3v4l.org

run code in 500+ PHP versions simultaneously
<?php echo $query = sprintf("SELECT * FROM users WHERE user='%s' AND password='%s'", mysql_real_escape_string("Test"), mysql_real_escape_string("xy"));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/vrFT0
function name:  (null)
number of ops:  14
compiled vars:  !0 = $query
line      #* E I O op                               fetch          ext  return  operands
-----------------------------------------------------------------------------------------
    4     0  E >   INIT_FCALL_BY_NAME                                           'mysql_real_escape_string'
          1        SEND_VAL_EX                                                  'Test'
          2        DO_FCALL                                          0  $1      
    5     3        INIT_FCALL_BY_NAME                                           'mysql_real_escape_string'
          4        SEND_VAL_EX                                                  'xy'
          5        DO_FCALL                                          0  $2      
          6        ROPE_INIT                                         5  ~4      'SELECT+%2A+FROM+users+WHERE+user%3D%27'
          7        ROPE_ADD                                          1  ~4      ~4, $1
          8        ROPE_ADD                                          2  ~4      ~4, '%27+AND+password%3D%27'
          9        ROPE_ADD                                          3  ~4      ~4, $2
         10        ROPE_END                                          4  ~3      ~4, '%27'
    3    11        ASSIGN                                               ~7      !0, ~3
         12        ECHO                                                         ~7
    5    13      > RETURN                                                       1

Generated using Vulcan Logic Dumper, using php 8.5.0


preferences:
169.35 ms | 2801 KiB | 13 Q