PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:30188
vulners.com/securityvulns/securityvulns:doc:30189
vulners.com/securityvulns/securityvulns:doc:30190
vulners.com/securityvulns/securityvulns:doc:30191
vulners.com/securityvulns/securityvulns:doc:30192
vulners.com/securityvulns/securityvulns:doc:30193
vulners.com/securityvulns/securityvulns:doc:30194
vulners.com/securityvulns/securityvulns:doc:30195
vulners.com/securityvulns/securityvulns:doc:30196
vulners.com/securityvulns/securityvulns:doc:30197
vulners.com/securityvulns/securityvulns:doc:30200
vulners.com/securityvulns/securityvulns:doc:30201
vulners.com/securityvulns/securityvulns:doc:30202
vulners.com/securityvulns/securityvulns:doc:30203
vulners.com/securityvulns/securityvulns:doc:30204
vulners.com/securityvulns/securityvulns:doc:30205
vulners.com/securityvulns/securityvulns:doc:30206
vulners.com/securityvulns/securityvulns:doc:30207
vulners.com/securityvulns/securityvulns:doc:30210
vulners.com/securityvulns/securityvulns:doc:30211
vulners.com/securityvulns/securityvulns:doc:30212
vulners.com/securityvulns/securityvulns:doc:30215
vulners.com/securityvulns/securityvulns:doc:30216
vulners.com/securityvulns/securityvulns:doc:30217
vulners.com/securityvulns/securityvulns:doc:30218
vulners.com/securityvulns/securityvulns:doc:30220
vulners.com/securityvulns/securityvulns:doc:30223
vulners.com/securityvulns/securityvulns:doc:30226
vulners.com/securityvulns/securityvulns:doc:30227
vulners.com/securityvulns/securityvulns:doc:30228
vulners.com/securityvulns/securityvulns:doc:30229
vulners.com/securityvulns/securityvulns:doc:30230
vulners.com/securityvulns/securityvulns:doc:30231