PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:10138
vulners.com/securityvulns/securityvulns:doc:10139
vulners.com/securityvulns/securityvulns:doc:10140
vulners.com/securityvulns/securityvulns:doc:10141
vulners.com/securityvulns/securityvulns:doc:10142
vulners.com/securityvulns/securityvulns:doc:10143
vulners.com/securityvulns/securityvulns:doc:10144
vulners.com/securityvulns/securityvulns:doc:10145
vulners.com/securityvulns/securityvulns:doc:10147
vulners.com/securityvulns/securityvulns:doc:10152
vulners.com/securityvulns/securityvulns:doc:10153
vulners.com/securityvulns/securityvulns:doc:10154
vulners.com/securityvulns/securityvulns:doc:10155
vulners.com/securityvulns/securityvulns:doc:10156
vulners.com/securityvulns/securityvulns:doc:10158
vulners.com/securityvulns/securityvulns:doc:10159
vulners.com/securityvulns/securityvulns:doc:10161
vulners.com/securityvulns/securityvulns:doc:10162
vulners.com/securityvulns/securityvulns:doc:10163
vulners.com/securityvulns/securityvulns:doc:10166
vulners.com/securityvulns/securityvulns:doc:10167
vulners.com/securityvulns/securityvulns:doc:10168
vulners.com/securityvulns/securityvulns:doc:10169
vulners.com/securityvulns/securityvulns:doc:10179
vulners.com/securityvulns/securityvulns:doc:10180
vulners.com/securityvulns/securityvulns:doc:10181
vulners.com/securityvulns/securityvulns:doc:10182
vulners.com/securityvulns/securityvulns:doc:10183
vulners.com/securityvulns/securityvulns:doc:10192
vulners.com/securityvulns/securityvulns:doc:10193
vulners.com/securityvulns/securityvulns:doc:10194
vulners.com/securityvulns/securityvulns:doc:10195
vulners.com/securityvulns/securityvulns:doc:10196
vulners.com/securityvulns/securityvulns:doc:10198
vulners.com/securityvulns/securityvulns:doc:10201
vulners.com/securityvulns/securityvulns:doc:10202
vulners.com/securityvulns/securityvulns:doc:10206
vulners.com/securityvulns/securityvulns:doc:10208
vulners.com/securityvulns/securityvulns:doc:10209