3v4l.org

run code in 300+ PHP versions simultaneously
<?php $html = '<ul class="newsfeed"> <li> <span class="feed-link"> <a href="https://feeds.joomla.org/~r/JoomlaSecurityNews/~3/GIZJHbqr1wQ/797-20191202-core-various-sql-injections-through-configuration-parameters.html" target="_blank"> [20191202] - Core - Various SQL injections through configuration parameters</a></span> <div class="feed-item-date"> 16 December 2019 </div> <div class="feed-item-description"> <ul> <li><strong>Project:</strong> Joomla!</li> <li><strong>SubProject:</strong> CMS</li> <li><strong>Impact:</strong> <span class="label label-danger">High</span></li> <li><strong>Severity:</strong> <span class="label label-info">Low</span></li> <li><strong>Versions:</strong> 2.5.0 - 3.9.13</li> <li><strong>Exploit type:</strong>&nbsp;SQL&nbsp;injection</li> <li><strong>Reported Date:</strong> 2019-December-01</li> <li><strong>Fixed Date:</strong> 2019-December-17</li> <li><strong>CVE Number:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19846">CVE-2019-19846</a></li> </ul> <h3>Description</h3> <p>The lack of validation of configuration parameters used in SQL queries caused various SQL injection vectors.</p> <h3>Affected Installs</h3> <p>Joomla! CMS versions 2.5.0 - 3.9.13</p> <h3>Solution</h3> <p>Upgrade to version 3.9.14</p> <h3>Contact</h3> <p>The JSST at the <a title="Contact the JSST" href="https://developer.joomla.org/security-centre.html">Joomla! Security Centre</a>.</p> <div class="alert alert-info"><strong>Reported By:&nbsp;</strong>ka1n4t</div><div class="feedflare"> <a href="https://feeds.joomla.org/~ff/JoomlaSecurityNews?a=GIZJHbqr1wQ:mKZamezlv3g:yIl2AUoC8zA"></a> </div> </div> </li> <li> <span class="feed-link"> <a href="https://feeds.joomla.org/~r/JoomlaSecurityNews/~3/_fWsZ57Sw7g/796-20191201-core-path-disclosure-in-framework-files.html" target="_blank"> [20191201] - Core - Path Disclosure in framework files</a></span> <div class="feed-item-date"> 16 December 2019 </div> <div class="feed-item-description"> <ul> <li><strong>Project:</strong> Joomla!</li> <li><strong>SubProject:</strong> CMS</li> <li><strong>Impact:</strong>&nbsp;Low</li> <li><strong>Severity:</strong> <span class="label label-info">Low</span></li> <li><strong>Versions:</strong> 3.8.0 - 3.9.13</li> <li><strong>Exploit type:</strong> Path Disclosure</li> <li><strong>Reported Date:</strong> 2019-November-22</li> <li><strong>Fixed Date:</strong> 2019-December-17</li> <li><strong>CVE Number:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19845">CVE-2019-19845</a></li> </ul> <h3>Description</h3> <p>Missing access check in framework files could lead to a path disclosure.</p> <h3>Affected Installs</h3> <p>Joomla! CMS versions 3.8.0 - 3.9.13</p> <h3>Solution</h3> <p>Upgrade to version 3.9.14</p> <h3>Contact</h3> <p>The JSST at the <a title="Contact the JSST" href="https://developer.joomla.org/security-centre.html">Joomla! Security Centre</a>.