PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:26955
vulners.com/securityvulns/securityvulns:doc:26956
vulners.com/securityvulns/securityvulns:doc:26957
vulners.com/securityvulns/securityvulns:doc:26958
vulners.com/securityvulns/securityvulns:doc:26959
vulners.com/securityvulns/securityvulns:doc:26960
vulners.com/securityvulns/securityvulns:doc:26961
vulners.com/securityvulns/securityvulns:doc:26962
vulners.com/securityvulns/securityvulns:doc:26963
vulners.com/securityvulns/securityvulns:doc:26964
vulners.com/securityvulns/securityvulns:doc:26965
vulners.com/securityvulns/securityvulns:doc:26966
vulners.com/securityvulns/securityvulns:doc:26967
vulners.com/securityvulns/securityvulns:doc:26968