PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15016
vulners.com/securityvulns/securityvulns:doc:15017
vulners.com/securityvulns/securityvulns:doc:15018
vulners.com/securityvulns/securityvulns:doc:15019
vulners.com/securityvulns/securityvulns:doc:15020
vulners.com/securityvulns/securityvulns:doc:15021
vulners.com/securityvulns/securityvulns:doc:15022
vulners.com/securityvulns/securityvulns:doc:15023
vulners.com/securityvulns/securityvulns:doc:15024
vulners.com/securityvulns/securityvulns:doc:15025
vulners.com/securityvulns/securityvulns:doc:15026
vulners.com/securityvulns/securityvulns:doc:15027
vulners.com/securityvulns/securityvulns:doc:15029
vulners.com/securityvulns/securityvulns:doc:15030
vulners.com/securityvulns/securityvulns:doc:15031
vulners.com/securityvulns/securityvulns:doc:15032
vulners.com/securityvulns/securityvulns:doc:15033
vulners.com/securityvulns/securityvulns:doc:15034
vulners.com/securityvulns/securityvulns:doc:15035
vulners.com/securityvulns/securityvulns:doc:15036
vulners.com/securityvulns/securityvulns:doc:15037
vulners.com/securityvulns/securityvulns:doc:15038
vulners.com/securityvulns/securityvulns:doc:15039
vulners.com/securityvulns/securityvulns:doc:15040
vulners.com/securityvulns/securityvulns:doc:15042
vulners.com/securityvulns/securityvulns:doc:15043
vulners.com/securityvulns/securityvulns:doc:15044
vulners.com/securityvulns/securityvulns:doc:15045
vulners.com/securityvulns/securityvulns:doc:15046
vulners.com/securityvulns/securityvulns:doc:15047
vulners.com/securityvulns/securityvulns:doc:15050
vulners.com/securityvulns/securityvulns:doc:15051
vulners.com/securityvulns/securityvulns:doc:15053
vulners.com/securityvulns/securityvulns:doc:15054
vulners.com/securityvulns/securityvulns:doc:15055
vulners.com/securityvulns/securityvulns:doc:15056