PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:16754
vulners.com/securityvulns/securityvulns:doc:16755
vulners.com/securityvulns/securityvulns:doc:16756
vulners.com/securityvulns/securityvulns:doc:16757
vulners.com/securityvulns/securityvulns:doc:16758
vulners.com/securityvulns/securityvulns:doc:16759
vulners.com/securityvulns/securityvulns:doc:16760
vulners.com/securityvulns/securityvulns:doc:16761
vulners.com/securityvulns/securityvulns:doc:16762
vulners.com/securityvulns/securityvulns:doc:16763
vulners.com/securityvulns/securityvulns:doc:16764
vulners.com/securityvulns/securityvulns:doc:16765
vulners.com/securityvulns/securityvulns:doc:16766
vulners.com/securityvulns/securityvulns:doc:16767
vulners.com/securityvulns/securityvulns:doc:16768
vulners.com/securityvulns/securityvulns:doc:16769
vulners.com/securityvulns/securityvulns:doc:16770
vulners.com/securityvulns/securityvulns:doc:16771
vulners.com/securityvulns/securityvulns:doc:16772
vulners.com/securityvulns/securityvulns:doc:16773
vulners.com/securityvulns/securityvulns:doc:16774
vulners.com/securityvulns/securityvulns:doc:16775
vulners.com/securityvulns/securityvulns:doc:16776
vulners.com/securityvulns/securityvulns:doc:16777
vulners.com/securityvulns/securityvulns:doc:16778
vulners.com/securityvulns/securityvulns:doc:16779
vulners.com/securityvulns/securityvulns:doc:16780
vulners.com/securityvulns/securityvulns:doc:16781
vulners.com/securityvulns/securityvulns:doc:16782
vulners.com/securityvulns/securityvulns:doc:16783
vulners.com/securityvulns/securityvulns:doc:16784
vulners.com/securityvulns/securityvulns:doc:16785