PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:23337
vulners.com/securityvulns/securityvulns:doc:23338
vulners.com/securityvulns/securityvulns:doc:23339
vulners.com/securityvulns/securityvulns:doc:23342
vulners.com/securityvulns/securityvulns:doc:23343
vulners.com/securityvulns/securityvulns:doc:23348
vulners.com/securityvulns/securityvulns:doc:23349
vulners.com/securityvulns/securityvulns:doc:23351
vulners.com/securityvulns/securityvulns:doc:23354
vulners.com/securityvulns/securityvulns:doc:23355
vulners.com/securityvulns/securityvulns:doc:23356
vulners.com/securityvulns/securityvulns:doc:23357
vulners.com/securityvulns/securityvulns:doc:23358
vulners.com/securityvulns/securityvulns:doc:23359
vulners.com/securityvulns/securityvulns:doc:23360
vulners.com/securityvulns/securityvulns:doc:23365
vulners.com/securityvulns/securityvulns:doc:23367