PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:25129
vulners.com/securityvulns/securityvulns:doc:25130
vulners.com/securityvulns/securityvulns:doc:25131
vulners.com/securityvulns/securityvulns:doc:25132
vulners.com/securityvulns/securityvulns:doc:25133
vulners.com/securityvulns/securityvulns:doc:25134
vulners.com/securityvulns/securityvulns:doc:25135
vulners.com/securityvulns/securityvulns:doc:25136
vulners.com/securityvulns/securityvulns:doc:25137
vulners.com/securityvulns/securityvulns:doc:25138
vulners.com/securityvulns/securityvulns:doc:25139
vulners.com/securityvulns/securityvulns:doc:25140
vulners.com/securityvulns/securityvulns:doc:25141
vulners.com/securityvulns/securityvulns:doc:25142
vulners.com/securityvulns/securityvulns:doc:25143
vulners.com/securityvulns/securityvulns:doc:25144
vulners.com/securityvulns/securityvulns:doc:25145
vulners.com/securityvulns/securityvulns:doc:25146
vulners.com/securityvulns/securityvulns:doc:25147