Home
last modified time | relevance | path

Searched refs:unserialize (Results 26 – 50 of 319) sorted by relevance

12345678910>>...13

/PHP-8.1/ext/standard/tests/serialize/
H A Dbug71311.phpt2 Bug #71311 Use-after-free vulnerability in SPL(ArrayObject, unserialize)
5 $data = unserialize("C:11:\"ArrayObject\":11:{x:i:0;r:3;X}");
11 #0 [internal function]: ArrayObject->unserialize('x:i:0;r:3;X')
12 #1 %s%ebug71311.php(2): unserialize('%s')
H A Dtyped_property_refs.phpt2 unserialize with references to typed properties shall skip the references or fail
31 var_dump(unserialize('O:1:"A":2:{s:1:"a";i:1;s:1:"b";R:2;}'));
32 var_dump(unserialize('O:1:"B":2:{s:1:"a";i:1;s:1:"b";R:2;}'));
33 var_dump(unserialize('O:1:"E":2:{s:1:"a";i:1;s:1:"b";R:2;}'));
36 var_dump(unserialize('O:1:"A":2:{s:1:"a";N;s:1:"b";R:2;}'));
41 var_dump(unserialize('O:1:"B":2:{s:1:"a";N;s:1:"b";R:2;}'));
46 var_dump(unserialize('O:1:"C":2:{s:1:"a";i:1;s:1:"b";R:2;}'));
51 var_dump(unserialize('O:1:"C":2:{s:1:"b";s:1:"x";s:1:"a";R:2;}'));
56 var_dump(unserialize('O:1:"D":2:{s:1:"a";i:1;s:1:"b";R:2;}'));
H A Dbug69152.phpt2 Bug #69152: Type Confusion Infoleak Vulnerability in unserialize()
5 $x = unserialize('O:9:"exception":1:{s:16:"'."\0".'Exception'."\0".'trace";s:4:"ryat";}');
7 $x = unserialize('O:4:"test":1:{s:27:"__PHP_Incomplete_Class_Name";R:1;}');
14 #0 %s(%d): unserialize('O:9:"exception"...')
H A D__serialize_003.phpt30 public function unserialize($payload) {
31 echo "unserialize() called\n";
38 var_dump(unserialize($s));
40 var_dump(unserialize('C:4:"Test":7:{payload}'));
53 unserialize() called
H A Dbug72663.phpt26 var_dump(unserialize($s));
30 var_dump(unserialize($s));
35 var_dump(unserialize($s));
43 var_dump(unserialize($s));
50 Notice: unserialize(): Error at offset 17 of 24 bytes in %s on line %d
53 Notice: unserialize(): Error at offset 25 of 32 bytes in %s on line %d
H A Dbug70436.phpt2 Bug #70436: Use After Free Vulnerability in unserialize()
15 function unserialize($data)
17 $this->data = unserialize($data);
31 $data = unserialize($exploit);
51 Notice: unserialize(): Error at offset 0 of 3 bytes in %sbug70436.php on line %d
53 Notice: unserialize(): Error at offset 93 of 94 bytes in %sbug70436.php on line %d
H A Dbug70213.phpt10 var_dump(unserialize('R:1;'));
14 var_dump(unserialize('a:2:{i:0;i:42;i:1;O:4:"evil":0:{}}'));
18 Notice: unserialize(): Error at offset 4 of 4 bytes in %s on line %d
21 Warning: unserialize(): Function evil() hasn't defined the class it was called for in %s on line %d
H A Dbug71313.phpt2 Bug #71311 Use-after-free vulnerability in SPL(SplObjectStorage, unserialize)
5 $data = unserialize("C:16:\"SplObjectStorage\":113:{x:i:2;O:8:\"stdClass\":0:{},a:2:{s:4:\"prev\";i…
11 #0 [internal function]: SplObjectStorage->unserialize('%s')
12 #1 %s%ebug71313.php(2): unserialize('%s')
H A Dbug74111.phpt2 Bug #74111: Heap buffer overread (READ: 1) finish_nested_data from unserialize
6 var_dump(unserialize($s));
9 Notice: unserialize(): Error at offset 25 of 23 bytes in %s on line %d
H A D006.phpt2 serialize()/unserialize() with exotic letters
15 var_dump(unserialize(serialize($foo)));
17 var_dump(unserialize(serialize($������)));
H A D__serialize_006.phpt10 var_dump(unserialize('O:4:"Test":1:{}'));
14 Notice: unserialize(): Unexpected end of serialized data in %s on line %d
16 Notice: unserialize(): Error at offset 14 of 15 bytes in %s on line %d
H A Dbug74101.phpt6 var_dump(unserialize($s));
9 Warning: unserialize(): %s in %sbug74101.php on line %d
11 Notice: unserialize(): Error at offset 46 of 74 bytes in %sbug74101.php on line %d
