PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:32168
vulners.com/securityvulns/securityvulns:doc:32169
vulners.com/securityvulns/securityvulns:doc:32170
vulners.com/securityvulns/securityvulns:doc:32171
vulners.com/securityvulns/securityvulns:doc:32172
vulners.com/securityvulns/securityvulns:doc:32173
vulners.com/securityvulns/securityvulns:doc:32174
vulners.com/securityvulns/securityvulns:doc:32175
vulners.com/securityvulns/securityvulns:doc:32176
vulners.com/securityvulns/securityvulns:doc:32178
vulners.com/securityvulns/securityvulns:doc:32179
vulners.com/securityvulns/securityvulns:doc:32180
vulners.com/securityvulns/securityvulns:doc:32181
vulners.com/securityvulns/securityvulns:doc:32182
vulners.com/securityvulns/securityvulns:doc:32183
vulners.com/securityvulns/securityvulns:doc:32184
vulners.com/securityvulns/securityvulns:doc:32185
vulners.com/securityvulns/securityvulns:doc:32186
vulners.com/securityvulns/securityvulns:doc:32187
vulners.com/securityvulns/securityvulns:doc:32188
vulners.com/securityvulns/securityvulns:doc:32189
vulners.com/securityvulns/securityvulns:doc:32190
vulners.com/securityvulns/securityvulns:doc:32191
vulners.com/securityvulns/securityvulns:doc:32194
vulners.com/securityvulns/securityvulns:doc:32197
vulners.com/securityvulns/securityvulns:doc:32198
vulners.com/securityvulns/securityvulns:doc:32199
vulners.com/securityvulns/securityvulns:doc:32200
vulners.com/securityvulns/securityvulns:doc:32201