Searched refs:unserialize (Results 126 – 150 of 302) sorted by relevance
12345678910>>...13
2 Bug #49649 (unserialize() doesn't handle changes in property visibility) - to public33 $class = unserialize(base64_decode($serialized));
2 Bug #49649 (unserialize() doesn't handle changes in property visibility) - to protected33 $class = unserialize(base64_decode($serialized));
2 serialize()/unserialize()/var_dump()61 $t = unserialize($data);67 $t = unserialize($data);75 $a = unserialize($data);
2 Bug #49649 (unserialize() doesn't handle changes in property visibility) - to private33 $class = unserialize(base64_decode($serialized));
2 Bug #72229 (Wrong reference when serialize/unserialize an object)19 $Obj2 = unserialize($txt1);
34 var_dump(unserialize($ss));35 var_dump(unserialize($si));
12 function unserialize($s) {13 foreach (unserialize($s) as $p=>$v) {32 $d = unserialize($s);
19 function unserialize($data) {27 $data = unserialize($exploit);
10 /* Prototype : proto mixed unserialize(string variable_representation)21 public function unserialize($blah) {
2 Bug #31402 (unserialize() generates references when it should not)31 $after = unserialize($ser);
10 unserialize( $s1 );16 #1 %sbug62852.php(%d): unserialize('O:8:"DateTime":...')
8 var_dump(unserialize($y));14 #1 %sbug66721.php(%d): unserialize('O:8:"DateTime":...')
20 unserialize( $s2 );28 #2 %sbug62852_var2.php(%d): unserialize('O:3:"Foo":3:{s:...')
20 unserialize( $s2 );28 #2 %sbug62852_var3.php(%d): unserialize('O:3:"Foo":3:{s:...')
2 Bug #64896 (Segfault with gc_collect_cycles using unserialize on certain objects)30 unserialize(serialize($foo));
2 Bug #72479: Use After Free Vulnerability in SNMP with GC and unserialize()11 $out = unserialize($poc);
2 Check that SplObjectStorage::unserialize throws exception when numeric value passed21 $s->unserialize($input);
2 SPL: unserialize with no data (for PHPUnit)13 $obj = unserialize($str);
2 SPL: Bug #70365 use-after-free vulnerability in unserialize() with SplObjectStorage22 $data = unserialize($exploit);
2 SPL: Bug #70366 use-after-free vulnerability in unserialize() with SplDoublyLinkedList22 $data = unserialize($exploit);
9 // PHP Unit's code to unserialize data passed as args to #testFormatTypeInt32Intl10 $unit_test_args = unserialize('a:4:{i:0;O:15:"NumberFormatter":0:{}i:1;d:2147483648;i:2;s:14:"-2,14…
9 // PHP Unit's code to unserialize data passed as args to #testFormatTypeInt32Intl10 $unit_test_args = unserialize('a:4:{i:0;O:15:"NumberFormatter":0:{}i:1;d:2147483648;i:2;s:21:"(SFD2…
9 // PHP Unit's code to unserialize data passed as args to #testFormatTypeInt32Intl10 $unit_test_args = unserialize('a:4:{i:0;O:15:"NumberFormatter":0:{}i:1;d:-2147483649;i:2;s:19:"SFD2…
12 // PHP Unit's code to unserialize data passed as args to #testFormatTypeInt32Intl13 $unit_test_args = unserialize('a:3:{i:0;O:15:"NumberFormatter":0:{}i:1;d:1.1000000000000001;i:2;s:1…
2 PDO Common: PECL Bug #5217 (serialize/unserialize safety)19 $db = unserialize($ser);
Completed in 32 milliseconds