PHP Floating Point DoS Attack Workaround
Prevents 32-bit PHP versions from hanging when processing a request containing 2.2250738585072011e-308 value.
Maintenance 20/1004972d since update
Active installs
10
Downloads
3,735
Reviews
0
Age
15.0y
TagssecurityphpHostingsystemsetup
Plugin info
Total downloads: 3,735
Active installs: 10
Total reviews: 0
Average rating: 0
Support threads opened: 0
Support threads resolved: 0 (0%)
Available in: 1 language(s)
Contributors: 2
Last updated: 5/21/2012 (4972 days ago)
Added to WordPress: 1/5/2011 (15 years old)
Minimum WordPress version: 1.5
Tested up to WordPress version: 3.4.2
Minimum PHP version: f
Maintenance & Compatibility
Maintenance score
Possibly abandoned • Last updated 4972 days ago
20/100
Is PHP Floating Point DoS Attack Workaround abandoned?
Possibly abandoned (last update 4972 days ago).
Compatibility
Requires WordPress: 1.5
Tested up to: 3.4.2
Requires PHP: f
Similar & Alternatives
Explore plugins with similar tags, and compare key metrics like downloads, ratings, updates, support, and WP/PHP compatibility.
Correct PHP_SELF
Rating 0.0/5 (0 reviews) • Active installs 0
WOW Best WP Lightweight
Rating 0.0/5 (0 reviews) • Active installs 0
Waka Bulk Page
Rating 5.0/5 (8 reviews) • Active installs 1,000
Bulk Content Creator
Rating 3.4/5 (5 reviews) • Active installs 500
WP Quick Setup
Rating 4.5/5 (4 reviews) • Active installs 100
Apex Digital Toolbox
Rating 0.0/5 (0 reviews) • Active installs 100
Description
Prevents 32-bit PHP versions from hanging when processing a request containing 2.2250738585072011e-308 value.
For more information see the original post and bug report by Rick Regan.
Based on the non-plugin solution by AirCraft24.com.
Installation
- Upload
php-floating-point-dos-attack-workaroundfolder to the/wp-content/plugins/directory. - Activate the plugin through the ‘Plugins’ menu in WordPress.
Frequently Asked Questions
No FAQ available
Review feed
No reviews available
Screenshots
No screenshots available
Changelog
0.2
- Added more thorough check
- Terminate execution rather than deleting the variable
0.1
- Initial release