3v4l.org

run code in 300+ PHP versions simultaneously
<?php $e=explode(".","../image.jpg"); echo count($e); echo $e[1]; echo $e[2]; echo htmlentities("image.jpg</sript>"); echo "lala"; if (preg_match('/[^<>:"\/|*?]/',"hello")===false) echo "falsch"; ?>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 22, Position 2 = 23
Branch analysis from position: 22
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 23
filename:       /in/EPG4p
function name:  (null)
number of ops:  24
compiled vars:  !0 = $e
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL                                               'explode'
          1        SEND_VAL                                                 '.'
          2        SEND_VAL                                                 '..%2Fimage.jpg'
          3        DO_ICALL                                         $1      
          4        ASSIGN                                                   !0, $1
    3     5        COUNT                                            ~3      !0
          6        ECHO                                                     ~3
    4     7        FETCH_DIM_R                                      ~4      !0, 1
          8        ECHO                                                     ~4
    5     9        FETCH_DIM_R                                      ~5      !0, 2
         10        ECHO                                                     ~5
    6    11        INIT_FCALL                                               'htmlentities'
         12        SEND_VAL                                                 'image.jpg%3C%2Fsript%3E'
         13        DO_ICALL                                         $6      
         14        ECHO                                                     $6
    7    15        ECHO                                                     'lala'
    8    16        INIT_FCALL                                               'preg_match'
         17        SEND_VAL                                                 '%2F%5B%5E%3C%3E%3A%22%5C%2F%7C%2A%3F%5D%2F'
         18        SEND_VAL                                                 'hello'
         19        DO_ICALL                                         $7      
         20        TYPE_CHECK                                    4          $7
         21      > JMPZ                                                     ~8, ->23
         22    >   ECHO                                                     'falsch'
    9    23    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
151.77 ms | 1386 KiB | 19 Q