PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:12863
vulners.com/securityvulns/securityvulns:doc:12864
vulners.com/securityvulns/securityvulns:doc:12865
vulners.com/securityvulns/securityvulns:doc:12866
vulners.com/securityvulns/securityvulns:doc:12867
vulners.com/securityvulns/securityvulns:doc:12868
vulners.com/securityvulns/securityvulns:doc:12869
vulners.com/securityvulns/securityvulns:doc:12870
vulners.com/securityvulns/securityvulns:doc:12871
vulners.com/securityvulns/securityvulns:doc:12872
vulners.com/securityvulns/securityvulns:doc:12873
vulners.com/securityvulns/securityvulns:doc:12874
vulners.com/securityvulns/securityvulns:doc:12875
vulners.com/securityvulns/securityvulns:doc:12876
vulners.com/securityvulns/securityvulns:doc:12877
vulners.com/securityvulns/securityvulns:doc:12878
vulners.com/securityvulns/securityvulns:doc:12879
vulners.com/securityvulns/securityvulns:doc:12880
vulners.com/securityvulns/securityvulns:doc:12881
vulners.com/securityvulns/securityvulns:doc:12882
vulners.com/securityvulns/securityvulns:doc:12883
vulners.com/securityvulns/securityvulns:doc:12884
vulners.com/securityvulns/securityvulns:doc:12885
vulners.com/securityvulns/securityvulns:doc:12886
vulners.com/securityvulns/securityvulns:doc:12887
vulners.com/securityvulns/securityvulns:doc:12891
vulners.com/securityvulns/securityvulns:doc:12893
vulners.com/securityvulns/securityvulns:doc:12898