Searched refs:unserialize (Results 76 – 100 of 200) sorted by relevance
12345678
2 SPL: Bug #70155 Use After Free Vulnerability in unserialize() with SPLArrayObject7 $data = unserialize($exploit);
2 Check that SplObjectStorage::unserialize throws exception when numeric value passed21 $s->unserialize($input);
2 SPL: Bug #70366 use-after-free vulnerability in unserialize() with SplDoublyLinkedList22 $data = unserialize($exploit);
2 SPL: Bug #70365 use-after-free vulnerability in unserialize() with SplObjectStorage22 $data = unserialize($exploit);
10 var_dump($q, $ss = serialize($q), unserialize($ss));17 var_dump($s, $ss = serialize($s), unserialize($ss));
17 $a = unserialize(serialize($a));33 $a = unserialize(serialize($a));
12 function unserialize($s) {13 foreach (unserialize($s) as $p=>$v) {32 $d = unserialize($s);
10 function unserialize($data) {19 $data = unserialize($exploit);
13 function unserialize($data) {21 $data = unserialize($exploit);
12 /* Prototype : proto mixed unserialize(string variable_representation)23 public function unserialize($blah) {
2 Bug #31402 (unserialize() generates references when it should not)30 $after = unserialize($ser);
10 /* Prototype : proto mixed unserialize(string variable_representation)25 $ua = unserialize($ser);42 $ua = unserialize($ser);59 $ucontainer = unserialize($ser);77 $ucontainer = unserialize($ser);
5 var_dump(unserialize('i:5000000000;') == 5000000000);
9 $bar = unserialize(serialize($foo));
2 Bug #72479: Use After Free Vulnerability in SNMP with GC and unserialize()11 $out = unserialize($poc);
2 Bug #64896 (Segfault with gc_collect_cycles using unserialize on certain objects)30 unserialize(serialize($foo));
9 // PHP Unit's code to unserialize data passed as args to #testFormatTypeInt32Intl10 $unit_test_args = unserialize('a:4:{i:0;O:15:"NumberFormatter":0:{}i:1;d:2147483648;i:2;s:21:"(SFD2…
9 // PHP Unit's code to unserialize data passed as args to #testFormatTypeInt32Intl10 $unit_test_args = unserialize('a:4:{i:0;O:15:"NumberFormatter":0:{}i:1;d:-2147483649;i:2;s:19:"SFD2…
9 // PHP Unit's code to unserialize data passed as args to #testFormatTypeInt32Intl10 $unit_test_args = unserialize('a:4:{i:0;O:15:"NumberFormatter":0:{}i:1;d:2147483648;i:2;s:14:"-2,14…
12 // PHP Unit's code to unserialize data passed as args to #testFormatTypeInt32Intl13 $unit_test_args = unserialize('a:3:{i:0;O:15:"NumberFormatter":0:{}i:1;d:1.1000000000000001;i:2;s:1…
35 function unserialize($serialized)38 foreach(unserialize($serialized) as $prop => $val) {59 function unserialize($serialized)62 return TestBase::unserialize($serialized);203 Exception:SQLSTATE[HY000]: General error: cannot unserialize class231 TestBase::unserialize(a:3:{s:7:"BasePub";s:6:"Public";s:7:"BasePro";s:9:"Protected";s:7:"BasePri";s…232 TestDerived::unserialize()233 TestBase::unserialize(a:5:{s:7:"BasePub";s:13:"DerivedPublic";s:7:"BasePro";s:16:"DerivdeProtected"…234 TestDerived::unserialize()235 TestBase::unserialize(a:5:{s:7:"BasePub";s:13:"DerivedPublic";s:7:"BasePro";s:16:"DerivdeProtected"…
19 $db = unserialize($ser);28 Safely caught You cannot serialize or unserialize PDO instances
32 public function unserialize($dat)44 Method called: bug44409::unserialize('Data from DB')
2 Bug #53437 DateInterval unserialize bad data, 32 bit9 $di = unserialize($s);
2 Bug #53437 DateInterval unserialize bad data, 64 bit9 $di = unserialize($s);
Completed in 41 milliseconds