Searched refs:overflow (Results 1 – 25 of 59) sorted by relevance
123
2 Integer overflow11 $overflow = "2147483648";16 $overflow = "9223372036854775808";33 test_validation($overflow, "overflow");41 overflow filtered: bool(false)42 overflow is_long: bool(false)43 overflow equal: bool(false)
2 Bug #69522 (heap buffer overflow in unpack())10 Warning: unpack(): Type h: integer overflow in %s on line %d
2 Bug #67247 (spl_fixedarray_resize integer overflow)13 Fatal error: Possible integer overflow in memory allocation (%d * %d + 0) in %s on line %d
17 integer overflow detected
2 Bug #72339 Integer Overflow in _gd2GetHeader() resulting in heap overflow 18 fwrite($fh, str_repeat("\x41\x41\x41\x41", 0x1000000)); // overflow data
2 Bug #66387 (Stack overflow with imagefilltoborder)
2 imagerotate() overflow with negative numbers
2 overflow check for _php_math_basetozval
2 Phar: bug #71488: Stack overflow when decompressing tar archives
2 Bug #64895: Integer overflow in SndToJewish
2 Bug #53574 (Integer overflow in SdnToJulian; leads to segfault)
2 Bug #55797: Integer overflow in SdnToGregorian leads to segfault (in optimized builds)
2 testing integer overflow (32bit)
2 testing integer overflow (64bit)
2 Bug #34045 (Buffer overflow with serialized object)
2 GC 023: Root buffer overflow (automatic collection)
2 Bug #67397 (Buffer overflow in locale_get_display_name->uloc_getDisplayName (libicu 4.8.1))
2 Bug #68044 Integer overflow in unserialize() (32-bits only)
12 $d[] = '20800410101010'; // overflow..
2 Bug #68925 (CVE-2015-0235 – GHOST: glibc gethostbyname buffer overflow)
Completed in 39 milliseconds