PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:28689
vulners.com/securityvulns/securityvulns:doc:28690
vulners.com/securityvulns/securityvulns:doc:28691
vulners.com/securityvulns/securityvulns:doc:28692
vulners.com/securityvulns/securityvulns:doc:28693
vulners.com/securityvulns/securityvulns:doc:28694
vulners.com/securityvulns/securityvulns:doc:28695
vulners.com/securityvulns/securityvulns:doc:28696
vulners.com/securityvulns/securityvulns:doc:28697
vulners.com/securityvulns/securityvulns:doc:28698
vulners.com/securityvulns/securityvulns:doc:28699
vulners.com/securityvulns/securityvulns:doc:28704
vulners.com/securityvulns/securityvulns:doc:28708
vulners.com/securityvulns/securityvulns:doc:28709
vulners.com/securityvulns/securityvulns:doc:28713