PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:28462
vulners.com/securityvulns/securityvulns:doc:28463
vulners.com/securityvulns/securityvulns:doc:28464
vulners.com/securityvulns/securityvulns:doc:28465
vulners.com/securityvulns/securityvulns:doc:28466
vulners.com/securityvulns/securityvulns:doc:28467
vulners.com/securityvulns/securityvulns:doc:28468
vulners.com/securityvulns/securityvulns:doc:28469
vulners.com/securityvulns/securityvulns:doc:28470
vulners.com/securityvulns/securityvulns:doc:28471
vulners.com/securityvulns/securityvulns:doc:28472
vulners.com/securityvulns/securityvulns:doc:28473
vulners.com/securityvulns/securityvulns:doc:28518