3v4l.org

run code in 300+ PHP versions simultaneously
<?php $foobar = $_POST["code"]; // This contains a SQL-injection vulnerability; But that's a separate issue, I think $query = "INSERT INTO table (field) VALUES (\"" . $foobar . "\")"; // Use variable in a query string
Output for 8.0.0 - 8.0.30, 8.1.0 - 8.1.28, 8.2.0 - 8.2.18, 8.3.0 - 8.3.6
Warning: Undefined array key "code" in /in/pTqhQ on line 2
Output for 5.3.0 - 5.3.29, 5.4.0 - 5.4.45, 5.5.0 - 5.5.38, 5.6.0 - 5.6.25, 7.0.0 - 7.0.20, 7.1.0 - 7.1.20, 7.2.0 - 7.2.33, 7.3.12 - 7.3.31, 7.4.0 - 7.4.33
Notice: Undefined index: code in /in/pTqhQ on line 2
Output for 7.3.32 - 7.3.33
Output for 4.3.0 - 4.3.11, 4.4.0 - 4.4.9, 5.0.0 - 5.0.5, 5.1.1 - 5.1.6, 5.2.0 - 5.2.17
Notice: Undefined index: code in /in/pTqhQ on line 2
Output for 5.1.0
Fatal error: fatal flex scanner internal error--end of buffer missed in /in/pTqhQ on line 3
Process exited with code 255.

preferences:
246.14 ms | 401 KiB | 355 Q