PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:25867
vulners.com/securityvulns/securityvulns:doc:25868
vulners.com/securityvulns/securityvulns:doc:25870
vulners.com/securityvulns/securityvulns:doc:25871
vulners.com/securityvulns/securityvulns:doc:25872
vulners.com/securityvulns/securityvulns:doc:25873
vulners.com/securityvulns/securityvulns:doc:25874
vulners.com/securityvulns/securityvulns:doc:25875
vulners.com/securityvulns/securityvulns:doc:25876
vulners.com/securityvulns/securityvulns:doc:25877
vulners.com/securityvulns/securityvulns:doc:25878
vulners.com/securityvulns/securityvulns:doc:25879
vulners.com/securityvulns/securityvulns:doc:25880
vulners.com/securityvulns/securityvulns:doc:25881
vulners.com/securityvulns/securityvulns:doc:25882
vulners.com/securityvulns/securityvulns:doc:25883
vulners.com/securityvulns/securityvulns:doc:25884
vulners.com/securityvulns/securityvulns:doc:25885