PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:24611
vulners.com/securityvulns/securityvulns:doc:24612
vulners.com/securityvulns/securityvulns:doc:24613
vulners.com/securityvulns/securityvulns:doc:24614
vulners.com/securityvulns/securityvulns:doc:24615
vulners.com/securityvulns/securityvulns:doc:24616
vulners.com/securityvulns/securityvulns:doc:24617
vulners.com/securityvulns/securityvulns:doc:24618
vulners.com/securityvulns/securityvulns:doc:24619
vulners.com/securityvulns/securityvulns:doc:24620
vulners.com/securityvulns/securityvulns:doc:24621
vulners.com/securityvulns/securityvulns:doc:24622
vulners.com/securityvulns/securityvulns:doc:24623
vulners.com/securityvulns/securityvulns:doc:24624
vulners.com/securityvulns/securityvulns:doc:24625
vulners.com/securityvulns/securityvulns:doc:24626
vulners.com/securityvulns/securityvulns:doc:24627
vulners.com/securityvulns/securityvulns:doc:24628
vulners.com/securityvulns/securityvulns:doc:24629
vulners.com/securityvulns/securityvulns:doc:24630
vulners.com/securityvulns/securityvulns:doc:24631
vulners.com/securityvulns/securityvulns:doc:24632
vulners.com/securityvulns/securityvulns:doc:24633