3v4l.org

run code in 300+ PHP versions simultaneously
<?php $test = "に関する追加情報?: "; $query = "SELECT * FROM users WHERE username = 'admin' AND passwd = '". utf8_decode(mysql_real_escape_string ($test)) . "' LIMIT 1"; echo $query; ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/RHO7Y
function name:  (null)
number of ops:  12
compiled vars:  !0 = $test, !1 = $query
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, '%E3%81%AB%E9%96%A2%E3%81%99%E3%82%8B%E8%BF%BD%E5%8A%A0%E6%83%85%E5%A0%B1%3F%3A+'
    4     1        INIT_FCALL                                               'utf8_decode'
          2        INIT_FCALL_BY_NAME                                       'mysql_real_escape_string'
          3        SEND_VAR_EX                                              !0
          4        DO_FCALL                                      0  $3      
          5        SEND_VAR                                                 $3
          6        DO_ICALL                                         $4      
          7        CONCAT                                           ~5      'SELECT+%2A+FROM+users+WHERE+username+%3D+%27admin%27+AND+passwd+%3D+%27', $4
          8        CONCAT                                           ~6      ~5, '%27+LIMIT+1'
          9        ASSIGN                                                   !1, ~6
    6    10        ECHO                                                     !1
    8    11      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
165.98 ms | 1394 KiB | 15 Q