diff options
| -rwxr-xr-x | php-malware-finder/tests.sh | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/php-malware-finder/tests.sh b/php-malware-finder/tests.sh index 895e202..fe9141a 100755 --- a/php-malware-finder/tests.sh +++ b/php-malware-finder/tests.sh | |||
| @@ -73,7 +73,7 @@ run_test artificial/dodgy.php '0x18d:$shellshock: () { :;};' | |||
| 73 | run_test artificial/dodgy.php '0x169:$pr: preg_replace ("/\*/e' | 73 | run_test artificial/dodgy.php '0x169:$pr: preg_replace ("/\*/e' |
| 74 | run_test artificial/dodgy.php '0x1e0:$user_function: call_user_func' | 74 | run_test artificial/dodgy.php '0x1e0:$user_function: call_user_func' |
| 75 | run_test artificial/dodgy.php '0x1fd:$various: <!--#exec cmd=' | 75 | run_test artificial/dodgy.php '0x1fd:$various: <!--#exec cmd=' |
| 76 | run_test artificial/dodgy.php '0x214:$: AddType application/x-httpd-php' | 76 | run_test artificial/dodgy.php '0x214:$: AddType application/x-httpd-php .htaccess' |
| 77 | 77 | ||
| 78 | run_test artificial/bypasses.php 'DodgyPhp' | 78 | run_test artificial/bypasses.php 'DodgyPhp' |
| 79 | run_test artificial/bypasses.php '0x6d:$execution: call_user_func_array($_POST' | 79 | run_test artificial/bypasses.php '0x6d:$execution: call_user_func_array($_POST' |
