PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:24489
vulners.com/securityvulns/securityvulns:doc:24503
vulners.com/securityvulns/securityvulns:doc:24504
vulners.com/securityvulns/securityvulns:doc:24505
vulners.com/securityvulns/securityvulns:doc:24506
vulners.com/securityvulns/securityvulns:doc:24507
vulners.com/securityvulns/securityvulns:doc:24508
vulners.com/securityvulns/securityvulns:doc:24509
vulners.com/securityvulns/securityvulns:doc:24510
vulners.com/securityvulns/securityvulns:doc:24511
vulners.com/securityvulns/securityvulns:doc:24512
vulners.com/securityvulns/securityvulns:doc:24513
vulners.com/securityvulns/securityvulns:doc:24514
vulners.com/securityvulns/securityvulns:doc:24515
vulners.com/securityvulns/securityvulns:doc:24516
vulners.com/securityvulns/securityvulns:doc:24517
vulners.com/securityvulns/securityvulns:doc:24518
vulners.com/securityvulns/securityvulns:doc:24519
vulners.com/securityvulns/securityvulns:doc:24520
vulners.com/securityvulns/securityvulns:doc:24521
vulners.com/securityvulns/securityvulns:doc:24522
vulners.com/securityvulns/securityvulns:doc:24523
vulners.com/securityvulns/securityvulns:doc:24524
vulners.com/securityvulns/securityvulns:doc:24525
vulners.com/securityvulns/securityvulns:doc:24526