PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:28364
vulners.com/securityvulns/securityvulns:doc:28365
vulners.com/securityvulns/securityvulns:doc:28366
vulners.com/securityvulns/securityvulns:doc:28368
vulners.com/securityvulns/securityvulns:doc:28369
vulners.com/securityvulns/securityvulns:doc:28370
vulners.com/securityvulns/securityvulns:doc:28371
vulners.com/securityvulns/securityvulns:doc:28372
vulners.com/securityvulns/securityvulns:doc:28373
vulners.com/securityvulns/securityvulns:doc:28374
vulners.com/securityvulns/securityvulns:doc:28375
vulners.com/securityvulns/securityvulns:doc:28376
vulners.com/securityvulns/securityvulns:doc:28377
vulners.com/securityvulns/securityvulns:doc:28378
vulners.com/securityvulns/securityvulns:doc:28379
vulners.com/securityvulns/securityvulns:doc:28380
vulners.com/securityvulns/securityvulns:doc:28381
vulners.com/securityvulns/securityvulns:doc:28382