PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:27574
vulners.com/securityvulns/securityvulns:doc:27575
vulners.com/securityvulns/securityvulns:doc:27577
vulners.com/securityvulns/securityvulns:doc:27578
vulners.com/securityvulns/securityvulns:doc:27580
vulners.com/securityvulns/securityvulns:doc:27581
vulners.com/securityvulns/securityvulns:doc:27582
vulners.com/securityvulns/securityvulns:doc:27583
vulners.com/securityvulns/securityvulns:doc:27584
vulners.com/securityvulns/securityvulns:doc:27587
vulners.com/securityvulns/securityvulns:doc:27588
vulners.com/securityvulns/securityvulns:doc:27589
vulners.com/securityvulns/securityvulns:doc:27590
vulners.com/securityvulns/securityvulns:doc:27591
vulners.com/securityvulns/securityvulns:doc:27592