PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:27191
vulners.com/securityvulns/securityvulns:doc:27192
vulners.com/securityvulns/securityvulns:doc:27193
vulners.com/securityvulns/securityvulns:doc:27194
vulners.com/securityvulns/securityvulns:doc:27195
vulners.com/securityvulns/securityvulns:doc:27196
vulners.com/securityvulns/securityvulns:doc:27197
vulners.com/securityvulns/securityvulns:doc:27198
vulners.com/securityvulns/securityvulns:doc:27199
vulners.com/securityvulns/securityvulns:doc:27200
vulners.com/securityvulns/securityvulns:doc:27201
vulners.com/securityvulns/securityvulns:doc:27202
vulners.com/securityvulns/securityvulns:doc:27203
vulners.com/securityvulns/securityvulns:doc:27204
vulners.com/securityvulns/securityvulns:doc:27205
vulners.com/securityvulns/securityvulns:doc:27206
vulners.com/securityvulns/securityvulns:doc:27207
vulners.com/securityvulns/securityvulns:doc:27208
vulners.com/securityvulns/securityvulns:doc:27209
vulners.com/securityvulns/securityvulns:doc:27210
vulners.com/securityvulns/securityvulns:doc:27211
vulners.com/securityvulns/securityvulns:doc:27212