[ om / jp / 2d ] [ home ]

/jp/ - 2D/Random

Name
Email
Subject
Comment
File
Password (For file deletion.)

File: 1745509333736.png (2.74 MB, 1440x1080, c30cf15d1152f7a78cd9097102….png)

No. 647484

got a bad case of throat inflammation

No.647485

stop globbing up cocks then

No.647486

>>647485
I am an incomparable homo

No.647492

you ever test how far you can stick something down your throat i can do well over 8 inches

No.647500

File: 1745525066889.png (309.13 KB, 465x570, d085427ba1ce60e5447fcbd96f….png)

now that i think pandemic

No.647501

File: 1745526155762.jpg (93.45 KB, 497x707, 341cb3c8c31637c9c0b59f5dba….jpg)

>Wahaha!

No.647502


No.647503

File: 1745528966614.jpg (226.92 KB, 500x500, 57909933_p0.jpg)

>>647501
I want to stuff you up my kawaii ass

No.647504

>>647502
I opened this and a cmd.exe window opened on my Ubuntu machine

No.647509

yo whatmin give us the lowdown on why catbox can't just use original filenames instead of changing our filenames

No.647510

File: 1745536687389.png (18.99 KB, 500x500, windows me chan 2d3e5d0fd1….png)

>>647509
If someone uploads a filename with some weird emojis, spaces, and other characters, storing that on disk, in a mysql database, interacting with it with code, and generating a link from that all becomes harder, although not impossible. I wouldn't want the server to be full of thousands of user-generated filenames either.

I'm not a super hacker and don't know how this might happen, but it's a larger attack surface and more complex than just immediately sanitizing/standardizing the filenames.

No.647512

>>647510
but the file is already stored on a disk with that filename and my computer doesnt like explode or something

No.647513

just upload the file in a archive like tar rar zip 7z

No.647531

File: 1745568545458.jpg (205.13 KB, 750x1000, GG0S2xia4AAwZU9.jpg)

I am an incomparable homo

No.647535

NIIIIIIIIIIIIGGGGGGGGGGGGGEEEEEEEEEERRRRRRR



Delete Post [ ]
[Return]
[ om / jp / 2d ] [ home ]