Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 10 Branch analysis from position: 8 1 jumps found. (Code = 42) Position 1 = 11 Branch analysis from position: 11 2 jumps found. (Code = 46) Position 1 = 20, Position 2 = 26 Branch analysis from position: 20 2 jumps found. (Code = 43) Position 1 = 27, Position 2 = 29 Branch analysis from position: 27 1 jumps found. (Code = 42) Position 1 = 30 Branch analysis from position: 30 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 29 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 26 Branch analysis from position: 10 2 jumps found. (Code = 46) Position 1 = 20, Position 2 = 26 Branch analysis from position: 20 Branch analysis from position: 26 filename: /in/Kb8C3 function name: (null) number of ops: 33 compiled vars: !0 = $text, !1 = $matches line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > ASSIGN !0, '%C5%A2admethod' 4 1 ECHO 'Preg%3A+' 2 INIT_FCALL 'preg_match' 3 SEND_VAL '%23%5E.%2A%28%28%3F%3Abadmethod%29%7C%28%3F%3Aevilfunction%29%29.%2A%24%23s' 4 SEND_VAR !0 5 SEND_REF !1 6 DO_ICALL $3 7 > JMPZ $3, ->10 8 > QM_ASSIGN ~4 'yes' 9 > JMP ->11 10 > QM_ASSIGN ~4 'no' 11 > ECHO ~4 12 ECHO '%0A' 5 13 ECHO 'Common%3A+' 14 INIT_FCALL 'strpos' 15 SEND_VAR !0 16 SEND_VAL 'badmethod' 17 DO_ICALL $5 18 TYPE_CHECK 1018 ~6 $5 19 > JMPZ_EX ~6 ~6, ->26 20 > INIT_FCALL 'strpos' 21 SEND_VAR !0 22 SEND_VAL 'evilfunction' 23 DO_ICALL $7 24 TYPE_CHECK 1018 ~8 $7 25 BOOL ~6 ~8 26 > > JMPZ ~6, ->29 27 > QM_ASSIGN ~9 'yes' 28 > JMP ->30 29 > QM_ASSIGN ~9 'no' 30 > ECHO ~9 31 ECHO '%0A' 32 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0