PHP Vulnerability Test Suite Test suite #103
DownloadDescription
Bertrand C. Stivalet and Aurelien Delaitre designed the architecture and oversaw development of a test generator by Telecom Nancy students to create 42 212 test cases in PHP, covering the most common security weakness categories, including XSS, SQL injection, URL redirection, etc. See Bertrand Stivalet and Elizabeth Fong, "Large Scale Generation of Complex and Faulty PHP Test Cases," 2016 IEEE International Conference on Software Testing, Verification and Validation (ICST), Chicago, IL.
Displaying test cases 28601 - 28625 of 42212 in total
-
Safe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a number_int_filter via filter_var function construction : use of sprintf via a %d with simple quote
-
Safe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a number_int_filter via filter_var function construction : use of sprintf via a %d with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : concatenation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : concatenation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : interpretation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : interpretation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : use of sprintf via a %s with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : use of sprintf via a %s with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : concatenation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : concatenation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : interpretation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : interpretation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : use of sprintf via a %s with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Uses a special_chars_filter via filter_var function construction : use of sprintf via a %s with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Flushes content of $sanitized if the filter email_filter is not applied construction : concatenation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Flushes content of $sanitized if the filter email_filter is not applied construction : concatenation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Flushes content of $sanitized if the filter email_filter is not applied construction : interpretation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Flushes content of $sanitized if the filter email_filter is not applied construction : interpretation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Flushes content of $sanitized if the filter email_filter is not applied construction : use of sprintf via a %s with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Flushes content of $sanitized if the filter email_filter is not applied construction : use of sprintf via a %s with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Flushes content of $sanitized if the filter email_filter is not applied construction : concatenation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Flushes content of $sanitized if the filter email_filter is not applied construction : concatenation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Flushes content of $sanitized if the filter email_filter is not applied construction : interpretation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Flushes content of $sanitized if the filter email_filter is not applied construction : interpretation with simple quote
-
Unsafe sample input : Uses popen to read the file /tmp/tainted.txt using cat command Flushes content of $sanitized if the filter email_filter is not applied construction : use of sprintf via a %s with simple quote