PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:25824
vulners.com/securityvulns/securityvulns:doc:25825
vulners.com/securityvulns/securityvulns:doc:25826
vulners.com/securityvulns/securityvulns:doc:25827
vulners.com/securityvulns/securityvulns:doc:25828
vulners.com/securityvulns/securityvulns:doc:25829
vulners.com/securityvulns/securityvulns:doc:25830
vulners.com/securityvulns/securityvulns:doc:25831
vulners.com/securityvulns/securityvulns:doc:25832
vulners.com/securityvulns/securityvulns:doc:25833
vulners.com/securityvulns/securityvulns:doc:25834
vulners.com/securityvulns/securityvulns:doc:25835
vulners.com/securityvulns/securityvulns:doc:25836
vulners.com/securityvulns/securityvulns:doc:25858
vulners.com/securityvulns/securityvulns:doc:25859
vulners.com/securityvulns/securityvulns:doc:25861
vulners.com/securityvulns/securityvulns:doc:25862