Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 10 Branch analysis from position: 8 1 jumps found. (Code = 42) Position 1 = 11 Branch analysis from position: 11 2 jumps found. (Code = 43) Position 1 = 18, Position 2 = 20 Branch analysis from position: 18 1 jumps found. (Code = 42) Position 1 = 21 Branch analysis from position: 21 2 jumps found. (Code = 43) Position 1 = 28, Position 2 = 30 Branch analysis from position: 28 1 jumps found. (Code = 42) Position 1 = 31 Branch analysis from position: 31 2 jumps found. (Code = 43) Position 1 = 38, Position 2 = 40 Branch analysis from position: 38 1 jumps found. (Code = 42) Position 1 = 41 Branch analysis from position: 41 2 jumps found. (Code = 43) Position 1 = 48, Position 2 = 50 Branch analysis from position: 48 1 jumps found. (Code = 42) Position 1 = 51 Branch analysis from position: 51 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 50 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 40 2 jumps found. (Code = 43) Position 1 = 48, Position 2 = 50 Branch analysis from position: 48 Branch analysis from position: 50 Branch analysis from position: 30 2 jumps found. (Code = 43) Position 1 = 38, Position 2 = 40 Branch analysis from position: 38 Branch analysis from position: 40 Branch analysis from position: 20 2 jumps found. (Code = 43) Position 1 = 28, Position 2 = 30 Branch analysis from position: 28 Branch analysis from position: 30 Branch analysis from position: 10 2 jumps found. (Code = 43) Position 1 = 18, Position 2 = 20 Branch analysis from position: 18 Branch analysis from position: 20 filename: /in/hls7K function name: (null) number of ops: 52 compiled vars: !0 = $contents, !1 = $pattern, !2 = $matches line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > ASSIGN !0, 'GET' 4 1 ASSIGN !1, '%2F%5E.%2AGET.%2A%24%2Fm' 5 2 INIT_FCALL 'preg_match_all' 3 SEND_VAR !1 4 SEND_VAR !0 5 SEND_REF !2 6 DO_ICALL $5 7 > JMPZ $5, ->10 6 8 > ECHO 'You+used+GET+method+%21%0A' 9 > JMP ->11 9 10 > ECHO 'It+might+not+to+be+vulnerable+%21%0A' 12 11 > ASSIGN !1, '%2F%5E.%2Ainclude.%2A%24%2Fm' 13 12 INIT_FCALL 'preg_match_all' 13 SEND_VAR !1 14 SEND_VAR !0 15 SEND_REF !2 16 DO_ICALL $7 17 > JMPZ $7, ->20 14 18 > ECHO 'You+used+include+function+%21%0A' 19 > JMP ->21 17 20 > ECHO 'It+might+not+to+be+vulnerable+%21%0A' 20 21 > ASSIGN !1, '%2F%5E.%2Ainclude_once.%2A%24%2Fm' 21 22 INIT_FCALL 'preg_match_all' 23 SEND_VAR !1 24 SEND_VAR !0 25 SEND_REF !2 26 DO_ICALL $9 27 > JMPZ $9, ->30 22 28 > ECHO 'You+used+include_once+function+%21%0A' 29 > JMP ->31 25 30 > ECHO 'It+might+not+to+be+vulnerable+%21%0A' 28 31 > ASSIGN !1, '%2F%5E.%2Arequire.%2A%24%2Fm' 29 32 INIT_FCALL 'preg_match_all' 33 SEND_VAR !1 34 SEND_VAR !0 35 SEND_REF !2 36 DO_ICALL $11 37 > JMPZ $11, ->40 30 38 > ECHO 'You+used+require+function+%21%0A' 39 > JMP ->41 33 40 > ECHO 'It+might+not+to+be+vulnerable+%21%0A' 36 41 > ASSIGN !1, '%2F%5E.%2Arequire_once.%2A%24%2Fm' 37 42 INIT_FCALL 'preg_match_all' 43 SEND_VAR !1 44 SEND_VAR !0 45 SEND_REF !2 46 DO_ICALL $13 47 > JMPZ $13, ->50 38 48 > ECHO 'You+used+require_once+function+%21%0A' 49 > JMP ->51 41 50 > ECHO 'It+might+not+to+be+vulnerable+%21%0A' 43 51 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0