Searched refs:unserialize (Results 1 – 25 of 228) sorted by relevance
12345678910
2 Bug #25378 (unserialize() crashes with invalid data)5 var_dump(unserialize("s:-1:\"\";"));6 var_dump(unserialize("i:823"));7 var_dump(unserialize("O:8:\"stdClass :0:{}"));8 var_dump(unserialize("O:8:\"stdClass\"+0:{}"));9 var_dump(unserialize("O:1000:\"stdClass\":0:{}"));10 var_dump(unserialize("a:2:{i:0;s:2:\"12\":"));14 var_dump(unserialize("s:3000:\"123\";"));15 var_dump(unserialize("s:3000:\"123"));16 var_dump(unserialize("s:3:\"123;"));[all …]
2 Bug #25378 (unserialize() crashes with invalid data)5 var_dump(unserialize('b:0;'));6 var_dump(unserialize('b:1;'));7 var_dump(unserialize('i:823;'));8 var_dump(unserialize('s:0:"";'));9 var_dump(unserialize('s:3:"foo";'));10 var_dump(unserialize('a:1:{i:0;s:2:"12";}'));11 var_dump(unserialize('a:2:{i:0;a:0:{}i:1;a:0:{}}'));12 var_dump(unserialize('a:3:{i:0;s:3:"foo";i:1;s:3:"bar";i:2;s:3:"baz";}'));13 var_dump(unserialize('O:8:"stdClass":0:{}'));
2 Test unserialize(): error is indistinguishable from deserialized boolean10 /* Prototype : proto mixed unserialize(string variable_representation)16 echo "*** Testing unserialize() error/boolean distinction ***\n";23 $deserialized_garbage = unserialize($garbage);26 $deserialized_false = unserialize($serialized_false);29 echo "unserialize error and deserialized false are identical? " . (bool) ($deserialized_false == $d…33 return ($str == serialize(false) || @unserialize($str) !== false);36 // Test unserialize error idiom43 *** Testing unserialize() error/boolean distinction ***46 Notice: unserialize(): Error at offset 0 of 27 bytes in %s%eserialization_error_002.php on line 20[all …]
2 Test serialize() & unserialize() functions: error conditions - wrong number of args. 10 /* Prototype : proto mixed unserialize(string variable_representation)16 echo "*** Testing serialize()/unserialize() : error conditions ***\n";20 var_dump( unserialize() );24 var_dump( unserialize(1,2) );29 *** Testing serialize()/unserialize() : error conditions ***34 Warning: unserialize() expects exactly 1 parameter, 0 given in %s on line 1740 Warning: unserialize() expects exactly 1 parameter, 2 given in %s on line 21
2 serialize()/unserialize() objects53 function unserialize($serialized)86 function unserialize($serialized)104 var_dump(unserialize($ser));108 var_dump(unserialize($ser));112 var_dump(unserialize($ser));115 var_dump(unserialize('O:9:"TestNAOld":0:{}'));118 var_dump(unserialize('O:9:"TestNANew":0:{}'));121 var_dump(unserialize('C:10:"TestNANew2":0:{}'));149 TestNew::unserialize()[all …]
2 Bug #65806 (unserialize fails with object which is referenced multiple times)36 $this->_obj = unserialize($this->_serialized);56 echo "start serialize/unserialize" . PHP_EOL;57 $newList = unserialize(serialize($list));58 echo "finish serialize/unserialize" . PHP_EOL;60 //after unserialize the property myObjC::attrD is null instead of expected object79 start serialize/unserialize80 finish serialize/unserialize
2 Bug #73825 Heap out of bounds read on unserialize in finish_nested_data()5 $obj = unserialize('O:8:"00000000":');9 Warning: Bad unserialize data in %sbug73825.php on line %d11 Notice: unserialize(): Error at offset 13 of 15 bytes in %sbug73825.php on line %d
10 var_dump(unserialize('R:1;'));14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}'));18 Notice: unserialize(): Error at offset 4 of 4 bytes in %s on line %d21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d
2 Bug #74111: Heap buffer overread (READ: 1) finish_nested_data from unserialize6 var_dump(unserialize($s));9 Notice: unserialize(): Error at offset 25 of 23 bytes in %s on line %d
2 Bug #69152: Type Confusion Infoleak Vulnerability in unserialize()5 $x = unserialize('O:9:"exception":1:{s:16:"'."\0".'Exception'."\0".'trace";s:4:"ryat";}');7 $x = unserialize('O:4:"test":1:{s:27:"__PHP_Incomplete_Class_Name";R:1;}');16 …nknown" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…
