Searched refs:overflow (Results 51 – 75 of 100) sorted by relevance
1234
2 Bug #55797: Integer overflow in SdnToGregorian leads to segfault (in optimized builds)
2 filter_var() and double overflow/underflow
2 Octal integer overflow
2 Hex integer overflow
2 GC 023: Root buffer overflow (automatic collection)
2 Next free element may overflow in array literals
2 Bug #60965: Buffer overflow on htmlspecialchars/entities with $double=false
12 /* This should be sufficient to overflow any buffers */
2 Phar: bug #71488: Stack overflow when decompressing tar archives
2 apache_request_headers() stack overflow.
2 Bug #60150 (Integer overflow during the parsing of invalid exif header)
2 Bug #68027 (buffer overflow in mkgmtime() function)
2 Bug #28974 (array_(p)slice() treats large lengths incorrectly - overflow)
2 Bug #41121 (range() overflow handling for large numbers on 32bit machines)
2 Bug #77381 (heap buffer overflow in multibyte match_at)
2 Bug #68298 (OCI int overflow)
2 Bug #74625 (Integer overflow in oci_bind_array_by_name)
2 Test for bug #75851: Year component overflow with date formats "c", "o", "r" and "y"
2 Github #215 (imagefilltoborder stack overflow when invalid pallete index used)
35 /*write some data to cause overflow*/
2 Phar: tar with huge filenames, buffer overflow
157 int overflow; in convert_to_number() local161 if ((type = is_numeric_string_ex(str, str_len, &lval, &dval, 0, &overflow)) != 0) { in convert_to_number()165 } else if (type == IS_DOUBLE && !overflow) { in convert_to_number()
38 . Fixed bug #77988 (heap-buffer-overflow on php_jpg_get16).47 due to integer overflow). (CVE-2019-11039). (maris dot adam)1456 overflow). (cmb)1724 overflow). (Pierre)1824 heap overflow in mdecrypt_generic). (Stas)2197 overflow). (cmb)2696 overflow). (Pierre)2709 heap overflow in mdecrypt_generic). (Stas)2774 overflow). (CVE-2016-5766) (Pierre)2777 in heap overflow). (CVE-2016-5767) (Pierre)[all …]
3 // this tarmaker makes a malicious tar with a header designed to overflow the buffer83 '12345678', // have a mode that allows the name to overflow
Completed in 72 milliseconds