PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:25416
vulners.com/securityvulns/securityvulns:doc:25417
vulners.com/securityvulns/securityvulns:doc:25418
vulners.com/securityvulns/securityvulns:doc:25419
vulners.com/securityvulns/securityvulns:doc:25420
vulners.com/securityvulns/securityvulns:doc:25421
vulners.com/securityvulns/securityvulns:doc:25422
vulners.com/securityvulns/securityvulns:doc:25423
vulners.com/securityvulns/securityvulns:doc:25424
vulners.com/securityvulns/securityvulns:doc:25425
vulners.com/securityvulns/securityvulns:doc:25426
vulners.com/securityvulns/securityvulns:doc:25435