bug70914.phpt 377 B

1234567891011121314151617
  1. --TEST--
  2. Bug #70914 zend_throw_or_error() format string vulnerability
  3. --EXTENSIONS--
  4. pdo_sqlite
  5. --FILE--
  6. <?php
  7. $db = new PDO('sqlite::memory:');
  8. $st = $db->query('SELECT 1');
  9. try {
  10. $re = $st->fetchObject('%Z');
  11. } catch (TypeError $e) {
  12. echo $e->getMessage(), "\n";
  13. }
  14. ?>
  15. --EXPECT--
  16. PDOStatement::fetchObject(): Argument #1 ($class) must be a valid class name, %Z given