3v4l.org

run code in 300+ PHP versions simultaneously
<?php $res = false; preg_replace("/fuck/e\x00bitchez/i",'$res = true;',"fuck"); if(false===$res)echo 'Not '; echo "Vulnerable, PHP ";
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 9
Branch analysis from position: 8
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 9
filename:       /in/flW3L
function name:  (null)
number of ops:  11
compiled vars:  !0 = $res
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, <false>
    3     1        INIT_FCALL                                               'preg_replace'
          2        SEND_VAL                                                 '%2Ffuck%2Fe%00bitchez%2Fi'
          3        SEND_VAL                                                 '%24res+%3D+true%3B'
          4        SEND_VAL                                                 'fuck'
          5        DO_ICALL                                                 
    4     6        TYPE_CHECK                                    4          !0
          7      > JMPZ                                                     ~3, ->9
          8    >   ECHO                                                     'Not+'
    5     9    >   ECHO                                                     'Vulnerable%2C+PHP+'
         10      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
145.97 ms | 1394 KiB | 15 Q