PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:25277
vulners.com/securityvulns/securityvulns:doc:25278
vulners.com/securityvulns/securityvulns:doc:25279
vulners.com/securityvulns/securityvulns:doc:25280
vulners.com/securityvulns/securityvulns:doc:25281
vulners.com/securityvulns/securityvulns:doc:25282
vulners.com/securityvulns/securityvulns:doc:25283
vulners.com/securityvulns/securityvulns:doc:25284
vulners.com/securityvulns/securityvulns:doc:25285
vulners.com/securityvulns/securityvulns:doc:25286
vulners.com/securityvulns/securityvulns:doc:25287
vulners.com/securityvulns/securityvulns:doc:25292
vulners.com/securityvulns/securityvulns:doc:25297