3v4l.org

run code in 200+ php & hhvm versions
Bugs & Features
<?php var_dump(unserialize('O:8:"stdClass":-1:{i:1;i:2}'));
Output for 5.6.30 - 5.6.38, 7.0.15 - 7.0.31, 7.1.1 - 7.3.0rc4
Notice: unserialize(): Error at offset 19 of 27 bytes in /in/2duHd on line 3 bool(false)
Output for 7.0.0 - 7.0.14, 7.1.0
Fatal error: Possible integer overflow in memory allocation (4294967295 * 32 + 32) in /in/2duHd on line 3
Process exited with code 255.
Output for hhvm-3.22.0
Notice: Unable to unserialize: [O:8:"stdClass":-1:{i:1;i:2}]. Expected '}' but got 'i'. in /in/2duHd on line -1 bool(false)
Output for hhvm-3.11.1 - 3.21.3
Notice: Unable to unserialize: [O:8:"stdClass":-1:{i:1;i:2}]. Expected '}' but got 'i'. in /in/2duHd on line 3 bool(false)
Output for hhvm-3.10.1

Process exited with code 137.
Output for 4.3.2 - 5.6.29
Notice: unserialize(): Error at offset 20 of 27 bytes in /in/2duHd on line 3 bool(false)
Output for 4.3.0 - 4.3.1
Notice: unserialize() [http://www.php.net/function.unserialize]: Error at offset 20 of 27 bytes in /in/2duHd on line 3 bool(false)