PHP Vulnerability Test Suite Test suite #103
DownloadDescription
Bertrand C. Stivalet and Aurelien Delaitre designed the architecture and oversaw development of a test generator by Telecom Nancy students to create 42 212 test cases in PHP, covering the most common security weakness categories, including XSS, SQL injection, URL redirection, etc. See Bertrand Stivalet and Elizabeth Fong, "Large Scale Generation of Complex and Faulty PHP Test Cases," 2016 IEEE International Conference on Software Testing, Verification and Validation (ICST), Chicago, IL.
Displaying test cases 41951 - 41975 of 42212 in total
-
Unsafe sample input : get the $_GET['userData'] in an array sanitize : none File : unsafe, use of untrusted data in a quoted property value (CSS)
-
Unsafe sample input : get the $_GET['userData'] in an array sanitize : none File : unsafe, use of untrusted data in a property value in a span tag(CSS)
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : unsafe, use of untrusted data in a script
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : unsafe, use of untrusted data in a comment
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : unsafe, use of untrusted data in an attribute name
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : unsafe, use of untrusted data in an tag name
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : unsafe, use of untrusted data in CSS
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in the body
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in a div tag
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in a unquoted attribute
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in a simple quote attribute
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in a doubled quote attribute
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in a simple quoted string in a script
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in a double quoted string in a script
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in one side of a quoted expression in a script
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in one side of a double quoted expression in a script
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in a quoted event handler in a script
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in a double quoted event handler in a script
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : unsafe, use of untrusted data in the function setInterval
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in a property value (CSS)
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : use of untrusted data in a double quoted property value (CSS)
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : unsafe, use of untrusted data in a quoted property value (CSS)
-
Safe sample input : get the $_GET['userData'] in an array sanitize : use of floatval File : unsafe, use of untrusted data in a property value in a span tag(CSS)
-
Unsafe sample input : get the $_GET['userData'] in an array sanitize : use of the function htmlentities. Sanitizes the query but has a high chance to produce unexpected results File : unsafe, use of untrusted data in a script
-
Unsafe sample input : get the $_GET['userData'] in an array sanitize : use of the function htmlentities. Sanitizes the query but has a high chance to produce unexpected results File : unsafe, use of untrusted data in a comment