1
Mods & Plugins (Releases & Support) / Re: [MOD] Cache System for 4images v1.7
« on: July 12, 2006, 05:14:41 PM »
rss feeds mods break too.
You're looking for some 4images templates and styles? Then visit this thread to show websites with 4images templates to download.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
as I said, different browsers handle differently corrupted pages...so, basicaly what I'm trying to say, is that your gallery most probably produces corrupted gzip compressed data...
FF and any other modern browser have no issues with Gzip compression, unless the Gzip compressed page is corrupted (i.e. it has some non-compressed data before or after compressed data)
Installed this mod but something odd happens after a couple of tries.
my index page comes up blank. any ideas? Just a white page for the index.
Warning: Division by zero in /home/4images/comments_all.php on line 146
Warning: Division by zero in /home/4images/comments_all.php on line 151
Well, I've checked and re-checked this code, it looks like the text ought to be there, but it's just not coming up. Anything to go on as to why text wouldn't be getting pulled up by the lang tag?
Hi everyone,
tafferkakaos smiley download link doesn't work. Does anybody have an alternative smiley download zip link?
Anyone?
Description
==========
An integer overflow and an unbound recursion were discovered in the processing of Image File Directory tags in PHP's EXIF module (CAN-2005-1042, CAN-2005-1043). Furthermore, two infinite loops have been discovered in the getimagesize() function when processing IFF or JPEG images (CAN-2005-0524, CAN-2005-0525).
Impact
=====
A remote attacker could craft an image file with a malicious EXIF IFD tag, a large IFD nesting level or invalid size parameters and send it to a web application that would process this user-provided image using one of the affected functions. This could result in denying service on the attacked server and potentially executing arbitrary code with the rights of the web server.