</p> <div class="alert alert-info"><strong>Reported By:&nbsp;</strong>Lee Thao, Viettel Cyber Security</div><div class="feedflare"> <a href="https://feeds.joomla.org/~ff/JoomlaSecurityNews?a=_fWsZ57Sw7g:uVTwWaDiNQ0:yIl2AUoC8zA"></a> </div> </div> </li> <li> <span class="feed-link"> <a href="https://feeds.joomla.org/~r/JoomlaSecurityNews/~3/Zi-lVuM4KoY/795-20191002-core-path-disclosure-in-phpuft8-mapping-files.html" target="_blank"> [20191002] - Core - Path Disclosure in phpuft8 mapping files</a></span> <div class="feed-item-date"> 05 November 2019 </div> <div class="feed-item-description"> <ul> <li><strong>Project:</strong> Joomla!</li> <li><strong>SubProject:</strong> CMS</li> <li><strong>Impact:</strong>&nbsp;Low</li> <li><strong>Severity:</strong> <span class="label label-info">Low</span></li> <li><strong>Versions:</strong> 3.6.0 - 3.9.12</li> <li><strong>Exploit type:</strong> Path Disclosure</li> <li><strong>Reported Date:</strong> 2019-November-01</li> <li><strong>Fixed Date:</strong> 2019-November-05</li> <li><strong>CVE Number:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18674">CVE-2019-18674</a></li> </ul> <h3>Description</h3> <p>Missing access check in the phputf8 mapping files could lead to an path disclosure.</p> <h3>Affected Installs</h3> <p>Joomla! CMS versions 3.6.0 - 3.9.12</p> <h3>Solution</h3> <p>Upgrade to version 3.9.13</p> <h3>Contact</h3> <p>The JSST at the <a title="Contact the JSST" href="https://developer.joomla.org/security-centre.html">Joomla! Security Centre</a>.</p> <div class="alert alert-info"><strong>Reported By:&nbsp;</strong>Phil Taylor</div><div class="feedflare"> <a href="https://feeds.joomla.org/~ff/JoomlaSecurityNews?a=Zi-lVuM4KoY:eFsJw4QiCW0:yIl2AUoC8zA"></a> </div> </div> </li> </ul>'; $doc = new DOMDocument(); $doc->loadHTML($html); $xpath = new DOMXPath($doc); $feed_items = $xpath->query('//div[contains(@class, "feed-item-description")]'); foreach ($feed_items as $feed_item) { $impact_node = $xpath->query('*/li[contains(string(), "Impact:")]', $feed_item); echo "Impact: " . str_replace('Impact: ', '', $impact_node->item(0)->textContent); echo "\n"; $severity_node = $xpath->query('*/li[contains(string(), "Severity:")]/span[contains(@class, "label-info")]', $feed_item); echo "Severity: " . $severity_node->item(0)->textContent . "\n"; }

Here you find the average performance (time & memory) of each version. A grayed out version indicates it didn't complete successfully (based on exit-code).

VersionSystem time (s)User time (s)Memory (MiB)
8.3.60.0110.00417.00
8.3.50.0120.00616.56
8.3.40.0110.01419.13
8.3.30.0110.01119.08
8.3.20.0000.00921.02
8.3.10.0050.00324.20
8.3.00.0030.00623.95
8.2.180.0110.00725.92
8.2.170.0070.00722.96
8.2.160.0110.00320.86
8.2.150.0050.00324.18
8.2.140.0080.00024.66
8.2.130.0040.00426.16
8.2.120.0070.00419.90
8.2.110.0050.00522.76
8.2.100.0090.00318.22
8.2.90.0040.00417.88
8.2.80.0040.00419.02
8.2.70.0040.00417.88
8.2.60.0070.00318.53
8.2.50.0050.00319.89
8.2.40.0030.00521.56
8.2.30.0030.00619.71
8.2.20.0000.00818.46
8.2.10.0000.00819.65
8.2.00.0000.00819.66
8.1.280.0120.00325.92
8.1.270.0150.00022.54
8.1.260.0080.00026.35
8.1.250.0080.00028.09
8.1.240.0030.00621.18
