3v4l.org

run code in 300+ PHP versions simultaneously
<?php echo $query = sprintf("SELECT * FROM users WHERE user='%s' AND password='%s'", mysql_real_escape_string("Test"), mysql_real_escape_string("xy"));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/vrFT0
function name:  (null)
number of ops:  14
compiled vars:  !0 = $query
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   INIT_FCALL                                               'sprintf'
          1        SEND_VAL                                                 'SELECT+%2A+FROM+users+WHERE+user%3D%27%25s%27+AND+password%3D%27%25s%27'
    4     2        INIT_FCALL_BY_NAME                                       'mysql_real_escape_string'
          3        SEND_VAL_EX                                              'Test'
          4        DO_FCALL                                      0  $1      
          5        SEND_VAR                                                 $1
    5     6        INIT_FCALL_BY_NAME                                       'mysql_real_escape_string'
          7        SEND_VAL_EX                                              'xy'
          8        DO_FCALL                                      0  $2      
          9        SEND_VAR                                                 $2
         10        DO_ICALL                                         $3      
    3    11        ASSIGN                                           ~4      !0, $3
         12        ECHO                                                     ~4
    5    13      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
156.1 ms | 1394 KiB | 15 Q