Displaying test cases 242351 - 242375 of 248586 in total
-
Safe sample input : Uses popen to read the file /tmp/tainted.txt using cat command sanitize : check if there is only letters construction : concatenation with simple quote
-
Safe sample input : Uses popen to read the file /tmp/tainted.txt using cat command sanitize : check if there is only letters construction : use of sprintf via a %s with simple quote
-
Safe sample input : Uses popen to read the file /tmp/tainted.txt using cat command sanitize : check if there is only letters construction : use of sprintf via a %s with simple quote
-
Safe sample input : Uses popen to read the file /tmp/tainted.txt using cat command sanitize : check if there is only letters construction : interpretation with simple quote
-
Safe sample input : Uses popen to read the file /tmp/tainted.txt using cat command sanitize : check if there is only letters construction : interpretation with simple quote
-
Safe sample input : Uses popen to read the file /tmp/tainted.txt using cat command sanitize : check if there is only letters construction : concatenation with simple quote
-
Safe sample input : Uses popen to read the file /tmp/tainted.txt using cat command sanitize : check if there is only letters construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : use of sprintf via a %s with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : interpretation with simple quote
-
Safe sample input : reads the field UserData from the variable $_GET sanitize : use mysql_real_escape_string via an object and a classic getter construction : concatenation with simple quote