8.1.230.0120.00019.51
8.1.220.0040.00418.29
8.1.210.0080.00018.77
8.1.200.0030.00617.60
8.1.190.0030.00617.73
8.1.180.0080.00019.45
8.1.170.0030.00718.85
8.1.160.0040.00419.37
8.1.150.0030.00619.43
8.1.140.0060.00321.20
8.1.130.0040.00422.38
8.1.120.0000.00817.93
8.1.110.0060.00317.75
8.1.100.0080.00017.90
8.1.90.0040.00417.75
8.1.80.0030.00517.82
8.1.70.0030.00517.82
8.1.60.0030.00617.88
8.1.50.0060.00317.83
8.1.40.0030.00517.98
8.1.30.0000.00818.06
8.1.20.0090.00317.95
8.1.10.0040.00617.95
8.1.00.0040.00717.91
8.0.300.0040.00420.01
8.0.290.0080.00017.00
8.0.280.0080.00018.79
8.0.270.0040.00418.39
8.0.260.0040.00420.38
8.0.250.0000.00717.37
8.0.240.0040.00417.39
8.0.230.0000.00717.38
8.0.220.0050.00217.14
8.0.210.0000.00717.31
8.0.200.0030.00317.40
8.0.190.0000.00817.40
8.0.180.0040.00417.37
8.0.170.0060.00317.37
8.0.160.0040.00417.21
8.0.150.0070.00017.15
8.0.140.0080.00017.22
8.0.130.0070.00013.77
8.0.120.0030.00517.30
8.0.110.0030.00517.25
8.0.100.0040.00417.42
8.0.90.0050.00517.22
8.0.80.0100.00717.28
8.0.70.0040.00417.09
8.0.60.0050.00317.21
8.0.50.0040.00417.24
8.0.30.0070.01017.13
8.0.20.0130.01317.52
8.0.10.0080.00017.49
8.0.00.0130.00617.28
7.4.330.0000.00517.04
7.4.320.0040.00416.74
7.4.300.0040.00616.92
7.4.290.0000.00716.84
7.4.280.0080.00016.89
7.4.270.0050.00216.94
7.4.260.0030.00313.70
7.4.250.0050.00316.94
7.4.240.0060.00216.97
7.4.230.0070.00016.91
7.4.220.0030.00416.93
7.4.210.0090.00916.90
7.4.200.0040.00416.97
7.4.130.0070.01116.76
7.4.120.0070.01716.91
7.4.110.0150.00317.02
7.4.100.0080.01216.86
7.4.90.0110.00716.88
7.4.80.0060.01219.39
7.4.70.0120.00917.02
7.4.60.0030.01416.83
7.4.50.0080.00816.84
7.4.40.0070.01116.88
7.4.10.0180.00016.75
7.4.00.0040.01116.84
7.3.330.0080.00016.66
7.3.320.0050.00013.49
7.3.310.0000.00816.78
7.3.300.0040.00416.59
7.3.290.0100.00816.68
7.3.280.0150.00016.66
7.3.260.0040.01416.64
7.3.240.0120.00516.72
7.3.230.0090.00916.70
7.3.210.0090.00916.59
7.3.200.0060.01216.73
7.3.190.0040.01416.98
7.3.180.0150.00616.84
7.3.170.0070.01416.82
7.3.160.0090.00916.73
7.3.130.0120.00416.52
7.3.120.0120.00316.67
7.3.110.0130.00316.91
7.3.100.0150.00016.70
7.3.90.0080.00716.66
7.3.80.0070.00716.80
7.3.70.0070.00716.73
7.3.60.0170.00416.66
7.3.50.0000.01416.69
7.3.40.0070.00716.66
7.3.30.0150.00616.56
7.3.20.0070.01016.69
7.3.10.0130.00316.63
7.3.00.0030.01316.72
7.2.330.0080.01216.81
7.2.320.0150.00916.96
7.2.310.0090.00916.82
7.2.300.0060.01516.98
7.2.290.0050.01317.13
7.2.260.0040.01617.00
7.2.250.0060.00917.18
7.2.240.0130.00317.18
7.2.230.0080.00816.91
7.2.220.0100.00517.09
7.2.210.0140.00717.20
7.2.200.0110.00716.88
7.2.190.0060.01516.98
7.2.180.0090.00616.94
7.2.170.0040.01116.87
7.2.160.0120.00317.12
7.2.150.0090.00616.93
7.2.140.0040.01517.09
7.2.130.0080.00817.12
7.2.120.0030.01317.03
7.2.110.0070.01116.88
7.2.100.0100.01016.99
7.2.90.0150.00317.16
7.2.80.0100.00717.19
7.2.70.0120.01617.02
7.2.60.0150.00317.09
7.2.50.0110.00817.09
7.2.40.0080.01017.00
7.2.30.0070.01117.26
7.2.20.0090.01217.10
7.2.10.0060.01516.94
7.2.00.0030.01516.97

preferences:
62.1 ms | 401 KiB | 5 Q