<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
 <head>
  <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  <title>Functions and statements which will check tainted string</title>

 </head>
 <body><div class="manualnavbar" style="text-align: center;">
 <div class="prev" style="text-align: left; float: left;"><a href="taint.detail.basic.html">Functions and Statements which will spread the tainted mark of a
   tainted string</a></div>
 <div class="next" style="text-align: right; float: right;"><a href="taint.detail.untaint.html">Functions which untaint the tainted string</a></div>
 <div class="up"><a href="taint.detail.html">More Details</a></div>
 <div class="home"><a href="index.html">PHP Manual</a></div>
</div><hr /><div id="taint.detail.taint" class="section">
  <h2 class="title">Functions and statements which will check tainted string</h2>
  <p class="para">
   <table class="doctable table">
    
    
      <col />
      <col />
     <thead>
      <tr>
       <th>Function/Statement</th>
       <th>Since</th>
      </tr>

     </thead>

     <tbody class="tbody">
      <tr>
       <td colspan="2">Basic statments</td>
      </tr>

      <tr>
       <td>eval</td>
       <td>0.1.0</td>
      </tr>

      <tr>
       <td>include/include_once</td>
       <td>0.1.0</td>
      </tr>

      <tr>
       <td>require/require_once</td>
       <td>0.1.0</td>
      </tr>

      

      <tr>
       <td colspan="2">Outputing Functions</td>
      </tr>

      <tr>
       <td>echo</td>
       <td>0.1.0</td>
      </tr>

      <tr>
       <td>print</td>
       <td>0.1.0</td>
      </tr>

      <tr>
       <td>printf</td>
       <td>0.1.0</td>
      </tr>

      <tr>
       <td>file_put_contents</td>
       <td>0.1.0</td>
      </tr>

      
      <tr>
       <td colspan="2">File System Functions</td>
      </tr>

      <tr>
       <td>fopen</td>
       <td>0.2.0</td>
      </tr>

      <tr>
       <td>opendir</td>
       <td>0.2.0</td>
      </tr>

      <tr>
       <td>basename</td>
       <td>0.2.0</td>
      </tr>

      <tr>
       <td>dirname</td>
       <td>0.2.0</td>
      </tr>

      <tr>
       <td>file</td>
       <td>0.2.0</td>
      </tr>

      <tr>
       <td>pathinfo</td>
       <td>0.2.0</td>
      </tr>

      
      <tr>
       <td colspan="2">Database relevant Functions</td>
      </tr>

      <tr>
       <td>mysql_query</td>
       <td>0.2.0</td>
      </tr>

      <tr>
       <td>mysqli_query/MySQLi::query</td>
       <td>0.2.0</td>
      </tr>

      <tr>
       <td>sqlite_query/SqliteDataBase::query</td>
       <td>0.3.0</td>
      </tr>

      <tr>
       <td>sqlite_single_query/SqliteDataBase::singleQuery</td>
       <td>0.3.0</td>
      </tr>

      <tr>
       <td>oci_parse</td>
       <td>0.3.0</td>
      </tr>

      <tr>
       <td>PDO::query</td>
       <td>0.3.0</td>
      </tr>

      <tr>
       <td>PDO::prepare</td>
       <td>0.3.0</td>
      </tr>

      
      <tr>
       <td colspan="2">Command Line relevant Functions</td>
      </tr>

      <tr>
       <td>system</td>
       <td>0.1.0</td>
      </tr>

      <tr>
       <td>exec</td>
       <td>0.1.0</td>
      </tr>

      <tr>
       <td>proc_open</td>
       <td>0.1.0</td>
      </tr>

      <tr>
       <td>passthru</td>
       <td>0.1.0</td>
      </tr>

      <tr>
       <td>shell_exec</td>
       <td>0.3.0</td>
      </tr>

      

     </tbody>
    
   </table>

  </p>
 </div><hr /><div class="manualnavbar" style="text-align: center;">
 <div class="prev" style="text-align: left; float: left;"><a href="taint.detail.basic.html">Functions and Statements which will spread the tainted mark of a
   tainted string</a></div>
 <div class="next" style="text-align: right; float: right;"><a href="taint.detail.untaint.html">Functions which untaint the tainted string</a></div>
 <div class="up"><a href="taint.detail.html">More Details</a></div>
 <div class="home"><a href="index.html">PHP Manual</a></div>
</div></body></html>
