|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #25717 stack over flow
Submitted: 2003-10-01 12:42 UTC Modified: 2003-10-02 10:46 UTC
Avg. Score:5.0 ± 0.0
Reproduced:0 of 0 (0.0%)
From: net_del at freemail dot ru Assigned:
Status: Wont fix Package: Reproducible crash
PHP Version: 4CVS-2003-10-01 (stable) OS: Win32
Private report: No CVE-ID: None
View Add Comment Developer Edit
Anyone can comment on a bug. Have a simpler test case? Does it work for you on a different platform? Let us know!
Just going to say 'Me too!'? Don't clutter the database with that please — but make sure to vote on the bug!
Your email address:
Solve the problem:
31 - 27 = ?
Subscribe to this entry?

 [2003-10-01 12:42 UTC] net_del at freemail dot ru
This code over flow the apache!

Reproduce code:
<form method='post'>
<input type='hidden' name='apache_fuck' value='eval(".chr(36)."apache_fuck);'>
<input type='submit' value='Save the planet kill the apache'></form></font></td>");

Expected result:
;)while (true) but no error ;P

Actual result:
Apache.exe errored


Add a Patch

Pull Requests

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [2003-10-01 15:40 UTC] scottmacvicar at ntlworld dot com
Your sending PHP into an infinite loop.

simplier example is

$var = 'eval($var);';

This report is bogus.
 [2003-10-01 19:36 UTC]
And try searching the bug database BEFORE submitting
the 100th report about this issue.

PHP Copyright © 2001-2023 The PHP Group
All rights reserved.
Last updated: Mon Mar 20 19:03:41 2023 UTC