Searched refs:unserialize (Results 26 – 50 of 200) sorted by relevance
12345678
7 // Ensure we can still unserialize the old style.8 var_dump(unserialize('O:8:"DateTime":3:{s:4:"date";s:19:"2005-07-14 22:30:41";s:13:"timezone_type";…11 var_dump(unserialize('O:8:"DateTime":3:{s:4:"date";s:26:"2005-07-14 22:30:41.123456";s:13:"timezone…
2 Bug #68942 (Use after free vulnerability in unserialize() with DateTimeZone).5 $data = unserialize('a:2:{i:0;O:12:"DateTimeZone":2:{s:13:"timezone_type";a:2:{i:0;i:1;i:1;i:2;}s:8…
2 Bug #68942 (Use after free vulnerability in unserialize() with DateTime).5 $data = unserialize('a:2:{i:0;O:8:"DateTime":3:{s:4:"date";s:26:"2000-01-01 00:00:00.000000";s:13:"…
10 /* Prototype : proto mixed unserialize(string variable_representation)17 $o = unserialize('O:3:"FOO":0:{}');23 Warning: unserialize(): defined (Nonexistent) but not found in %s on line 14
33 public function unserialize($data)35 $this->b = unserialize($data);49 $a = unserialize(serialize(new A()));
2 Bug #68545 NULL pointer dereference in unserialize.c:var_push_dtor5 var_dump(unserialize('a:6:{a:6:{s:3:"322";s:3:"bar";s:3:"bar";s:3:"foo";a:6:{a:6:{s:3:"322";s:3:"ba…9 Notice: unserialize(): Error at offset %d of %d bytes in %sbug68545.php on line %d
2 Test serialize() & unserialize() functions: resources10 /* Prototype : proto mixed unserialize(string variable_representation)21 var_dump(unserialize($serialized_data));
10 /* Prototype : proto mixed unserialize(string variable_representation)18 $incomplete = unserialize($serialized);20 $complete = unserialize($serialized);93 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…96 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…98 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…101 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…104 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…107 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…110 …ion "C" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…[all …]
2 Test serialize() & unserialize() functions: objects (abstract classes)12 /* Prototype : proto mixed unserialize(string variable_representation)45 $unserialize_data = unserialize($serialize_data);50 $unserialize_data = unserialize($serialize_data);
10 /* Prototype : proto mixed unserialize(string variable_representation)17 $a = unserialize($ser);19 $b = unserialize($ser);
7 $o = unserialize($d);20 …nknown" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…22 …nknown" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…25 …nknown" of the object you are trying to operate on was loaded _before_ unserialize() gets called o…
2 Bug #69139 (Crash in gc_zval_possible_root on unserialize)6 @unserialize($str);
2 unserialize() floats with E notation (#18654)10 var_dump(unserialize($ser));
10 /* Prototype : proto mixed unserialize(string variable_representation)26 $o = unserialize('O:3:"FOO":0:{}');37 Warning: unserialize(): Function check() hasn't defined the class it was called for in %s on line 23
5 echo unserialize('O:13:"SplFileObject":1:{s:9:"*filename";s:15:"/home/flag/flag";}');11 Notice: unserialize(): Error at offset 24 of 64 bytes in %sbug67072.php on line %d
2 Test serialize() & unserialize() functions: arrays (circular references)12 /* Prototype : proto mixed unserialize(string variable_representation)24 $arr_circ = unserialize($serialize_data);33 $arr_asso = unserialize($serialize_data);
2 Bug #68545 Use after free vulnerability in unserialize()17 $y = unserialize($z);
2 Bug #26762 (unserialize() produces lowercase classnames)19 @unserialize('O:3:"FOO":0:{}');
12 var_dump(unserialize('O:1:"A":0:{}'));18 var_dump(unserialize('a:2:{i:0;O:1:"A":0:{}i:1;O:1:"A":0:{}}'));
2 Bug #72433: Use After Free Vulnerability in PHP's GC algorithm and unserialize9 // Create our payload and unserialize it.11 $free_me = unserialize($serialized_payload);
2 Bug #72434: ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize11 // Create our payload and unserialize it.13 $unserialized_payload = unserialize($serialized_payload);
2 Check that SplObjectStorage::unserialize throws exception when NULL passed11 $s->unserialize(NULL);
10 public function unserialize($x) {20 var_dump(unserialize($o));
72 public function unserialize($data) {96 var_dump(unserialize($myobj));98 …printf("\nUsing PDO::FETCH_CLASS|PDO::FETCH_SERIALIZE to fetch the object from DB and unserialize …104 printf("\nUsing PDO::FETCH_CLASS to fetch the object from DB and unserialize it...\n");131 myclass::unserialize('Data from serialize')137 Using PDO::FETCH_CLASS|PDO::FETCH_SERIALIZE to fetch the object from DB and unserialize it...138 myclass::unserialize('C:7:"myclass":19:{Data from serialize}')144 Using PDO::FETCH_CLASS to fetch the object from DB and unserialize it...
2 Bug #70121 (unserialize() could lead to unexpected methods execution / NULL pointer deref)5 unserialize('O:12:"DateInterval":1:{s:4:"days";O:9:"Exception":7:{s:10:"'."\0".'*'."\0".'message";s…
Completed in 65 milliseconds