Home
last modified time | relevance | path

Searched refs:unserialize (Results 26 – 50 of 302) sorted by relevance

12345678910>>...13

/PHP-7.4/ext/standard/tests/serialize/
H A D__serialize_003.phpt30 public function unserialize($payload) {
31 echo "unserialize() called\n";
38 var_dump(unserialize($s));
40 var_dump(unserialize('C:4:"Test":7:{payload}'));
53 unserialize() called
H A Dbug72663.phpt26 var_dump(unserialize($s));
30 var_dump(unserialize($s));
35 var_dump(unserialize($s));
43 var_dump(unserialize($s));
50 Notice: unserialize(): Error at offset 17 of 24 bytes in %s on line %d
53 Notice: unserialize(): Error at offset 25 of 32 bytes in %s on line %d
H A Dbug71313.phpt2 Bug #71311 Use-after-free vulnerability in SPL(SplObjectStorage, unserialize)
5 $data = unserialize("C:16:\"SplObjectStorage\":113:{x:i:2;O:8:\"stdClass\":0:{},a:2:{s:4:\"prev\";i…
11 #0 [internal function]: SplObjectStorage->unserialize('%s')
12 #1 %s%ebug71313.php(2): unserialize('%s')
H A Dbug70213.phpt10 var_dump(unserialize('R:1;'));
14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}'));
18 Notice: unserialize(): Error at offset 4 of 4 bytes in %s on line %d
21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d
H A Dbug74111.phpt2 Bug #74111: Heap buffer overread (READ: 1) finish_nested_data from unserialize
6 var_dump(unserialize($s));
9 Notice: unserialize(): Error at offset 25 of 23 bytes in %s on line %d
H A Dbug70172.phpt2 Bug #70172 - Use After Free Vulnerability in unserialize()
10 function unserialize($data) {
11 $this->data = unserialize($data);
25 $data = unserialize($exploit);
H A Dbug69152.phpt2 Bug #69152: Type Confusion Infoleak Vulnerability in unserialize()
5 $x = unserialize('O:9:"exception":1:{s:16:"'."\0".'Exception'."\0".'trace";s:4:"ryat";}');
7 $x = unserialize('O:4:"test":1:{s:27:"__PHP_Incomplete_Class_Name";R:1;}');
16 …nknown" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…
H A Dbug74101.phpt6 var_dump(unserialize($s));
9 Warning: unserialize(): %s in %sbug74101.php on line %d
11 Notice: unserialize(): Error at offset 46 of 74 bytes in %sbug74101.php on line %d
H A D006.phpt2 serialize()/unserialize() with exotic letters
15 var_dump(unserialize(serialize($foo)));
17 var_dump(unserialize(serialize($������)));
H A D__serialize_006.phpt10 var_dump(unserialize('O:4:"Test":1:{}'));
14 Notice: unserialize(): Unexpected end of serialized data in %s on line %d
16 Notice: unserialize(): Error at offset 14 of 15 bytes in %s on line %d
H A Dsleep_uninitialized_typed_prop.phpt22 var_dump(unserialize(serialize($t)) == $t);
25 var_dump(unserialize(serialize($t)) == $t);
28 var_dump(unserialize(serialize($t)) == $t);
31 var_dump(unserialize(serialize($t)) == $t);
H A Dbug62836_1.phpt2 Bug #62836 (Seg fault or broken object references on unserialize())
7 unserialize("i:4;");
11 print_r(unserialize($serialized_object));
H A Dbug62836_2.phpt2 Bug #62836 (Seg fault or broken object references on unserialize())
10 unserialize("i:4;");
14 print_r(unserialize($serialized_object));
H A Dbug70172_2.phpt2 Bug #70172 - Use After Free Vulnerability in unserialize()
10 function unserialize($data) {
11 $this->data = unserialize($data);
32 $data = unserialize($exploit);
H A Dbug65481.phpt26 public function unserialize($str)
28 $r = unserialize($str);
29 $r = unserialize($r[0]);
H A Dbug31442.phpt2 Bug #31442 (unserialize broken on 64-bit systems)
7 echo unserialize(serialize(2147483648));
H A D004.phpt2 serialize()/unserialize() floats in array.
12 $b = unserialize($str);
18 $b = unserialize($str);
/PHP-7.4/ext/spl/tests/
H A Dbug75673.phpt2 Bug #75673 (SplStack::unserialize() behavior)
11 $stack->unserialize($serialized);
13 $stack->unserialize($serialized);
/PHP-7.4/ext/session/tests/
H A Dbug72562.phpt2 Bug #72562: Use After Free in unserialize() with Unexpected Session Deserialization
13 $out_1[] = unserialize($uns_1);
25 $out_2 = unserialize($uns_2);
41 Notice: unserialize(): Error at offset 0 of 1 bytes in %s%ebug72562.php on line %d
43 Notice: unserialize(): Error at offset 4 of 4 bytes in %s%ebug72562.php on line %d
/PHP-7.4/ext/pdo_mysql/tests/
H A Dpdo_mysql_stmt_fetch_serialize_simple.phpt32 public function unserialize($data) {
40 $tmp = unserialize(serialize($obj));
46 $db->exec("INSERT INTO test(myobj) VALUES ('Data fetched from DB to be given to unserialize()')");
75 myclass::unserialize('Value from serialize()')
80 myclass::unserialize('Data fetched from DB to be given to unserialize()')
83 myclass::unserialize('Data fetched from DB to be given to unserialize()')
88 myclass::unserialize('Data fetched from DB to be given to unserialize()')
/PHP-7.4/ext/standard/tests/strings/
H A Dbug72433.phpt2 Bug #72433: Use After Free Vulnerability in PHP's GC algorithm and unserialize
6 var_dump(unserialize($serialized_payload));
9 Notice: unserialize(): Error at offset %d of %d bytes in %sbug72433.php on line 3
/PHP-7.4/ext/gmp/tests/
H A Dbug70284.phpt2 Bug #70284 (Use after free vulnerability in unserialize() with GMP)
11 $data = unserialize($exploit);
37 Fatal error: Uncaught Exception: Could not unserialize number in %sbug70284.php:6
39 #0 %sbug70284.php(6): unserialize('%s')
/PHP-7.4/ext/date/tests/
H A Dbug68942.phpt2 Bug #68942 (Use after free vulnerability in unserialize() with DateTimeZone).
5 $data = unserialize('a:2:{i:0;O:12:"DateTimeZone":2:{s:13:"timezone_type";a:2:{i:0;i:1;i:1;i:2;}s:8…
12 #1 %s(%d): unserialize('a:2:{i:0;O:12:"...')
/PHP-7.4/Zend/tests/generators/errors/
H A Dserialize_unserialize_error.phpt17 var_dump(unserialize('O:9:"Generator":0:{}'));
23 var_dump(unserialize('C:9:"Generator":0:{}'));
38 Notice: unserialize(): Error at offset 19 of 20 bytes in %sserialize_unserialize_error.php on line …
42 #0 %s(%d): unserialize('C:9:"Generator"...')
/PHP-7.4/ext/curl/tests/
H A Dbug73147.phpt2 Bug #73147: Use After Free in PHP7 unserialize()
14 var_dump(unserialize($poc));
22 Notice: unserialize(): Error at offset 27 of 44 bytes in %s on line %d

Completed in 53 milliseconds

12345678910>>...13