Bug #54007 [Com]: odbc seg faults with null data returned from DB2

2011-11-10 Thread giuseppe at blandino dot it
Edit report at https://bugs.php.net/bug.php?id=54007edit=1 ID: 54007 Comment by: giuseppe at blandino dot it Reported by:ken at focusschoolsoftware dot com Summary:odbc seg faults with null data returned from DB2 Status: Open Type:

Req #33698 [Com]: Conflicts with multiple interfaces sharing common method names

2011-11-10 Thread arkadiusz dot robinski at allegro dot pl
Edit report at https://bugs.php.net/bug.php?id=33698edit=1 ID: 33698 Comment by: arkadiusz dot robinski at allegro dot pl Reported by:jason at hybd dot net Summary:Conflicts with multiple interfaces sharing common method names

[PHP-BUG] Bug #60256 [NEW]: 64kB memory leak in exec() and related functions

2011-11-10 Thread andreas dot ringlstetter at gmail dot com
From: Operating system: Windows XP SP3 32bit PHP version: 5.3.8 Package: Program Execution Bug Type: Bug Bug description:64kB memory leak in exec() and related functions Description: For each call to exec(), system(), popen() oder proc_open(),

Bug #59808 [Opn-Csd]: Compilation error: too many arguments to function 'php_json_decode'

2011-11-10 Thread tony2001
Edit report at https://bugs.php.net/bug.php?id=59808edit=1 ID: 59808 Updated by: tony2...@php.net Reported by:eborned at gmail dot com Summary:Compilation error: too many arguments to function 'php_json_decode' -Status:

Bug #60116 [-Opn]: escapeshellcmd() cannot escape the chars which causes shell injection.

2011-11-10 Thread lbarnaud
Edit report at https://bugs.php.net/bug.php?id=60116edit=1 ID: 60116 Updated by: lbarn...@php.net Reported by:hirok...@php.net Summary:escapeshellcmd() cannot escape the chars which causes shell injection. -Status:

Bug #60116 [Asn]: escapeshellcmd() cannot escape the chars which causes shell injection.

2011-11-10 Thread lbarnaud
Edit report at https://bugs.php.net/bug.php?id=60116edit=1 ID: 60116 Updated by: lbarn...@php.net Reported by:hirok...@php.net Summary:escapeshellcmd() cannot escape the chars which causes shell injection. Status:

Bug #60251 [Opn-Bgs]: mysql_fetch_row bad return value on error

2011-11-10 Thread johannes
Edit report at https://bugs.php.net/bug.php?id=60251edit=1 ID: 60251 Updated by: johan...@php.net Reported by:richard dot gavenda at gmail dot com Summary:mysql_fetch_row bad return value on error -Status: Open +Status: Bogus

Bug #60253 [Opn-Bgs]: readfile() fails and gives no error

2011-11-10 Thread pierrick
Edit report at https://bugs.php.net/bug.php?id=60253edit=1 ID: 60253 Updated by: pierr...@php.net Reported by:dario at minttwist dot com Summary:readfile() fails and gives no error -Status: Open +Status: Bogus Type:

Bug #60253 [Bgs]: readfile() fails and gives no error

2011-11-10 Thread dario at minttwist dot com
Edit report at https://bugs.php.net/bug.php?id=60253edit=1 ID: 60253 User updated by:dario at minttwist dot com Reported by:dario at minttwist dot com Summary:readfile() fails and gives no error Status: Bogus Type: Bug

Bug #60253 [Bgs]: readfile() fails and gives no error

2011-11-10 Thread pierrick
Edit report at https://bugs.php.net/bug.php?id=60253edit=1 ID: 60253 Updated by: pierr...@php.net Reported by:dario at minttwist dot com Summary:readfile() fails and gives no error Status: Bogus Type: Bug Package:

Bug #52389 [Com]: Memory (de)allocation problem for pgsql notices

2011-11-10 Thread ecrist at claimlynx dot com
Edit report at https://bugs.php.net/bug.php?id=52389edit=1 ID: 52389 Comment by: ecrist at claimlynx dot com Reported by:miroslav dot zacek at skype dot net Summary:Memory (de)allocation problem for pgsql notices Status: Feedback Type:

Bug #48555 [Com]: ImageFTBBox() differs from previous versions for texts with new lines

2011-11-10 Thread dirk at haun-online dot de
Edit report at https://bugs.php.net/bug.php?id=48555edit=1 ID: 48555 Comment by: dirk at haun-online dot de Reported by:a dot schilder at gmx dot net Summary:ImageFTBBox() differs from previous versions for texts with new lines

Bug #60116 [Asn]: escapeshellcmd() cannot escape the chars which causes shell injection.

