PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:27883
vulners.com/securityvulns/securityvulns:doc:27884
vulners.com/securityvulns/securityvulns:doc:27885
vulners.com/securityvulns/securityvulns:doc:27886
vulners.com/securityvulns/securityvulns:doc:27887
vulners.com/securityvulns/securityvulns:doc:27888
vulners.com/securityvulns/securityvulns:doc:27889
vulners.com/securityvulns/securityvulns:doc:27890
vulners.com/securityvulns/securityvulns:doc:27891
vulners.com/securityvulns/securityvulns:doc:27892
vulners.com/securityvulns/securityvulns:doc:27893
vulners.com/securityvulns/securityvulns:doc:27894
vulners.com/securityvulns/securityvulns:doc:27895
vulners.com/securityvulns/securityvulns:doc:27897
vulners.com/securityvulns/securityvulns:doc:27898
vulners.com/securityvulns/securityvulns:doc:27899
vulners.com/securityvulns/securityvulns:doc:27900
vulners.com/securityvulns/securityvulns:doc:27901
vulners.com/securityvulns/securityvulns:doc:27902
vulners.com/securityvulns/securityvulns:doc:27903
vulners.com/securityvulns/securityvulns:doc:27904
vulners.com/securityvulns/securityvulns:doc:27905
vulners.com/securityvulns/securityvulns:doc:27906
vulners.com/securityvulns/securityvulns:doc:27907
vulners.com/securityvulns/securityvulns:doc:27908
vulners.com/securityvulns/securityvulns:doc:27909
vulners.com/securityvulns/securityvulns:doc:27910
vulners.com/securityvulns/securityvulns:doc:27911
vulners.com/securityvulns/securityvulns:doc:27912
vulners.com/securityvulns/securityvulns:doc:27913
vulners.com/securityvulns/securityvulns:doc:27914
vulners.com/securityvulns/securityvulns:doc:27916
vulners.com/securityvulns/securityvulns:doc:27917
vulners.com/securityvulns/securityvulns:doc:27918