2 Bug #68044 Integer overflow in unserialize() (32-bits only)5 echo unserialize('C:3:"XYZ":18446744075857035259:{}');11 Notice: unserialize(): Error at offset 32 of 33 bytes in %s%ebug68044.php on line 2
2 Bug #70172 - Use After Free Vulnerability in unserialize()12 function unserialize($data) {13 $this->data = unserialize($data);27 $data = unserialize($exploit);
2 serialize()/unserialize() with exotic letters15 var_dump(unserialize(serialize($foo)));17 var_dump(unserialize(serialize($������)));
2 Bug #62836 (Seg fault or broken object references on unserialize())7 unserialize("i:4;");11 print_r(unserialize($serialized_object));
2 Bug #70172 - Use After Free Vulnerability in unserialize()10 function unserialize($data) {11 $this->data = unserialize($data);32 $data = unserialize($exploit);
2 Bug #62836 (Seg fault or broken object references on unserialize())10 unserialize("i:4;");14 print_r(unserialize($serialized_object));
10 var_dump(unserialize($s));14 var_dump(unserialize(serialize($n)));17 unserialize('C:3:"GMP":0:{}');21 unserialize('C:3:"GMP":8:{s:2:"42";}');41 string(28) "Could not unserialize number"42 string(32) "Could not unserialize properties"
2 Bug #27646 (Cannot serialize/unserialize non-finite numeric values)10 var_dump(unserialize(serialize($f)));15 var_dump(unserialize(serialize($f)));20 var_dump(unserialize(serialize($f)));25 var_dump(unserialize(serialize($f)));30 var_dump(unserialize(serialize($f)));
2 Bug #70436: Use After Free Vulnerability in unserialize()15 function unserialize($data)17 $this->data = unserialize($data);31 $data = unserialize($exploit);49 Notice: unserialize(): Error at offset 0 of 3 bytes in %sbug70436.php on line %d51 Notice: unserialize(): Error at offset 16 of 17 bytes in %sbug70436.php on line %d
10 function unserialize($data) {11 $this->data = unserialize($data);18 $data = unserialize($exploit);23 Notice: unserialize(): Unexpected end of serialized data in %sbug72663.php on line %d25 Notice: unserialize(): Error at offset 46 of 47 bytes in %sbug72663.php on line %d
31 PHP_FUNCTION(unserialize);89 if (BG(serialize_lock) || !BG(unserialize).level) { \92 BG(unserialize).var_hash = (void *)(var_hash_ptr); \93 BG(unserialize).level = 1; \96 (var_hash_ptr) = (php_unserialize_data_t)BG(unserialize).var_hash; \97 ++BG(unserialize).level; \104 if (BG(serialize_lock) || !BG(unserialize).level) { \108 if (!--BG(unserialize).level) { \111 BG(unserialize).var_hash = NULL; \
2 Check that SplObjectStorage::unserialize returns NULL when non-string param is passed17 var_dump($s->unserialize($input));22 Warning: SplObjectStorage::unserialize() expects parameter 1 to be %binary_string_optional%, array …25 Warning: SplObjectStorage::unserialize() expects parameter 1 to be %binary_string_optional%, object…
2 Bug #72562: Use After Free in unserialize() with Unexpected Session Deserialization13 $out_1[] = unserialize($uns_1);25 $out_2 = unserialize($uns_2);41 Notice: unserialize(): Error at offset 0 of 1 bytes in %s%ebug72562.php on line %d43 Notice: unserialize(): Error at offset 4 of 4 bytes in %s%ebug72562.php on line %d
34 public function unserialize($data) {42 $tmp = unserialize(serialize($obj));48 $db->exec("INSERT INTO test(myobj) VALUES ('Data fetched from DB to be given to unserialize()')");77 myclass::unserialize('Value from serialize()')82 myclass::unserialize('Data fetched from DB to be given to unserialize()')85 myclass::unserialize('Data fetched from DB to be given to unserialize()')90 myclass::unserialize('Data fetched from DB to be given to unserialize()')
17 var_dump(unserialize('O:9:"Generator":0:{}'));23 var_dump(unserialize('C:9:"Generator":0:{}'));38 Notice: unserialize(): Error at offset 19 of 20 bytes in %sserialize_unserialize_error.php on line …42 #0 %s(%d): unserialize('C:9:"Generator"...')
Completed in 22 milliseconds