--TEST-- Bug #71587 (Use-After-Free / Double-Free in WDDX Deserialize) --SKIPIF-- --FILE-- manhluat EOF; $wddx = wddx_deserialize($xml); var_dump($wddx); // Print mem leak foreach($wddx as $k=>$v) printf("Key: %s\nValue: %s\n",bin2hex($k),bin2hex($v)); ?> DONE --EXPECT-- array(2) { [0]=> string(8) "manhluat" [1]=> bool(true) } Key: 30 Value: 6d616e686c756174 Key: 31 Value: 31 DONE