Home
last modified time | relevance | path

Searched refs:Buffer (Results 1 – 9 of 9) sorted by relevance

/PHP-5.5/win32/
H A Dsendmail.c73 char Buffer[MAIL_BUFFER_SIZE]; variable
410 snprintf(Buffer, sizeof(Buffer), "HELO %s\r\n", LocalHost); in SendText()
414 if ((res = Post(Buffer)) != SUCCESS) { in SendText()
416 if ((res = Post(Buffer)) != SUCCESS) { in SendText()
427 if ((res = Post(Buffer)) != SUCCESS) { in SendText()
441 FormatEmailAddress(Buffer, token, "RCPT TO:<%s>\r\n"); in SendText()
442 if ((res = Post(Buffer)) != SUCCESS) { in SendText()
463 if ((res = Post(Buffer)) != SUCCESS) { in SendText()
493 if ((res = Post(Buffer)) != SUCCESS) { in SendText()
518 if ((res = Post(Buffer)) != SUCCESS) { in SendText()
[all …]
/PHP-5.5/ext/tidy/tests/
H A D017.phpt2 The Tidy Output Buffer Filter
/PHP-5.5/ext/intl/tests/
H A Dbug67397.phpt2 Bug #67397 (Buffer overflow in locale_get_display_name->uloc_getDisplayName (libicu 4.8.1))
/PHP-5.5/ext/phar/tests/
H A Dbug69324.phpt2 Bug #69324: Buffer Over-read in unserialize when parsing Phar
H A Dbug69441.phpt2 Phar: bug #69441: Buffer Overflow when parsing tar/zip/phar in phar_set_inode
/PHP-5.5/Zend/tests/
H A Dbug34045.phpt2 Bug #34045 (Buffer overflow with serialized object)
/PHP-5.5/ext/standard/tests/strings/
H A Dbug60965.phpt2 Bug #60965: Buffer overflow on htmlspecialchars/entities with $double=false
/PHP-5.5/ext/fileinfo/tests/
H A Dbug71527.phpt2 Bug #71527 Buffer over-write in finfo_open with malformed magic file
/PHP-5.5/
H A DNEWS133 . Fixed bug #71527 (Buffer over-write in finfo_open with malformed magic
224 . Fixed bug #70385 (Buffer over-read in exif_read_data with TIFF IFD tag byte
331 . Fixed bug #69923 (Buffer overflow and stack smashing error in
518 . Fixed bug #69324 (Buffer Over-read in unserialize when parsing Phar). (Stas)
519 . Fixed bug #69441 (Buffer Overflow when parsing tar/zip/phar in
2151 . Fixed Bug #64949 (Buffer overflow in _pdo_pgsql_error). (Remi)
2977 . Fix bug #61807 - Buffer Overflow in apache_request_headers.
3278 . Fixed bug #60965 (Buffer overflow on htmlspecialchars/entities with
9426 - Fixed bug #34045 (Buffer overflow with serialized object). (Dmitry)

Completed in 61 milliseconds