PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:32276
vulners.com/securityvulns/securityvulns:doc:32277
vulners.com/securityvulns/securityvulns:doc:32278
vulners.com/securityvulns/securityvulns:doc:32279
vulners.com/securityvulns/securityvulns:doc:32280
vulners.com/securityvulns/securityvulns:doc:32281
vulners.com/securityvulns/securityvulns:doc:32282
vulners.com/securityvulns/securityvulns:doc:32283
vulners.com/securityvulns/securityvulns:doc:32284
vulners.com/securityvulns/securityvulns:doc:32285
vulners.com/securityvulns/securityvulns:doc:32286
vulners.com/securityvulns/securityvulns:doc:32287
vulners.com/securityvulns/securityvulns:doc:32288
vulners.com/securityvulns/securityvulns:doc:32289
vulners.com/securityvulns/securityvulns:doc:32290
vulners.com/securityvulns/securityvulns:doc:32291
vulners.com/securityvulns/securityvulns:doc:32292
vulners.com/securityvulns/securityvulns:doc:32293
vulners.com/securityvulns/securityvulns:doc:32295
vulners.com/securityvulns/securityvulns:doc:32296
vulners.com/securityvulns/securityvulns:doc:32297
vulners.com/securityvulns/securityvulns:doc:32298
vulners.com/securityvulns/securityvulns:doc:32299
vulners.com/securityvulns/securityvulns:doc:32300
vulners.com/securityvulns/securityvulns:doc:32304