We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
It seems that someone uploaded to your server PNG bomb (a unicolor picture in PNG format with a very big width and height).
The solution: check image width and height before image processing.
For this you could use image magick tool. Here is an example for PHP:
if ($width > 10000 || $height > 10000) { // invalid image }
The text was updated successfully, but these errors were encountered:
Add PNG enginge #6
70d2855
7b1cd1f
c94cd25
Add PNG engine #6
9991215
No branches or pull requests
PNG Bomb Protection
It seems that someone uploaded to your server PNG bomb (a unicolor picture in PNG format with a very big width and height).
The solution: check image width and height before image processing.
For this you could use image magick tool. Here is an example for PHP:
More information you could find here:
The text was updated successfully, but these errors were encountered: