0) { $host = $in['HOST']; } else { $host = $_SERVER['REMOTE_ADDR'] ." (" . $_SERVER['REMOTE_HOST'] . ")"; } # virus/filter bypass hashes # if bypass modes have been set to > 0, # then the GBYPASS or GIBYPASS variable will contain the filter/infection bypass hash. # if bypass modes have been set to -1, # then the HASH variable will be set to 1 if the CGI should generate a GBYPASS hash (filter bypass), # or 2 if the CGI should generate a GIBYPASS hash (infection bypass). $fbypasshash = $in['GBYPASS']; # filter bypass hash - can be undefined $ibypasshash = $in['GIBYPASS']; # infection bypass hash - can be undefined $hashflag = $in['HASH']; # hash flag - can be undefined; 1 = generate GBYPASS; 2 = generate GIBYPASS if ( strlen($in['GBYPASS']) > 0) { $bypass = $in['GBYPASS']; } if ( strlen($in['GIBYPASS']) > 0) { $bypass = $in['GIBYPASS']; } $user_info = "-"; if (strlen($user) > 0) { $user_info = $user; } if (strlen($cats) > 0) { $cats_info = 'categories:
$cats'; } function ReadEnvs () { global $allow_html_code; $in = array(); if (isset($_SERVER['QUERY_STRING'])) { $clp = preg_split("/::/", $_SERVER['QUERY_STRING']); foreach ($clp as $pair) { $name = $value = ""; list($name, $value) = (preg_split("/==/", $pair)); $value = urldecode($value); $value = preg_replace("/\+/", " ", $value); $value = preg_replace("/\|/", " | ", $value); $value = preg_replace("/\<\!--.*--\>/", "", $value); if ($allow_html_code != 1) { $value = preg_replace("/\<.*\>/",'',$value); } $in[$name] = $value; } } return $in; } $html = << E2Guardian - {$access_denied}
ACCESS DEINIED

{$oops1}! {$oops2}:



{$deniedurl}

{$because}

{$reason}  {$cats}


{$details}:

User: {$user_info}
Host:{$host}