PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:27349
vulners.com/securityvulns/securityvulns:doc:27350
vulners.com/securityvulns/securityvulns:doc:27351
vulners.com/securityvulns/securityvulns:doc:27352
vulners.com/securityvulns/securityvulns:doc:27353
vulners.com/securityvulns/securityvulns:doc:27354
vulners.com/securityvulns/securityvulns:doc:27355
vulners.com/securityvulns/securityvulns:doc:27356
vulners.com/securityvulns/securityvulns:doc:27357
vulners.com/securityvulns/securityvulns:doc:27358
vulners.com/securityvulns/securityvulns:doc:27359
vulners.com/securityvulns/securityvulns:doc:27361
vulners.com/securityvulns/securityvulns:doc:27362
vulners.com/securityvulns/securityvulns:doc:27363
vulners.com/securityvulns/securityvulns:doc:27364
vulners.com/securityvulns/securityvulns:doc:27365
vulners.com/securityvulns/securityvulns:doc:27366
vulners.com/securityvulns/securityvulns:doc:27367
vulners.com/securityvulns/securityvulns:doc:27368
vulners.com/securityvulns/securityvulns:doc:27369
vulners.com/securityvulns/securityvulns:doc:27370