--TEST-- Bug #72142: WDDX Packet Injection Vulnerability in wddx_serialize_value() --FILE-- stdClass'); var_dump($wddx); var_dump(wddx_deserialize($wddx)); ?> --EXPECT-- string(301) "
</comment></header><data><struct><var name="php_class_name"><string>stdClass</string></var></struct></data></wddxPacket>
" string(0) ""