PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:25391
vulners.com/securityvulns/securityvulns:doc:25392
vulners.com/securityvulns/securityvulns:doc:25393
vulners.com/securityvulns/securityvulns:doc:25394
vulners.com/securityvulns/securityvulns:doc:25395
vulners.com/securityvulns/securityvulns:doc:25396
vulners.com/securityvulns/securityvulns:doc:25397
vulners.com/securityvulns/securityvulns:doc:25398
vulners.com/securityvulns/securityvulns:doc:25399
vulners.com/securityvulns/securityvulns:doc:25400
vulners.com/securityvulns/securityvulns:doc:25401
vulners.com/securityvulns/securityvulns:doc:25402
vulners.com/securityvulns/securityvulns:doc:25403
vulners.com/securityvulns/securityvulns:doc:25404
vulners.com/securityvulns/securityvulns:doc:25406
vulners.com/securityvulns/securityvulns:doc:25410
vulners.com/securityvulns/securityvulns:doc:25411
vulners.com/securityvulns/securityvulns:doc:25412
vulners.com/securityvulns/securityvulns:doc:25414
vulners.com/securityvulns/securityvulns:doc:25415