PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:23765
vulners.com/securityvulns/securityvulns:doc:23766
vulners.com/securityvulns/securityvulns:doc:23767
vulners.com/securityvulns/securityvulns:doc:23768
vulners.com/securityvulns/securityvulns:doc:23769
vulners.com/securityvulns/securityvulns:doc:23770
vulners.com/securityvulns/securityvulns:doc:23771
vulners.com/securityvulns/securityvulns:doc:23772
vulners.com/securityvulns/securityvulns:doc:23773
vulners.com/securityvulns/securityvulns:doc:23774
vulners.com/securityvulns/securityvulns:doc:23775
vulners.com/securityvulns/securityvulns:doc:23778
vulners.com/securityvulns/securityvulns:doc:23779
vulners.com/securityvulns/securityvulns:doc:23780
vulners.com/securityvulns/securityvulns:doc:23781
vulners.com/securityvulns/securityvulns:doc:23782
vulners.com/securityvulns/securityvulns:doc:23783
vulners.com/securityvulns/securityvulns:doc:23784
vulners.com/securityvulns/securityvulns:doc:23785
vulners.com/securityvulns/securityvulns:doc:23786
vulners.com/securityvulns/securityvulns:doc:23787
vulners.com/securityvulns/securityvulns:doc:23801
vulners.com/securityvulns/securityvulns:doc:23802
vulners.com/securityvulns/securityvulns:doc:23803
vulners.com/securityvulns/securityvulns:doc:23804
vulners.com/securityvulns/securityvulns:doc:23805
vulners.com/securityvulns/securityvulns:doc:23806
vulners.com/securityvulns/securityvulns:doc:23840
vulners.com/securityvulns/securityvulns:doc:23841
vulners.com/securityvulns/securityvulns:doc:23842
vulners.com/securityvulns/securityvulns:doc:23844
vulners.com/securityvulns/securityvulns:doc:23845
vulners.com/securityvulns/securityvulns:doc:23846
vulners.com/securityvulns/securityvulns:doc:23847
vulners.com/securityvulns/securityvulns:doc:23861