php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #55402 htmlParseCharRef Warning
Submitted: 2011-08-11 15:59 UTC Modified: 2014-12-30 10:41 UTC
From: jerry at jmweb dot net Assigned:
Status: No Feedback Package: DOM XML related
PHP Version: 5.3.6 OS: Apache 2.2.17
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: jerry at jmweb dot net
New email:
PHP Version: OS:

 

 [2011-08-11 15:59 UTC] jerry at jmweb dot net
Description:
------------
The loadHTML method of an instantiated DomDocument object throws a Warning when it 
encounters a specific set of characters. In this example, the characters are part 
of a RegEx pattern used in a pattern attribute of an input element.

More importantly, it incorrectly modifies and truncates the value.

Test script:
---------------
ftp://guest:guest@bytes1.dyndns.org/PUBLIC/php_bug/php_bug2.php

Expected result:
----------------
see notes in file @ the provided URL

Actual result:
--------------
see notes in file @ the provided URL

Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2013-12-03 11:22 UTC] mike@php.net
-Status: Open +Status: Feedback
 [2013-12-03 11:22 UTC] mike@php.net
Thank you for this bug report. To properly diagnose the problem, we
need a short but complete example script to be able to reproduce
this bug ourselves. 

A proper reproducing script starts with <?php and ends with ?>,
is max. 10-20 lines long and does not require any external 
resources such as databases, etc. If the script requires a 
database to demonstrate the issue, please make sure it creates 
all necessary tables, stored procedures etc.

Please avoid embedding huge scripts into the report.


 [2014-12-30 10:41 UTC] php-bugs at lists dot php dot net
No feedback was provided. The bug is being suspended because
we assume that you are no longer experiencing the problem.
If this is not the case and you are able to provide the
information that was requested earlier, please do so and
change the status of the bug back to "Re-Opened". Thank you.
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Fri Dec 06 13:01:29 2024 UTC