PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:28475
vulners.com/securityvulns/securityvulns:doc:28476
vulners.com/securityvulns/securityvulns:doc:28477
vulners.com/securityvulns/securityvulns:doc:28478
vulners.com/securityvulns/securityvulns:doc:28479
vulners.com/securityvulns/securityvulns:doc:28480
vulners.com/securityvulns/securityvulns:doc:28481
vulners.com/securityvulns/securityvulns:doc:28482
vulners.com/securityvulns/securityvulns:doc:28483
vulners.com/securityvulns/securityvulns:doc:28484
vulners.com/securityvulns/securityvulns:doc:28486
vulners.com/securityvulns/securityvulns:doc:28487
vulners.com/securityvulns/securityvulns:doc:28488
vulners.com/securityvulns/securityvulns:doc:28489
vulners.com/securityvulns/securityvulns:doc:28490
vulners.com/securityvulns/securityvulns:doc:28491
vulners.com/securityvulns/securityvulns:doc:28492
vulners.com/securityvulns/securityvulns:doc:28493
vulners.com/securityvulns/securityvulns:doc:28495
vulners.com/securityvulns/securityvulns:doc:28496
vulners.com/securityvulns/securityvulns:doc:28497
vulners.com/securityvulns/securityvulns:doc:28498
vulners.com/securityvulns/securityvulns:doc:28499
vulners.com/securityvulns/securityvulns:doc:28500
vulners.com/securityvulns/securityvulns:doc:28501
vulners.com/securityvulns/securityvulns:doc:28502
vulners.com/securityvulns/securityvulns:doc:28503
vulners.com/securityvulns/securityvulns:doc:28504
vulners.com/securityvulns/securityvulns:doc:28505
vulners.com/securityvulns/securityvulns:doc:28506
vulners.com/securityvulns/securityvulns:doc:28507
vulners.com/securityvulns/securityvulns:doc:28508
vulners.com/securityvulns/securityvulns:doc:28509
vulners.com/securityvulns/securityvulns:doc:28510
vulners.com/securityvulns/securityvulns:doc:28511
vulners.com/securityvulns/securityvulns:doc:28512
vulners.com/securityvulns/securityvulns:doc:28515
vulners.com/securityvulns/securityvulns:doc:28516
vulners.com/securityvulns/securityvulns:doc:28517
vulners.com/securityvulns/securityvulns:doc:28519
vulners.com/securityvulns/securityvulns:doc:28520
vulners.com/securityvulns/securityvulns:doc:28521
vulners.com/securityvulns/securityvulns:doc:28528