H A Dsleep_uninitialized_typed_prop.phpt22 var_dump(unserialize(serialize($t)) == $t);
25 var_dump(unserialize(serialize($t)) == $t);
28 var_dump(unserialize(serialize($t)) == $t);
31 var_dump(unserialize(serialize($t)) == $t);
H A Dbug62836_1.phpt2 Bug #62836 (Seg fault or broken object references on unserialize())
7 unserialize("i:4;");
11 print_r(unserialize($serialized_object));
H A Dbug62836_2.phpt2 Bug #62836 (Seg fault or broken object references on unserialize())
10 unserialize("i:4;");
14 print_r(unserialize($serialized_object));
H A Dbug70172.phpt2 Bug #70172 - Use After Free Vulnerability in unserialize()
10 function unserialize($data) {
11 $this->data = unserialize($data);
25 $data = unserialize($exploit);
/PHP-8.1/ext/spl/tests/
H A Dbug75673.phpt2 Bug #75673 (SplStack::unserialize() behavior)
11 $stack->unserialize($serialized);
13 $stack->unserialize($serialized);
/PHP-8.1/ext/session/tests/
H A Dbug72562.phpt2 Bug #72562: Use After Free in unserialize() with Unexpected Session Deserialization
15 $out_1[] = unserialize($uns_1);
27 $out_2 = unserialize($uns_2);
43 Notice: unserialize(): Error at offset 0 of 1 bytes in %s%ebug72562.php on line %d
45 Notice: unserialize(): Error at offset 4 of 4 bytes in %s%ebug72562.php on line %d
/PHP-8.1/sapi/fuzzer/
H A DREADME.md24 * `php-fuzz-unserialize`: Fuzzing unserialize() function
25 * `php-fuzz-unserializehash`: Fuzzing unserialize() for HashContext objects
38 For the unserialize fuzzer, a dictionary of internal classes should be generated first:
42 cp -r sapi/fuzzer/corpus/unserialize ./my-unserialize-corpus
43 sapi/fuzzer/php-fuzz-unserialize -dict=$PWD/sapi/fuzzer/dict/unserialize ./my-unserialize-corpus
50 cp -r sapi/fuzzer/corpus/unserializehash ./my-unserialize-corpus
51 sapi/fuzzer/php-fuzz-unserializehash ./my-unserialize-corpus
/PHP-8.1/Zend/tests/enum/
H A Dunserialize.phpt2 Enum unserialize
11 $bar = unserialize('E:7:"Foo:Bar";');
15 $quux = unserialize('E:8:"Foo:Quux";');
/PHP-8.1/ext/standard/tests/strings/
H A Dbug72433.phpt2 Bug #72433: Use After Free Vulnerability in PHP's GC algorithm and unserialize
6 var_dump(unserialize($serialized_payload));
9 Notice: unserialize(): Error at offset %d of %d bytes in %sbug72433.php on line 3
/PHP-8.1/ext/gmp/tests/
H A Dbug70284.phpt2 Bug #70284 (Use after free vulnerability in unserialize() with GMP)
11 $data = unserialize($exploit);
37 Fatal error: Uncaught Exception: Could not unserialize number in %sbug70284.php:6
39 #0 %sbug70284.php(6): unserialize('%s')
/PHP-8.1/Zend/tests/generators/errors/
H A Dserialize_unserialize_error.phpt17 var_dump(unserialize('O:9:"Generator":0:{}'));
23 var_dump(unserialize('C:9:"Generator":0:{}'));
37 #0 %s(%d): unserialize('O:9:"Generator"...')
42 #0 %s(%d): unserialize('C:9:"Generator"...')
/PHP-8.1/ext/date/tests/
H A Dbug68942.phpt2 Bug #68942 (Use after free vulnerability in unserialize() with DateTimeZone).
5 $data = unserialize('a:2:{i:0;O:12:"DateTimeZone":2:{s:13:"timezone_type";a:2:{i:0;i:1;i:1;i:2;}s:8…
12 #1 %s(%d): unserialize('a:2:{i:0;O:12:"...')
/PHP-8.1/ext/pdo_mysql/tests/
H A Dpdo_mysql_stmt_fetch_serialize_simple.phpt33 public function unserialize($data) {
41 $tmp = unserialize(serialize($obj));
47 … $db->exec("INSERT INTO test(myobj) VALUES ('Data fetched from DB to be given to unserialize()')");
77 myclass::unserialize('Value from serialize()')
84 myclass::unserialize('Data fetched from DB to be given to unserialize()')
89 myclass::unserialize('Data fetched from DB to be given to unserialize()')
98 myclass::unserialize('Data fetched from DB to be given to unserialize()')

Completed in 57 milliseconds

12345678910>>...13