Searched refs:overflow (Results 51 – 75 of 121) sorted by relevance
12345
2 Bug #79283 (Segfault in libmagic patch contains a buffer overflow)
2 Bug #68044 Integer overflow in unserialize() (32-bits only)
2 Bug #71534 (Type confusion in exif_read_data() leading to heap overflow in debug mode)
2 Bug #75981 (stack-buffer-overflow while parsing HTTP response)
2 Bug #34045 (Buffer overflow with serialized object)
2 GC 023: Root buffer overflow (automatic collection)
2 Next free element may overflow in array literals
2 Bug #77345 (Segmentation faults stack overflow in cyclic garbage collector) (Bug #77427)
2 Bug 72482 (Ilegal write/read access caused by gdImageAALine overflow)
2 Bug #73279 (Integer overflow in gdImageScaleBilinearPalette())
2 Bug #77371 (heap buffer overflow in mb regex functions - compile_string_node)
2 Bug #72306 (Heap overflow through proc_open and $env parameter)
2 Bug #53574 (Integer overflow in SdnToJulian; leads to segfault)
2 Bug #55797: Integer overflow in SdnToGregorian leads to segfault (in optimized builds)
2 Bug #77322 (PharData::addEmptyDir('/') Possible integer overflow)
2 Phar: bug #71488: Stack overflow when decompressing tar archives
2 Bug #68925 (CVE-2015-0235 – GHOST: glibc gethostbyname buffer overflow)
2 filter_var() and double overflow/underflow
2 No overflow should occur during the memory_limit check for wordwrap()
2 Bug #60965: Buffer overflow on htmlspecialchars/entities with $double=false
12 /* This should be sufficient to overflow any buffers */
2 Bug #76448 (Stack buffer overflow in firebird_info_cb)
2 apache_request_headers() stack overflow.
Completed in 22 milliseconds