source: https://www.securityfocus.com/bid/22505/info PHP is prone to a denial-of-service vulnerability because it fails to properly sanitize user-supplied input. An attacker who can run PHP code on a vulnerable computer may exploit this vulnerability to crash PHP and the webserver, denying service to legitimate users. This issue affects PHP 5.2.1; other versions may also be vulnerable. ", $Data); $Data = str_ireplace("\n", "
", $Data); $Data = str_ireplace("\r\n", "
", $Data); $Data = str_ireplace("\n", "
", $Data); $Data = str_ireplace("\r\n", "
", $Data); $Data = str_ireplace("\n", "
", $Data); $Data = str_ireplace("\r\n", "
", $Data); $Data = str_ireplace("\n", "
", $Data); $Data = str_ireplace("\r\n", "
", $Data); $Data = str_ireplace("\n", "
", $Data); $Data = str_ireplace("\r\n", "
", $Data); $Data = str_ireplace("\n", "
", $Data); $Data = str_ireplace("\r\n", "
", $Data); $Data = str_ireplace("\n", "
", $Data); ?>