PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:25204
vulners.com/securityvulns/securityvulns:doc:25205
vulners.com/securityvulns/securityvulns:doc:25206
vulners.com/securityvulns/securityvulns:doc:25207
vulners.com/securityvulns/securityvulns:doc:25208
vulners.com/securityvulns/securityvulns:doc:25209
vulners.com/securityvulns/securityvulns:doc:25210
vulners.com/securityvulns/securityvulns:doc:25211
vulners.com/securityvulns/securityvulns:doc:25212
vulners.com/securityvulns/securityvulns:doc:25213
vulners.com/securityvulns/securityvulns:doc:25214
vulners.com/securityvulns/securityvulns:doc:25215
vulners.com/securityvulns/securityvulns:doc:25216
vulners.com/securityvulns/securityvulns:doc:25217
vulners.com/securityvulns/securityvulns:doc:25218
vulners.com/securityvulns/securityvulns:doc:25219
vulners.com/securityvulns/securityvulns:doc:25220
vulners.com/securityvulns/securityvulns:doc:25221
vulners.com/securityvulns/securityvulns:doc:25222
vulners.com/securityvulns/securityvulns:doc:25223
vulners.com/securityvulns/securityvulns:doc:25224
vulners.com/securityvulns/securityvulns:doc:25225
vulners.com/securityvulns/securityvulns:doc:25226
vulners.com/securityvulns/securityvulns:doc:25227
vulners.com/securityvulns/securityvulns:doc:25228
vulners.com/securityvulns/securityvulns:doc:25231