Sindbad~EG File Manager

Current Path : /home/beeson/public_html/michaelbeeson_old/
Upload File :
Current File : //home/beeson/public_html/michaelbeeson_old/interests.php

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">

<?php
function sanitize($x)
// x is a filename, might contain one slash and might end in a filename extension.
// If x contains more than one slash,  or  two periods in a row,  return "".
// Else return x.
{ if(strstr($x,".."))
     return "";
  if(substr_count($x,"/") > 1)
     return "";
  return $x;
}
?>

<html>
<!-- DW6 -->
<?php include ('include/head.php'); 
    //  require_once('counter.php');
?>
<body onmousemove="closesubnav(event);"> 
<?php include ('include/body.php'); ?>
<?php $_SESSION['ReferringPage'] = $_SERVER['HTTP_REFERER']; 
?>
  <div class="style1" id="pageName"> 
   <p></p>
   
  </div>
  <div class="style1" id="content">
      <table border="0" cellpadding="0" cellspacing="0" style="border-collapse: collapse" bordercolor="#111111" width="96%" id="AutoNumber1">
        <tr>
          <td>  
             <?php 
               $include = $_GET['include'];   
			   
			    // prevent a security vulnerability in which the hacker substitutes for the GET parameter
			    // a path like "../../../../../etc/passwd".
			   
			   $include = sanitize($include);
				if ( $include=="" )
					{ include ("include/index.html");
					}
				else
					{ include ("interests/".$include);
					}
				?>	       
		  </td>
        </tr>
      </table>
      
 </div>   
<?php include ('include/footer.php'); ?>
</body>
</html>  

Sindbad File Manager Version 1.0, Coded By Sindbad EG ~ The Terrorists