3v4l.org

run code in 300+ PHP versions simultaneously
<?php $res = false; @preg_replace("/fuck/e\x00bitchez/i",'$res = true;',"fuck"); if(false===$res)echo 'Not '; echo "Vulnerable, PHP ";
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 10, Position 2 = 11
Branch analysis from position: 10
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 11
filename:       /in/eRu2H
function name:  (null)
number of ops:  13
compiled vars:  !0 = $res
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, <false>
    3     1        BEGIN_SILENCE                                    ~2      
          2        INIT_FCALL                                               'preg_replace'
          3        SEND_VAL                                                 '%2Ffuck%2Fe%00bitchez%2Fi'
          4        SEND_VAL                                                 '%24res+%3D+true%3B'
          5        SEND_VAL                                                 'fuck'
          6        DO_ICALL                                                 
          7        END_SILENCE                                              ~2
    4     8        TYPE_CHECK                                    4          !0
          9      > JMPZ                                                     ~4, ->11
         10    >   ECHO                                                     'Not+'
    5    11    >   ECHO                                                     'Vulnerable%2C+PHP+'
         12      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
153.45 ms | 1394 KiB | 15 Q