var function File : use of untrusted data in a double quoted string in a script
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a full_special_chars_filter via filter_var function File : use of untrusted data in a simple quoted string in a script
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a full_special_chars_filter via filter_var function File : use of untrusted data in a doubled quote attribute
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a full_special_chars_filter via filter_var function File : use of untrusted data in a simple quote attribute
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a full_special_chars_filter via filter_var function File : use of untrusted data in a div tag
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses a full_special_chars_filter via filter_var function File : use of untrusted data in the body
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses an email_filter via filter_var function File : use of untrusted data in a double quoted event handler in a script
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses an email_filter via filter_var function File : use of untrusted data in one side of a double quoted expression in a script
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses an email_filter via filter_var function File : use of untrusted data in a double quoted string in a script
-
Safe sample input : backticks interpretation, reading the file /tmp/tainted.txt Uses an email_filter via filter_var function File : use of untrusted data in a doubled quote attribute
-
Safe sample sanitize : none construction : encrypt the data using password_hash function
-
Safe sample sanitize : none construction : encrypt the data using sha512 with crypt function
-
Safe sample sanitize : none construction : encrypt the data using sha256 with crypt function
-
Safe sample sanitize : sha256 with crypt function construction : store sensitive data in a database
-
Safe sample sanitize : sha256 with crypt function construction : store sensitive data in a cookie
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : use in_array to check if $tainted is in the white list construction : use of sprintf via a %d with simple quote
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : use in_array to check if $tainted is in the white list construction : use of sprintf via a %d with simple quote
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : use in_array to check if $tainted is in the white list construction : interpretation with simple quote
-
Safe sample input : get the $_GET['userData'] in an array SANITIZE : use in_array to check if $tainted is in the white list construction : interpretation with simple quote