PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:27785
vulners.com/securityvulns/securityvulns:doc:27786
vulners.com/securityvulns/securityvulns:doc:27787
vulners.com/securityvulns/securityvulns:doc:27788
vulners.com/securityvulns/securityvulns:doc:27789
vulners.com/securityvulns/securityvulns:doc:27790
vulners.com/securityvulns/securityvulns:doc:27792
vulners.com/securityvulns/securityvulns:doc:27793
vulners.com/securityvulns/securityvulns:doc:27794
vulners.com/securityvulns/securityvulns:doc:27795
vulners.com/securityvulns/securityvulns:doc:27796
vulners.com/securityvulns/securityvulns:doc:27797
vulners.com/securityvulns/securityvulns:doc:27798
vulners.com/securityvulns/securityvulns:doc:27799
vulners.com/securityvulns/securityvulns:doc:27800
vulners.com/securityvulns/securityvulns:doc:27801
vulners.com/securityvulns/securityvulns:doc:27802
vulners.com/securityvulns/securityvulns:doc:27803
vulners.com/securityvulns/securityvulns:doc:27804
vulners.com/securityvulns/securityvulns:doc:27805
vulners.com/securityvulns/securityvulns:doc:27806
vulners.com/securityvulns/securityvulns:doc:27807
vulners.com/securityvulns/securityvulns:doc:27808
vulners.com/securityvulns/securityvulns:doc:27809
vulners.com/securityvulns/securityvulns:doc:27810
vulners.com/securityvulns/securityvulns:doc:27811
vulners.com/securityvulns/securityvulns:doc:27812
vulners.com/securityvulns/securityvulns:doc:27813
vulners.com/securityvulns/securityvulns:doc:27814
vulners.com/securityvulns/securityvulns:doc:27815
vulners.com/securityvulns/securityvulns:doc:27816
vulners.com/securityvulns/securityvulns:doc:27817
vulners.com/securityvulns/securityvulns:doc:27818
vulners.com/securityvulns/securityvulns:doc:27819
vulners.com/securityvulns/securityvulns:doc:27820
vulners.com/securityvulns/securityvulns:doc:27821