PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:29552
vulners.com/securityvulns/securityvulns:doc:29553
vulners.com/securityvulns/securityvulns:doc:29554
vulners.com/securityvulns/securityvulns:doc:29555
vulners.com/securityvulns/securityvulns:doc:29556
vulners.com/securityvulns/securityvulns:doc:29557
vulners.com/securityvulns/securityvulns:doc:29558
vulners.com/securityvulns/securityvulns:doc:29565
vulners.com/securityvulns/securityvulns:doc:29566
vulners.com/securityvulns/securityvulns:doc:29568
vulners.com/securityvulns/securityvulns:doc:29569
vulners.com/securityvulns/securityvulns:doc:29574
vulners.com/securityvulns/securityvulns:doc:29575
vulners.com/securityvulns/securityvulns:doc:29576
vulners.com/securityvulns/securityvulns:doc:29587
vulners.com/securityvulns/securityvulns:doc:29588
vulners.com/securityvulns/securityvulns:doc:29589
vulners.com/securityvulns/securityvulns:doc:29590
vulners.com/securityvulns/securityvulns:doc:29591
vulners.com/securityvulns/securityvulns:doc:29592
vulners.com/securityvulns/securityvulns:doc:29593
vulners.com/securityvulns/securityvulns:doc:29595
vulners.com/securityvulns/securityvulns:doc:29596
vulners.com/securityvulns/securityvulns:doc:29597
vulners.com/securityvulns/securityvulns:doc:29598
vulners.com/securityvulns/securityvulns:doc:29599
vulners.com/securityvulns/securityvulns:doc:29604