Displaying test cases 225001 - 225025 of 248586 in total
-
Safe sample input : get the field userData from the variable $_GET via an object sanitize : check if there is only numbers construction : use of sprintf via a %d with simple quote
-
Safe sample input : get the field userData from the variable $_GET via an object sanitize : check if there is only numbers construction : interpretation with simple quote
-
Safe sample input : get the field userData from the variable $_GET via an object sanitize : check if there is only numbers construction : interpretation with simple quote
-
Safe sample input : get the field userData from the variable $_GET via an object sanitize : check if there is only numbers construction : concatenation with simple quote
-
Safe sample input : get the field userData from the variable $_GET via an object sanitize : check if there is only numbers construction : concatenation with simple quote
-
Safe sample input : get the field userData from the variable $_GET via an object sanitize : check if there is only letters construction : use of sprintf via a %s with simple quote
-
Safe sample input : get the field userData from the variable $_GET via an object sanitize : check if there is only letters construction : use of sprintf via a %s with simple quote
-
Safe sample input : get the field userData from the variable $_GET via an object sanitize : check if there is only letters construction : interpretation with simple quote
-
Safe sample input : get the field userData from the variable $_GET via an object sanitize : check if there is only letters construction : interpretation with simple quote
-
Safe sample input : get the field userData from the variable $_GET via an object sanitize : check if there is only letters construction : concatenation with simple quote
-
Safe sample input : get the field userData from the variable $_GET via an object sanitize : check if there is only letters construction : concatenation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : use of sprintf via a %d with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : use of sprintf via a %d with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : interpretation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : interpretation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : concatenation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : concatenation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : use of sprintf via a %s with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : use of sprintf via a %s with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : interpretation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : interpretation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : concatenation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : concatenation with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : use of sprintf via a %s with simple quote
-
Safe sample input : Get a serialize string in POST and unserialize it SANITIZE : use in_array to check if $tainted is in the white list construction : use of sprintf via a %s with simple quote