Searched refs:overflow (Results 51 – 75 of 131) sorted by relevance
123456
12 $d[] = '20800410101010'; // overflow..
2 testing integer overflow (64bit)
2 Bug #34045 (Buffer overflow with serialized object)
2 GC 023: Root buffer overflow (automatic collection)
2 Next free element may overflow in array literals
2 Bug #75981 (stack-buffer-overflow while parsing HTTP response)
2 Bug #68044 Integer overflow in unserialize() (32-bits only)
2 Bug 72482 (Ilegal write/read access caused by gdImageAALine overflow)
2 Bug #73279 (Integer overflow in gdImageScaleBilinearPalette())
2 Bug #71534 (Type confusion in exif_read_data() leading to heap overflow in debug mode)
2 Bug #68925 (CVE-2015-0235 – GHOST: glibc gethostbyname buffer overflow)
2 Bug #72306 (Heap overflow through proc_open and $env parameter)
2 Bug #77371 (heap buffer overflow in mb regex functions - compile_string_node)
2 Bug #53574 (Integer overflow in SdnToJulian; leads to segfault)
2 Bug #55797: Integer overflow in SdnToGregorian leads to segfault (in optimized builds)
2 Bug #77322 (PharData::addEmptyDir('/') Possible integer overflow)
2 Phar: bug #71488: Stack overflow when decompressing tar archives
2 filter_var() and double overflow/underflow
2 Bug #81226: Integer overflow behavior is different with JIT enabled
2 Bug #60965: Buffer overflow on htmlspecialchars/entities with $double=false
2 No overflow should occur during the memory_limit check for wordwrap()
12 /* This should be sufficient to overflow any buffers */
Completed in 27 milliseconds