3v4l.org

run code in 300+ PHP versions simultaneously
<?php $foobar = $_POST["code"]; // This contains a SQL-injection vulnerability; But that's a separate issue, I think $query = "INSERT INTO table (field) VALUES (\"" . $foobar . "\")"; // Use variable in a query string
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/pTqhQ
function name:  (null)
number of ops:  7
compiled vars:  !0 = $foobar, !1 = $query
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   FETCH_R                      global              ~2      '_POST'
          1        FETCH_DIM_R                                      ~3      ~2, 'code'
          2        ASSIGN                                                   !0, ~3
    3     3        CONCAT                                           ~5      'INSERT+INTO+table+%28field%29+VALUES+%28%22', !0
          4        CONCAT                                           ~6      ~5, '%22%29'
          5        ASSIGN                                                   !1, ~6
          6      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
150.54 ms | 1392 KiB | 13 Q