diff --git a/e107_plugins/log/e_meta.php b/e107_plugins/log/e_meta.php index 16cddd6e8..bd1534656 100644 --- a/e107_plugins/log/e_meta.php +++ b/e107_plugins/log/e_meta.php @@ -9,8 +9,8 @@ * Administration Area - User classes * * $Source: /cvs_backup/e107_0.8/e107_plugins/log/e_meta.php,v $ - * $Revision: 1.4 $ - * $Date: 2009-11-08 16:15:31 $ + * $Revision: 1.5 $ + * $Date: 2009-11-08 19:46:44 $ * $Author: e107steved $ * */ @@ -32,12 +32,10 @@ if (isset($pref['statActivate']) && $pref['statActivate']) if (is_numeric(e_QUERY)) $err_flag .= '/'.substr(e_QUERY,0,10); // This should pick up the error code - and limit numeric length to upset the malicious $err_flag .= "&err_referer=".$_SERVER['HTTP_REFERER']; } - echo "\n"; +document.write( '' ); +"; + $e107 = e107::getInstance(); + $e107->getJs()->headerInline($logJS, 5); + }