Searched refs:unserialize (Results 76 – 100 of 319) sorted by relevance
12345678910>>...13
2 Bug #26762 (unserialize() produces lowercase classnames)18 @unserialize('O:3:"FOO":0:{}');
7 $incomplete = unserialize($serialized);9 $complete = unserialize($serialized);102 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…104 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…106 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…109 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…111 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…114 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…116 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…120 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…[all …]
7 $o = unserialize($d);23 …nknown" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…25 …nknown" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…28 …nknown" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…
5 echo unserialize('O:13:"SplFileObject":1:{s:9:"*filename";s:15:"/home/flag/flag";}');11 Notice: unserialize(): Error at offset 24 of 64 bytes in %sbug67072.php on line %d
2 Bug #72785: allowed_classes only applies to outermost unserialize()11 var_dump(unserialize($s, ['allowed_classes' => ['ArrayObject']]));
2 Test serialize() & unserialize() functions: objects (abstract classes)34 $unserialize_data = unserialize($serialize_data);39 $unserialize_data = unserialize($serialize_data);
2 Bug #68545 Use after free vulnerability in unserialize()17 $y = unserialize($z);
11 public function unserialize($serialized) {18 var_dump(unserialize($s));
5 var_dump(unserialize('a:7:{i:0;i:04;s:1:"a";i:2;i:9617006;i:4;s:1:"a";i:4;s:1:"a";R:5;s:1:"7";R:3;s…8 Notice: unserialize(): Error at offset %d of %d bytes in %s on line %d
12 var_dump(unserialize('O:1:"A":0:{}'));18 var_dump(unserialize('a:2:{i:0;O:1:"A":0:{}i:1;O:1:"A":0:{}}'));
2 Bug #55798 (serialize followed by unserialize with numeric object prop. gives integer prop)11 $b = unserialize(serialize($a));
2 Bug #68976 Use After Free Vulnerability in unserialize()20 $data = unserialize('a:2:{i:0;O:9:"evilClass":1:{s:4:"name";a:2:{i:0;i:1;i:1;i:2;}}i:1;R:4;}');
8 var_dump(unserialize($poc));11 Notice: unserialize(): Error at offset 43 of 145 bytes in %s on line %d
8 var_dump(unserialize($payload));15 Notice: SplObjectStorage::unserialize(): Unexpected end of serialized data in %s on line %d
9 echo unserialize($data);16 #0 %sbug73452.php(4): unserialize('O:9:"SoapFault"...')
10 public function unserialize($x) {20 var_dump(unserialize($o));
2 Bug #72434: ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize7 // Create our payload and unserialize it.9 $unserialized_payload = unserialize($serialized_payload);
13 unserialize($poc);17 Notice: unserialize(): Error at offset 50 of 50 bytes in %sbug72663_3.php on line %d
6 $o2 = unserialize(serialize($o));11 $o3->unserialize($o->serialize());
2 Bug #70959 (ArrayObject unserialize does not restore protected fields)20 $obj2 = unserialize(serialize($obj));
2 SPL: Bug #70166 Use After Free Vulnerability in unserialize() with SPLArrayObject8 $data = unserialize($exploit);
2 SPL: Bug #70169 Use After Free Vulnerability in unserialize() with SplDoublyLinkedList8 $data = unserialize($exploit);
2 Bug #69085 (SoapClient's __call() type confusion through unserialize())10 $dummy = unserialize('O:10:"SoapClient":5:{s:3:"uri";s:1:"a";s:8:"location";s:22:"http://localhost/…
7 $dp = unserialize($s);16 #1 %sbug53437_var1.php(%d): unserialize('O:10:"DatePerio...')
6 var_dump(unserialize('O:8:"DateTime":0:{}') == new DateTime);12 #1 %sbug55397.php(%d): unserialize('O:8:"DateTime":...')
Completed in 64 milliseconds