PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:13953
vulners.com/securityvulns/securityvulns:doc:13954
vulners.com/securityvulns/securityvulns:doc:13955
vulners.com/securityvulns/securityvulns:doc:13956
vulners.com/securityvulns/securityvulns:doc:13957
vulners.com/securityvulns/securityvulns:doc:13958
vulners.com/securityvulns/securityvulns:doc:13959
vulners.com/securityvulns/securityvulns:doc:13960
vulners.com/securityvulns/securityvulns:doc:13961
vulners.com/securityvulns/securityvulns:doc:13962
vulners.com/securityvulns/securityvulns:doc:13963
vulners.com/securityvulns/securityvulns:doc:13964
vulners.com/securityvulns/securityvulns:doc:13965
vulners.com/securityvulns/securityvulns:doc:13966
vulners.com/securityvulns/securityvulns:doc:13967
vulners.com/securityvulns/securityvulns:doc:13968
vulners.com/securityvulns/securityvulns:doc:13969
vulners.com/securityvulns/securityvulns:doc:13970
vulners.com/securityvulns/securityvulns:doc:13971
vulners.com/securityvulns/securityvulns:doc:13972
vulners.com/securityvulns/securityvulns:doc:13973
vulners.com/securityvulns/securityvulns:doc:13976
vulners.com/securityvulns/securityvulns:doc:13979
vulners.com/securityvulns/securityvulns:doc:13980
vulners.com/securityvulns/securityvulns:doc:13981
vulners.com/securityvulns/securityvulns:doc:13982
vulners.com/securityvulns/securityvulns:doc:13983
vulners.com/securityvulns/securityvulns:doc:13984
vulners.com/securityvulns/securityvulns:doc:13985
vulners.com/securityvulns/securityvulns:doc:13986
vulners.com/securityvulns/securityvulns:doc:13987
vulners.com/securityvulns/securityvulns:doc:13988
vulners.com/securityvulns/securityvulns:doc:13989
vulners.com/securityvulns/securityvulns:doc:13994
vulners.com/securityvulns/securityvulns:doc:13995
vulners.com/securityvulns/securityvulns:doc:13996
vulners.com/securityvulns/securityvulns:doc:13998
vulners.com/securityvulns/securityvulns:doc:14017
vulners.com/securityvulns/securityvulns:doc:14018
vulners.com/securityvulns/securityvulns:doc:14019
vulners.com/securityvulns/securityvulns:doc:14020
vulners.com/securityvulns/securityvulns:doc:14021
vulners.com/securityvulns/securityvulns:doc:14024
vulners.com/securityvulns/securityvulns:doc:14025
vulners.com/securityvulns/securityvulns:doc:14026
vulners.com/securityvulns/securityvulns:doc:14027