3v4l.org

run code in 200+ php & hhvm versions
Bugs & Features
<?php var_dump(unserialize('s:68719476768:"b";')); var_dump(unserialize('O:8:"stdClass":-2147483648:{}'));
based on pUvRL
Output for 7.0.20, 7.1.5 - 7.2.0
Notice: unserialize(): Error at offset 2 of 18 bytes in /in/XdZ1G on line 2 bool(false) Notice: unserialize(): Error at offset 28 of 29 bytes in /in/XdZ1G on line 3 bool(false)
Output for 7.0.0 - 7.0.6, 7.1.0
Notice: unserialize(): Error at offset 2 of 18 bytes in /in/XdZ1G on line 2 bool(false) Fatal error: Possible integer overflow in memory allocation (2147483648 * 32 + 32) in /in/XdZ1G on line 3
Process exited with code 255.
Output for 5.3.17 - 5.6.28
Notice: unserialize(): Error at offset 2 of 18 bytes in /in/XdZ1G on line 2 bool(false) object(stdClass)#1 (0) { }