PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:13541
vulners.com/securityvulns/securityvulns:doc:13542
vulners.com/securityvulns/securityvulns:doc:13543
vulners.com/securityvulns/securityvulns:doc:13544
vulners.com/securityvulns/securityvulns:doc:13546
vulners.com/securityvulns/securityvulns:doc:13547
vulners.com/securityvulns/securityvulns:doc:13548
vulners.com/securityvulns/securityvulns:doc:13549
vulners.com/securityvulns/securityvulns:doc:13550
vulners.com/securityvulns/securityvulns:doc:13551
vulners.com/securityvulns/securityvulns:doc:13552
vulners.com/securityvulns/securityvulns:doc:13553
vulners.com/securityvulns/securityvulns:doc:13555
vulners.com/securityvulns/securityvulns:doc:13556
vulners.com/securityvulns/securityvulns:doc:13557
vulners.com/securityvulns/securityvulns:doc:13558
vulners.com/securityvulns/securityvulns:doc:13559
vulners.com/securityvulns/securityvulns:doc:13561
vulners.com/securityvulns/securityvulns:doc:13562
vulners.com/securityvulns/securityvulns:doc:13563
vulners.com/securityvulns/securityvulns:doc:13564
vulners.com/securityvulns/securityvulns:doc:13565
vulners.com/securityvulns/securityvulns:doc:13566
vulners.com/securityvulns/securityvulns:doc:13567
vulners.com/securityvulns/securityvulns:doc:13568
vulners.com/securityvulns/securityvulns:doc:13569
vulners.com/securityvulns/securityvulns:doc:13576
vulners.com/securityvulns/securityvulns:doc:13577
vulners.com/securityvulns/securityvulns:doc:13578
vulners.com/securityvulns/securityvulns:doc:13579
vulners.com/securityvulns/securityvulns:doc:13580
vulners.com/securityvulns/securityvulns:doc:13581
vulners.com/securityvulns/securityvulns:doc:13582
vulners.com/securityvulns/securityvulns:doc:13583
vulners.com/securityvulns/securityvulns:doc:13584
vulners.com/securityvulns/securityvulns:doc:13585
vulners.com/securityvulns/securityvulns:doc:13586
vulners.com/securityvulns/securityvulns:doc:13587
vulners.com/securityvulns/securityvulns:doc:13588
vulners.com/securityvulns/securityvulns:doc:13589
vulners.com/securityvulns/securityvulns:doc:13590
vulners.com/securityvulns/securityvulns:doc:13591
vulners.com/securityvulns/securityvulns:doc:13592
vulners.com/securityvulns/securityvulns:doc:13593
vulners.com/securityvulns/securityvulns:doc:13594
vulners.com/securityvulns/securityvulns:doc:13595
vulners.com/securityvulns/securityvulns:doc:13596
vulners.com/securityvulns/securityvulns:doc:13597
vulners.com/securityvulns/securityvulns:doc:13598
vulners.com/securityvulns/securityvulns:doc:13599
vulners.com/securityvulns/securityvulns:doc:13604
vulners.com/securityvulns/securityvulns:doc:13605
vulners.com/securityvulns/securityvulns:doc:13606