3v4l.org

run code in 300+ PHP versions simultaneously
<?php $res = false; @preg_replace("/test/e\x00ing/i",'$res = true;',"test"); if(false===$res)echo 'Not '; echo "Vulnerable, PHP ";
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 10, Position 2 = 11
Branch analysis from position: 10
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 11
filename:       /in/hYTsJ
function name:  (null)
number of ops:  13
compiled vars:  !0 = $res
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, <false>
    3     1        BEGIN_SILENCE                                    ~2      
          2        INIT_FCALL                                               'preg_replace'
          3        SEND_VAL                                                 '%2Ftest%2Fe%00ing%2Fi'
          4        SEND_VAL                                                 '%24res+%3D+true%3B'
          5        SEND_VAL                                                 'test'
          6        DO_ICALL                                                 
          7        END_SILENCE                                              ~2
    4     8        TYPE_CHECK                                    4          !0
          9      > JMPZ                                                     ~4, ->11
         10    >   ECHO                                                     'Not+'
    5    11    >   ECHO                                                     'Vulnerable%2C+PHP+'
         12      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
158.28 ms | 1385 KiB | 15 Q