Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/I6A0E function name: (null) number of ops: 11 compiled vars: !0 = $test_json, !1 = $results, !2 = $vuln_dict line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > ASSIGN !0, '%5B%7B%22theme-my-login%22%3A%7B%22vulnerabilities%22%3A%5B%7B%22id%22%3A6043%2C%22title%22%3A%22Theme+My+Login+6.3.9+-+Local+File+Inclusion%22%2C%22url%22%3A%5B%22http%3A%2F%2Fpacketstormsecurity.com%2Ffiles%2F127302%2F%22%2C%22http%3A%2F%2Fseclists.org%2Ffulldisclosure%2F2014%2FJun%2F172%22%2C%22http%3A%2F%2Fwww.securityfocus.com%2Fbid%2F68254%22%2C%22https%3A%2F%2Fsecurity.dxw.com%2Fadvisories%2Flfi-in-theme-my-login%2F%22%5D%2C%22osvdb%22%3A%5B%22108517%22%5D%2C%22vuln_type%22%3A%22LFI%22%2C%22created_at%22%3A%222014-08-01T10%3A58%3A35.000Z%22%2C%22updated_at%22%3A%222014-08-01T10%3A58%3A35.000Z%22%2C%22fixed_in%22%3A%226.3.10%22%7D%5D%7D%7D%2C%7B%22login-rebuilder%22%3A%7B%22vulnerabilities%22%3A%5B%7B%22id%22%3A6044%2C%22title%22%3A%22Login+Rebuilder+%5Cu003c+1.2.0+-+Cross+Site+Request+Forgery+Vulnerability%22%2C%22osvdb%22%3A%5B%22108364%22%5D%2C%22cve%22%3A%5B%222014-3882%22%5D%2C%22vuln_type%22%3A%22CSRF%22%2C%22created_at%22%3A%222014-08-01T10%3A58%3A35.000Z%22%2C%22updated_at%22%3A%222014-08-01T10%3A58%3A35.000Z%22%2C%22fixed_in%22%3A%221.2.0%22%7D%5D%7D%7D%5D' 3 1 INIT_FCALL 'json_decode' 2 SEND_VAR !0 3 SEND_VAL <true> 4 DO_ICALL $4 5 ASSIGN !1, $4 4 6 ASSIGN !2, <array> 8 7 INIT_FCALL 'print_r' 8 SEND_VAR !1 9 DO_ICALL 9 10 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0