parse(); // This is the vulnerable call - eval() on user-controlled input $selectors = $doc->getSelectorsBySpecificity('> ' . $_GET['n']); echo "
";
    print_r($selectors);
    echo "
"; } else { echo "Sabberworm PHP CSS Parser Test - pass ?n= parameter"; }