PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:31164
vulners.com/securityvulns/securityvulns:doc:31165
vulners.com/securityvulns/securityvulns:doc:31166
vulners.com/securityvulns/securityvulns:doc:31167
vulners.com/securityvulns/securityvulns:doc:31168
vulners.com/securityvulns/securityvulns:doc:31169
vulners.com/securityvulns/securityvulns:doc:31170
vulners.com/securityvulns/securityvulns:doc:31171
vulners.com/securityvulns/securityvulns:doc:31172
vulners.com/securityvulns/securityvulns:doc:31173
vulners.com/securityvulns/securityvulns:doc:31174
vulners.com/securityvulns/securityvulns:doc:31176
vulners.com/securityvulns/securityvulns:doc:31179
vulners.com/securityvulns/securityvulns:doc:31180
vulners.com/securityvulns/securityvulns:doc:31181
vulners.com/securityvulns/securityvulns:doc:31182
vulners.com/securityvulns/securityvulns:doc:31183
vulners.com/securityvulns/securityvulns:doc:31184
vulners.com/securityvulns/securityvulns:doc:31185
vulners.com/securityvulns/securityvulns:doc:31188
vulners.com/securityvulns/securityvulns:doc:31189
vulners.com/securityvulns/securityvulns:doc:31190
vulners.com/securityvulns/securityvulns:doc:31191
vulners.com/securityvulns/securityvulns:doc:31192
vulners.com/securityvulns/securityvulns:doc:31193
vulners.com/securityvulns/securityvulns:doc:31194
vulners.com/securityvulns/securityvulns:doc:31195
vulners.com/securityvulns/securityvulns:doc:31196
vulners.com/securityvulns/securityvulns:doc:31197
vulners.com/securityvulns/securityvulns:doc:31198
vulners.com/securityvulns/securityvulns:doc:31201
vulners.com/securityvulns/securityvulns:doc:31202
vulners.com/securityvulns/securityvulns:doc:31203
vulners.com/securityvulns/securityvulns:doc:31210
vulners.com/securityvulns/securityvulns:doc:31211