parse(); // This is the vulnerable call - eval() on user-controlled input $selectors = $doc->getSelectorsBySpecificity('> ' . $_GET['n']); echo "
";
print_r($selectors);
echo "";
} else {
echo "Sabberworm PHP CSS Parser Test - pass ?n= parameter";
}