3v4l.org

run code in 300+ PHP versions simultaneously
<?php $test_json = '[{"theme-my-login":{"vulnerabilities":[{"id":6043,"title":"Theme My Login 6.3.9 - Local File Inclusion","url":["http://packetstormsecurity.com/files/127302/","http://seclists.org/fulldisclosure/2014/Jun/172","http://www.securityfocus.com/bid/68254","https://security.dxw.com/advisories/lfi-in-theme-my-login/"],"osvdb":["108517"],"vuln_type":"LFI","created_at":"2014-08-01T10:58:35.000Z","updated_at":"2014-08-01T10:58:35.000Z","fixed_in":"6.3.10"}]}},{"login-rebuilder":{"vulnerabilities":[{"id":6044,"title":"Login Rebuilder \u003c 1.2.0 - Cross Site Request Forgery Vulnerability","osvdb":["108364"],"cve":["2014-3882"],"vuln_type":"CSRF","created_at":"2014-08-01T10:58:35.000Z","updated_at":"2014-08-01T10:58:35.000Z","fixed_in":"1.2.0"}]}}]'; $results = json_decode($test_json, true); $vuln_dict = array(); foreach ($results as $key => $value){ echo $key; echo $value; } ?>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 77) Position 1 = 8, Position 2 = 13
Branch analysis from position: 8
2 jumps found. (Code = 78) Position 1 = 9, Position 2 = 13
Branch analysis from position: 9
1 jumps found. (Code = 42) Position 1 = 8
Branch analysis from position: 8
Branch analysis from position: 13
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 13
filename:       /in/oXdeH
function name:  (null)
number of ops:  15
compiled vars:  !0 = $test_json, !1 = $results, !2 = $vuln_dict, !3 = $value, !4 = $key
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '%5B%7B%22theme-my-login%22%3A%7B%22vulnerabilities%22%3A%5B%7B%22id%22%3A6043%2C%22title%22%3A%22Theme+My+Login+6.3.9+-+Local+File+Inclusion%22%2C%22url%22%3A%5B%22http%3A%2F%2Fpacketstormsecurity.com%2Ffiles%2F127302%2F%22%2C%22http%3A%2F%2Fseclists.org%2Ffulldisclosure%2F2014%2FJun%2F172%22%2C%22http%3A%2F%2Fwww.securityfocus.com%2Fbid%2F68254%22%2C%22https%3A%2F%2Fsecurity.dxw.com%2Fadvisories%2Flfi-in-theme-my-login%2F%22%5D%2C%22osvdb%22%3A%5B%22108517%22%5D%2C%22vuln_type%22%3A%22LFI%22%2C%22created_at%22%3A%222014-08-01T10%3A58%3A35.000Z%22%2C%22updated_at%22%3A%222014-08-01T10%3A58%3A35.000Z%22%2C%22fixed_in%22%3A%226.3.10%22%7D%5D%7D%7D%2C%7B%22login-rebuilder%22%3A%7B%22vulnerabilities%22%3A%5B%7B%22id%22%3A6044%2C%22title%22%3A%22Login+Rebuilder+%5Cu003c+1.2.0+-+Cross+Site+Request+Forgery+Vulnerability%22%2C%22osvdb%22%3A%5B%22108364%22%5D%2C%22cve%22%3A%5B%222014-3882%22%5D%2C%22vuln_type%22%3A%22CSRF%22%2C%22created_at%22%3A%222014-08-01T10%3A58%3A35.000Z%22%2C%22updated_at%22%3A%222014-08-01T10%3A58%3A35.000Z%22%2C%22fixed_in%22%3A%221.2.0%22%7D%5D%7D%7D%5D'
    3     1        INIT_FCALL                                               'json_decode'
          2        SEND_VAR                                                 !0
          3        SEND_VAL                                                 <true>
          4        DO_ICALL                                         $6      
          5        ASSIGN                                                   !1, $6
    4     6        ASSIGN                                                   !2, <array>
    5     7      > FE_RESET_R                                       $9      !1, ->13
          8    > > FE_FETCH_R                                       ~10     $9, !3, ->13
          9    >   ASSIGN                                                   !4, ~10
    6    10        ECHO                                                     !4
    7    11        ECHO                                                     !3
    5    12      > JMP                                                      ->8
         13    >   FE_FREE                                                  $9
    9    14      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
152.6 ms | 1011 KiB | 14 Q