3v4l.org

run code in 300+ PHP versions simultaneously
<?php $html = '<ul> <li><strong>Project:</strong> Joomla!</li> <li><strong>SubProject:</strong> CMS</li> <li><strong>Impact:</strong> Low</li> <li><strong>Severity:</strong> <span class="label label-info">Low</span></li> <li><strong>Versions:</strong> 3.8.0 - 3.9.13</li> <li><strong>Exploit type:</strong> Path Disclosure</li> <li><strong>Reported Date:</strong> 2019-November-22</li> <li><strong>Fixed Date:</strong> 2019-December-17</li> <li><strong>CVE Number:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19845">CVE-2019-19845</a></li> </ul> <h3>Description</h3> <p>Missing access check in framework files could lead to a path disclosure.</p> <h3>Affected Installs</h3> <p>Joomla! CMS versions 3.8.0 - 3.9.13</p> <h3>Solution</h3> <p>Upgrade to version 3.9.14</p> <h3>Contact</h3> <p>The JSST at the <a title="Contact the JSST" href="https://developer.joomla.org/security-centre.html">Joomla! Security Centre</a>.</p> <div class="alert alert-info"><strong>Reported By: </strong>Lee Thao, Viettel Cyber Security</div><div class="feedflare"> <a href="https://feeds.joomla.org/~ff/JoomlaSecurityNews?a=_fWsZ57Sw7g:uVTwWaDiNQ0:yIl2AUoC8zA"></a> </div>'; $doc = new DOMDocument(); $doc->loadHTML($html); $xpath = new DOMXPath($doc); $impact_node = $xpath->query('//li[contains(string(), "Impact:")]'); echo "Impact: " . str_replace('Impact: ', '', $impact_node->item(0)->textContent); echo "\n"; $severity_node = $xpath->query('//li[contains(string(), "Severity:")]/span[contains(@class, "label-info")]'); echo "Severity: " . $severity_node->item(0)->textContent . "\n";
Output for 7.2.0 - 7.2.33, 7.3.0 - 7.3.29, 7.4.0 - 7.4.21, 8.0.0 - 8.0.8
Impact: Low Severity: Low

preferences:
205.31 ms | 459 KiB | 5 Q