PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:27641
vulners.com/securityvulns/securityvulns:doc:27642
vulners.com/securityvulns/securityvulns:doc:27644
vulners.com/securityvulns/securityvulns:doc:27645
vulners.com/securityvulns/securityvulns:doc:27646
vulners.com/securityvulns/securityvulns:doc:27647
vulners.com/securityvulns/securityvulns:doc:27649
vulners.com/securityvulns/securityvulns:doc:27651
vulners.com/securityvulns/securityvulns:doc:27652
vulners.com/securityvulns/securityvulns:doc:27656
vulners.com/securityvulns/securityvulns:doc:27657
vulners.com/securityvulns/securityvulns:doc:27658
vulners.com/securityvulns/securityvulns:doc:27660
vulners.com/securityvulns/securityvulns:doc:27661
vulners.com/securityvulns/securityvulns:doc:27662
vulners.com/securityvulns/securityvulns:doc:27663
vulners.com/securityvulns/securityvulns:doc:27664
vulners.com/securityvulns/securityvulns:doc:27665
vulners.com/securityvulns/securityvulns:doc:27666
vulners.com/securityvulns/securityvulns:doc:27667