3v4l.org

run code in 200+ php & hhvm versions
Bugs & Features
<?php $str = "<script>alert(/xss/)aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa</script>"; $obj1 = unserialize($str);
based on S1oam
Output for 4.3.2 - 7.2.0
Notice: unserialize(): Error at offset 0 of 66 bytes in /in/HfOuD on line 4
Output for 4.3.0 - 4.3.1
Notice: unserialize() [http://www.php.net/function.unserialize]: Error at offset 0 of 66 bytes in /in/HfOuD on line 4