PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:9472
vulners.com/securityvulns/securityvulns:doc:9473
vulners.com/securityvulns/securityvulns:doc:9474
vulners.com/securityvulns/securityvulns:doc:9476
vulners.com/securityvulns/securityvulns:doc:9478
vulners.com/securityvulns/securityvulns:doc:9479
vulners.com/securityvulns/securityvulns:doc:9480
vulners.com/securityvulns/securityvulns:doc:9481
vulners.com/securityvulns/securityvulns:doc:9482
vulners.com/securityvulns/securityvulns:doc:9483
vulners.com/securityvulns/securityvulns:doc:9484
vulners.com/securityvulns/securityvulns:doc:9485
vulners.com/securityvulns/securityvulns:doc:9486
vulners.com/securityvulns/securityvulns:doc:9487
vulners.com/securityvulns/securityvulns:doc:9488
vulners.com/securityvulns/securityvulns:doc:9494
vulners.com/securityvulns/securityvulns:doc:9499
vulners.com/securityvulns/securityvulns:doc:9501
vulners.com/securityvulns/securityvulns:doc:9503
vulners.com/securityvulns/securityvulns:doc:9505
vulners.com/securityvulns/securityvulns:doc:9506
vulners.com/securityvulns/securityvulns:doc:9507
vulners.com/securityvulns/securityvulns:doc:9508
vulners.com/securityvulns/securityvulns:doc:9511
vulners.com/securityvulns/securityvulns:doc:9512
vulners.com/securityvulns/securityvulns:doc:9513
vulners.com/securityvulns/securityvulns:doc:9519
vulners.com/securityvulns/securityvulns:doc:9520
vulners.com/securityvulns/securityvulns:doc:9524
vulners.com/securityvulns/securityvulns:doc:9526
vulners.com/securityvulns/securityvulns:doc:9527
vulners.com/securityvulns/securityvulns:doc:9528
vulners.com/securityvulns/securityvulns:doc:9531
vulners.com/securityvulns/securityvulns:doc:9532
vulners.com/securityvulns/securityvulns:doc:9533
vulners.com/securityvulns/securityvulns:doc:9535
vulners.com/securityvulns/securityvulns:doc:9538
vulners.com/securityvulns/securityvulns:doc:9539
vulners.com/securityvulns/securityvulns:doc:9540