PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:31219
vulners.com/securityvulns/securityvulns:doc:31220
vulners.com/securityvulns/securityvulns:doc:31221
vulners.com/securityvulns/securityvulns:doc:31222
vulners.com/securityvulns/securityvulns:doc:31223
vulners.com/securityvulns/securityvulns:doc:31224
vulners.com/securityvulns/securityvulns:doc:31225
vulners.com/securityvulns/securityvulns:doc:31226
vulners.com/securityvulns/securityvulns:doc:31227
vulners.com/securityvulns/securityvulns:doc:31231
vulners.com/securityvulns/securityvulns:doc:31232
vulners.com/securityvulns/securityvulns:doc:31233
vulners.com/securityvulns/securityvulns:doc:31234
vulners.com/securityvulns/securityvulns:doc:31235
vulners.com/securityvulns/securityvulns:doc:31236
vulners.com/securityvulns/securityvulns:doc:31238
vulners.com/securityvulns/securityvulns:doc:31239
vulners.com/securityvulns/securityvulns:doc:31240
vulners.com/securityvulns/securityvulns:doc:31242
vulners.com/securityvulns/securityvulns:doc:31243
vulners.com/securityvulns/securityvulns:doc:31244
vulners.com/securityvulns/securityvulns:doc:31245
vulners.com/securityvulns/securityvulns:doc:31246
vulners.com/securityvulns/securityvulns:doc:31247
vulners.com/securityvulns/securityvulns:doc:31248
vulners.com/securityvulns/securityvulns:doc:31249
vulners.com/securityvulns/securityvulns:doc:31250
vulners.com/securityvulns/securityvulns:doc:31251
vulners.com/securityvulns/securityvulns:doc:31252
vulners.com/securityvulns/securityvulns:doc:31253