PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:9402
vulners.com/securityvulns/securityvulns:doc:9403
vulners.com/securityvulns/securityvulns:doc:9404
vulners.com/securityvulns/securityvulns:doc:9405
vulners.com/securityvulns/securityvulns:doc:9406
vulners.com/securityvulns/securityvulns:doc:9407
vulners.com/securityvulns/securityvulns:doc:9408
vulners.com/securityvulns/securityvulns:doc:9409
vulners.com/securityvulns/securityvulns:doc:9413
vulners.com/securityvulns/securityvulns:doc:9414
vulners.com/securityvulns/securityvulns:doc:9417
vulners.com/securityvulns/securityvulns:doc:9418
vulners.com/securityvulns/securityvulns:doc:9425
vulners.com/securityvulns/securityvulns:doc:9426
vulners.com/securityvulns/securityvulns:doc:9427
vulners.com/securityvulns/securityvulns:doc:9428
vulners.com/securityvulns/securityvulns:doc:9429
vulners.com/securityvulns/securityvulns:doc:9435
vulners.com/securityvulns/securityvulns:doc:9436
vulners.com/securityvulns/securityvulns:doc:9440
vulners.com/securityvulns/securityvulns:doc:9441
vulners.com/securityvulns/securityvulns:doc:9442
vulners.com/securityvulns/securityvulns:doc:9443
vulners.com/securityvulns/securityvulns:doc:9444
vulners.com/securityvulns/securityvulns:doc:9448
vulners.com/securityvulns/securityvulns:doc:9449
vulners.com/securityvulns/securityvulns:doc:9450
vulners.com/securityvulns/securityvulns:doc:9451
vulners.com/securityvulns/securityvulns:doc:9457
vulners.com/securityvulns/securityvulns:doc:9460
vulners.com/securityvulns/securityvulns:doc:9461
vulners.com/securityvulns/securityvulns:doc:9462
vulners.com/securityvulns/securityvulns:doc:9464
vulners.com/securityvulns/securityvulns:doc:9468
vulners.com/securityvulns/securityvulns:doc:9470
vulners.com/securityvulns/securityvulns:doc:9471