3v4l.org

run code in 300+ PHP versions simultaneously
<?php $test_json = '[{"theme-my-login":{"vulnerabilities":[{"id":6043,"title":"Theme My Login 6.3.9 - Local File Inclusion","url":["http://packetstormsecurity.com/files/127302/","http://seclists.org/fulldisclosure/2014/Jun/172","http://www.securityfocus.com/bid/68254","https://security.dxw.com/advisories/lfi-in-theme-my-login/"],"osvdb":["108517"],"vuln_type":"LFI","created_at":"2014-08-01T10:58:35.000Z","updated_at":"2014-08-01T10:58:35.000Z","fixed_in":"6.3.10"}]}},{"login-rebuilder":{"vulnerabilities":[{"id":6044,"title":"Login Rebuilder \u003c 1.2.0 - Cross Site Request Forgery Vulnerability","osvdb":["108364"],"cve":["2014-3882"],"vuln_type":"CSRF","created_at":"2014-08-01T10:58:35.000Z","updated_at":"2014-08-01T10:58:35.000Z","fixed_in":"1.2.0"}]}}]'; $results = json_decode($test_json, true); $vuln_dict = array(); # foreach ($results as $key => $value){ # echo $vuln_dict[results[$key][$value][0]]; # } print_r($results); ?>
Output for 5.2.0 - 5.2.17, 5.3.0 - 5.3.29, 5.4.0 - 5.4.45, 5.5.0 - 5.5.38, 5.6.0 - 5.6.38, 7.0.0 - 7.0.33, 7.1.0 - 7.1.25, 7.2.0 - 7.2.33, 7.3.0 - 7.3.33, 7.4.0 - 7.4.33, 8.0.0 - 8.0.30, 8.1.0 - 8.1.28, 8.2.0 - 8.2.18, 8.3.0 - 8.3.7
Array ( [0] => Array ( [theme-my-login] => Array ( [vulnerabilities] => Array ( [0] => Array ( [id] => 6043 [title] => Theme My Login 6.3.9 - Local File Inclusion [url] => Array ( [0] => http://packetstormsecurity.com/files/127302/ [1] => http://seclists.org/fulldisclosure/2014/Jun/172 [2] => http://www.securityfocus.com/bid/68254 [3] => https://security.dxw.com/advisories/lfi-in-theme-my-login/ ) [osvdb] => Array ( [0] => 108517 ) [vuln_type] => LFI [created_at] => 2014-08-01T10:58:35.000Z [updated_at] => 2014-08-01T10:58:35.000Z [fixed_in] => 6.3.10 ) ) ) ) [1] => Array ( [login-rebuilder] => Array ( [vulnerabilities] => Array ( [0] => Array ( [id] => 6044 [title] => Login Rebuilder < 1.2.0 - Cross Site Request Forgery Vulnerability [osvdb] => Array ( [0] => 108364 ) [cve] => Array ( [0] => 2014-3882 ) [vuln_type] => CSRF [created_at] => 2014-08-01T10:58:35.000Z [updated_at] => 2014-08-01T10:58:35.000Z [fixed_in] => 1.2.0 ) ) ) ) )
Output for 5.0.0 - 5.0.5, 5.1.0 - 5.1.6
Fatal error: Call to undefined function json_decode() in /in/I6A0E on line 3
Process exited with code 255.
Output for 4.4.5 - 4.4.9
Fatal error: Call to undefined function: json_decode() in /in/I6A0E on line 3
Process exited with code 255.
Output for 4.3.2 - 4.3.11, 4.4.0 - 4.4.4
Fatal error: Call to undefined function: json_decode() in /in/I6A0E on line 3
Process exited with code 255.
Output for 4.3.0 - 4.3.1
Fatal error: Call to undefined function: json_decode() in /in/I6A0E on line 3

preferences:
315.72 ms | 401 KiB | 424 Q