2011-11-10 Thread hirokawa
Edit report at https://bugs.php.net/bug.php?id=60116edit=1 ID: 60116 Updated by: hirok...@php.net Reported by:hirok...@php.net Summary:escapeshellcmd() cannot escape the chars which causes shell injection. Status:

Bug #59985 [Opn-Csd]: No ORA-error message when OCI_NO_DATA

2011-11-10 Thread sixd
Edit report at https://bugs.php.net/bug.php?id=59985edit=1 ID: 59985 Updated by: s...@php.net Reported by:sss at rdw dot ru Summary:No ORA-error message when OCI_NO_DATA -Status: Open +Status: Closed Type: Bug

[PHP-BUG] Bug #60257 [NEW]: ZERO DATES IN STRTOTIME

2011-11-10 Thread it at ezy2c dot com
From: Operating system: CENTOS 5 64 bit PHP version: 5.3.8 Package: Date/time related Bug Type: Bug Bug description:ZERO DATES IN STRTOTIME Description: Hi I have noticed that when i use zero date in windows it converts to the expected 1970 date

Bug #60167 [Com]: Crash / memory corruption

2011-11-10 Thread lunter at interia dot pl
Edit report at https://bugs.php.net/bug.php?id=60167edit=1 ID: 60167 Comment by: lunter at interia dot pl Reported by:the...@php.net Summary:Crash / memory corruption Status: Open Type: Bug Package:COM

Bug #60198 [Com]: Array to string notice from array functions

2011-11-10 Thread chx1975 at gmail dot com
Edit report at https://bugs.php.net/bug.php?id=60198edit=1 ID: 60198 Comment by: chx1975 at gmail dot com Reported by:simon at simon dot geek dot nz Summary:Array to string notice from array functions Status: Open Type:

Bug #55715 [Com]: Iterating Excel worksheet cell values may crash PHP

2011-11-10 Thread lunter at interia dot pl
Edit report at https://bugs.php.net/bug.php?id=55715edit=1 ID: 55715 Comment by: lunter at interia dot pl Reported by:ystsoi at yahoo dot com dot hk Summary:Iterating Excel worksheet cell values may crash PHP Status: Open Type:

Bug #60256 [Opn-Fbk]: 64kB memory leak in exec() and related functions

2011-11-10 Thread cataphract
Edit report at https://bugs.php.net/bug.php?id=60256edit=1 ID: 60256 Updated by: cataphr...@php.net Reported by:andreas dot ringlstetter at gmail dot com Summary:64kB memory leak in exec() and related functions -Status: Open +Status:

Bug #60198 [Opn-Bgs]: Array to string notice from array functions

2011-11-10 Thread rasmus
Edit report at https://bugs.php.net/bug.php?id=60198edit=1 ID: 60198 Updated by: ras...@php.net Reported by:simon at simon dot geek dot nz Summary:Array to string notice from array functions -Status: Open +Status: Bogus

Bug #60198 [Com]: Array to string notice from array functions

2011-11-10 Thread chx1975 at gmail dot com
Edit report at https://bugs.php.net/bug.php?id=60198edit=1 ID: 60198 Comment by: chx1975 at gmail dot com Reported by:simon at simon dot geek dot nz Summary:Array to string notice from array functions Status: Bogus Type:

Bug #60257 [Com]: ZERO DATES IN STRTOTIME

2011-11-10 Thread it at ezy2c dot com
Edit report at https://bugs.php.net/bug.php?id=60257edit=1 ID: 60257 Comment by: it at ezy2c dot com Reported by:it at ezy2c dot com Summary:ZERO DATES IN STRTOTIME Status: Open Type: Bug Package:Date/time

Bug #60257 [Com]: ZERO DATES IN STRTOTIME

2011-11-10 Thread it at ezy2c dot com
Edit report at https://bugs.php.net/bug.php?id=60257edit=1 ID: 60257 Comment by: it at ezy2c dot com Reported by:it at ezy2c dot com Summary:ZERO DATES IN STRTOTIME Status: Open Type: Bug Package:Date/time

Bug #48819 [ReO-Ver]: dl function is undefined

2011-11-10 Thread ezyang
Edit report at https://bugs.php.net/bug.php?id=48819edit=1 ID: 48819 Updated by: ezy...@php.net Reported by:pkwan at advsofteng dot net Summary:dl function is undefined -Status: Re-Opened +Status: Verified Type: