Searched refs:unserialize (Results 26 – 50 of 319) sorted by relevance
12345678910>>...13
30 public function unserialize($payload) {31 echo "unserialize() called\n";38 var_dump(unserialize($s));40 var_dump(unserialize('C:4:"Test":7:{payload}'));53 unserialize() called
10 var_dump(unserialize('R:1;'));14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}'));18 Notice: unserialize(): Error at offset 4 of 4 bytes in %s on line %d21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d
2 Bug #71311 Use-after-free vulnerability in SPL(SplObjectStorage, unserialize)5 $data = unserialize("C:16:\"SplObjectStorage\":113:{x:i:2;O:8:\"stdClass\":0:{},a:2:{s:4:\"prev\";i…11 #0 [internal function]: SplObjectStorage->unserialize('%s')12 #1 %s%ebug71313.php(2): unserialize('%s')
26 var_dump(unserialize($s));30 var_dump(unserialize($s));35 var_dump(unserialize($s));43 var_dump(unserialize($s));50 Notice: unserialize(): Error at offset 17 of 24 bytes in %s on line %d53 Notice: unserialize(): Error at offset 25 of 32 bytes in %s on line %d
2 Bug #74111: Heap buffer overread (READ: 1) finish_nested_data from unserialize6 var_dump(unserialize($s));9 Notice: unserialize(): Error at offset 25 of 23 bytes in %s on line %d
2 Bug #70172 - Use After Free Vulnerability in unserialize()10 function unserialize($data) {11 $this->data = unserialize($data);25 $data = unserialize($exploit);
10 var_dump(unserialize('O:4:"Test":1:{}'));14 Notice: unserialize(): Unexpected end of serialized data in %s on line %d16 Notice: unserialize(): Error at offset 14 of 15 bytes in %s on line %d
6 var_dump(unserialize($s));9 Warning: unserialize(): %s in %sbug74101.php on line %d11 Notice: unserialize(): Error at offset 46 of 74 bytes in %sbug74101.php on line %d
2 serialize()/unserialize() with exotic letters15 var_dump(unserialize(serialize($foo)));17 var_dump(unserialize(serialize($������)));
22 var_dump(unserialize(serialize($t)) == $t);25 var_dump(unserialize(serialize($t)) == $t);28 var_dump(unserialize(serialize($t)) == $t);31 var_dump(unserialize(serialize($t)) == $t);
2 Bug #62836 (Seg fault or broken object references on unserialize())7 unserialize("i:4;");11 print_r(unserialize($serialized_object));
2 Bug #62836 (Seg fault or broken object references on unserialize())10 unserialize("i:4;");14 print_r(unserialize($serialized_object));
2 Bug #31442 (unserialize broken on 64-bit systems)7 echo unserialize(serialize(2147483648));
2 Bug #70172 - Use After Free Vulnerability in unserialize()10 function unserialize($data) {11 $this->data = unserialize($data);32 $data = unserialize($exploit);
26 public function unserialize($str)28 $r = unserialize($str);29 $r = unserialize($r[0]);
2 serialize()/unserialize() floats in array.12 $b = unserialize($str);18 $b = unserialize($str);
2 Bug #75673 (SplStack::unserialize() behavior)11 $stack->unserialize($serialized);13 $stack->unserialize($serialized);
2 Bug #72562: Use After Free in unserialize() with Unexpected Session Deserialization13 $out_1[] = unserialize($uns_1);25 $out_2 = unserialize($uns_2);41 Notice: unserialize(): Error at offset 0 of 1 bytes in %s%ebug72562.php on line %d43 Notice: unserialize(): Error at offset 4 of 4 bytes in %s%ebug72562.php on line %d
32 public function unserialize($data) {40 $tmp = unserialize(serialize($obj));46 … $db->exec("INSERT INTO test(myobj) VALUES ('Data fetched from DB to be given to unserialize()')");75 myclass::unserialize('Value from serialize()')80 myclass::unserialize('Data fetched from DB to be given to unserialize()')83 myclass::unserialize('Data fetched from DB to be given to unserialize()')88 myclass::unserialize('Data fetched from DB to be given to unserialize()')
2 Bug #72433: Use After Free Vulnerability in PHP's GC algorithm and unserialize6 var_dump(unserialize($serialized_payload));9 Notice: unserialize(): Error at offset %d of %d bytes in %sbug72433.php on line 3
24 * `php-fuzz-unserialize`: Fuzzing unserialize() function25 * `php-fuzz-unserializehash`: Fuzzing unserialize() for HashContext objects38 For the unserialize fuzzer, a dictionary of internal classes should be generated first:42 cp -r sapi/fuzzer/corpus/unserialize ./my-unserialize-corpus43 sapi/fuzzer/php-fuzz-unserialize -dict=$PWD/sapi/fuzzer/dict/unserialize ./my-unserialize-corpus50 cp -r sapi/fuzzer/corpus/unserializehash ./my-unserialize-corpus51 sapi/fuzzer/php-fuzz-unserializehash ./my-unserialize-corpus
2 Bug #70284 (Use after free vulnerability in unserialize() with GMP)11 $data = unserialize($exploit);37 Fatal error: Uncaught Exception: Could not unserialize number in %sbug70284.php:639 #0 %sbug70284.php(6): unserialize('%s')
2 Bug #68942 (Use after free vulnerability in unserialize() with DateTimeZone).5 $data = unserialize('a:2:{i:0;O:12:"DateTimeZone":2:{s:13:"timezone_type";a:2:{i:0;i:1;i:1;i:2;}s:8…12 #1 %s(%d): unserialize('a:2:{i:0;O:12:"...')
17 var_dump(unserialize('O:9:"Generator":0:{}'));23 var_dump(unserialize('C:9:"Generator":0:{}'));38 Notice: unserialize(): Error at offset 19 of 20 bytes in %sserialize_unserialize_error.php on line …42 #0 %s(%d): unserialize('C:9:"Generator"...')
2 Bug #73147: Use After Free in PHP7 unserialize()14 var_dump(unserialize($poc));22 Notice: unserialize(): Error at offset 27 of 44 bytes in %s on line %d
Completed in 34 milliseconds