PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15163
vulners.com/securityvulns/securityvulns:doc:15164
vulners.com/securityvulns/securityvulns:doc:15165
vulners.com/securityvulns/securityvulns:doc:15166
vulners.com/securityvulns/securityvulns:doc:15167
vulners.com/securityvulns/securityvulns:doc:15168
vulners.com/securityvulns/securityvulns:doc:15169
vulners.com/securityvulns/securityvulns:doc:15170
vulners.com/securityvulns/securityvulns:doc:15171
vulners.com/securityvulns/securityvulns:doc:15172
vulners.com/securityvulns/securityvulns:doc:15173
vulners.com/securityvulns/securityvulns:doc:15174
vulners.com/securityvulns/securityvulns:doc:15175
vulners.com/securityvulns/securityvulns:doc:15176
vulners.com/securityvulns/securityvulns:doc:15177
vulners.com/securityvulns/securityvulns:doc:15178
vulners.com/securityvulns/securityvulns:doc:15179
vulners.com/securityvulns/securityvulns:doc:15180
vulners.com/securityvulns/securityvulns:doc:15181
vulners.com/securityvulns/securityvulns:doc:15182
vulners.com/securityvulns/securityvulns:doc:15183
vulners.com/securityvulns/securityvulns:doc:15184
vulners.com/securityvulns/securityvulns:doc:15185
vulners.com/securityvulns/securityvulns:doc:15186
vulners.com/securityvulns/securityvulns:doc:15187
vulners.com/securityvulns/securityvulns:doc:15188
vulners.com/securityvulns/securityvulns:doc:15189
vulners.com/securityvulns/securityvulns:doc:15190
vulners.com/securityvulns/securityvulns:doc:15191
vulners.com/securityvulns/securityvulns:doc:15194
vulners.com/securityvulns/securityvulns:doc:15197
vulners.com/securityvulns/securityvulns:doc:15198
vulners.com/securityvulns/securityvulns:doc:15199