Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 47) Position 1 = 3, Position 2 = 6 Branch analysis from position: 3 2 jumps found. (Code = 47) Position 1 = 7, Position 2 = 22 Branch analysis from position: 7 2 jumps found. (Code = 47) Position 1 = 16, Position 2 = 20 Branch analysis from position: 16 2 jumps found. (Code = 43) Position 1 = 23, Position 2 = 32 Branch analysis from position: 23 1 jumps found. (Code = 79) Position 1 = -2 Branch analysis from position: 32 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 20 Branch analysis from position: 22 Branch analysis from position: 6 filename: /in/YKpfM function name: (null) number of ops: 33 compiled vars: !0 = $debugIps line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > FETCH_IS ~1 '_SERVER' 1 ISSET_ISEMPTY_DIM_OBJ 0 ~2 ~1, 'HTTP_CLIENT_IP' 2 > JMPNZ_EX ~2 ~2, ->6 4 3 > FETCH_IS ~3 '_SERVER' 4 ISSET_ISEMPTY_DIM_OBJ 0 ~4 ~3, 'HTTP_X_FORWARDED_FOR' 5 BOOL ~2 ~4 6 > > JMPNZ_EX ~2 ~2, ->22 5 7 > INIT_FCALL 'in_array' 8 BEGIN_SILENCE ~5 9 FETCH_R global ~6 '_SERVER' 10 FETCH_DIM_R ~7 ~6, 'REMOTE_ADDR' 11 END_SILENCE ~5 12 SEND_VAL ~7 13 SEND_VAR !0 14 DO_ICALL $8 15 > JMPNZ_EX ~9 $8, ->20 16 > INIT_FCALL 'php_sapi_name' 17 DO_ICALL $10 18 IS_IDENTICAL ~11 $10, 'cli-server' 19 BOOL ~9 ~11 20 > BOOL_NOT ~12 ~9 21 BOOL ~2 ~12 22 > > JMPZ ~2, ->32 7 23 > INIT_FCALL 'header' 24 SEND_VAL 'HTTP%2F1.0+403+Forbidden' 25 DO_ICALL 8 26 INIT_FCALL 'basename' 27 SEND_VAL '%2Fin%2FYKpfM' 28 DO_ICALL $14 29 CONCAT ~15 'You+are+not+allowed+to+access+this+file.+Check+', $14 30 CONCAT ~16 ~15, '+for+more+information.' 31 > EXIT ~16 9 32 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0