PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:29311
vulners.com/securityvulns/securityvulns:doc:29312
vulners.com/securityvulns/securityvulns:doc:29313
vulners.com/securityvulns/securityvulns:doc:29314
vulners.com/securityvulns/securityvulns:doc:29315
vulners.com/securityvulns/securityvulns:doc:29316
vulners.com/securityvulns/securityvulns:doc:29317
vulners.com/securityvulns/securityvulns:doc:29318
vulners.com/securityvulns/securityvulns:doc:29319
vulners.com/securityvulns/securityvulns:doc:29320
vulners.com/securityvulns/securityvulns:doc:29321
vulners.com/securityvulns/securityvulns:doc:29322
vulners.com/securityvulns/securityvulns:doc:29323
vulners.com/securityvulns/securityvulns:doc:29324
vulners.com/securityvulns/securityvulns:doc:29325
vulners.com/securityvulns/securityvulns:doc:29326
vulners.com/securityvulns/securityvulns:doc:29327
vulners.com/securityvulns/securityvulns:doc:29328
vulners.com/securityvulns/securityvulns:doc:29329
vulners.com/securityvulns/securityvulns:doc:29330
vulners.com/securityvulns/securityvulns:doc:29334
vulners.com/securityvulns/securityvulns:doc:29335
vulners.com/securityvulns/securityvulns:doc:29338
vulners.com/securityvulns/securityvulns:doc:29339
vulners.com/securityvulns/securityvulns:doc:29340
vulners.com/securityvulns/securityvulns:doc:29341
vulners.com/securityvulns/securityvulns:doc:29344
vulners.com/securityvulns/securityvulns:doc:29352
vulners.com/securityvulns/securityvulns:doc:29353
vulners.com/securityvulns/securityvulns:doc:29354
vulners.com/securityvulns/securityvulns:doc:29355
vulners.com/securityvulns/securityvulns:doc:29356
vulners.com/securityvulns/securityvulns:doc:29357
vulners.com/securityvulns/securityvulns:doc:29358
vulners.com/securityvulns/securityvulns:doc:29359
vulners.com/securityvulns/securityvulns:doc:29360
vulners.com/securityvulns/securityvulns:doc:29361
vulners.com/securityvulns/securityvulns:doc:29362
vulners.com/securityvulns/securityvulns:doc:29363
vulners.com/securityvulns/securityvulns:doc:29364
vulners.com/securityvulns/securityvulns:doc:29365
vulners.com/securityvulns/securityvulns:doc:29366
vulners.com/securityvulns/securityvulns:doc:29367
vulners.com/securityvulns/securityvulns:doc:29368
vulners.com/securityvulns/securityvulns:doc:29369
vulners.com/securityvulns/securityvulns:doc:29370
vulners.com/securityvulns/securityvulns:doc:29371
vulners.com/securityvulns/securityvulns:doc:29374