PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:28821
vulners.com/securityvulns/securityvulns:doc:28822
vulners.com/securityvulns/securityvulns:doc:28823
vulners.com/securityvulns/securityvulns:doc:28824
vulners.com/securityvulns/securityvulns:doc:28825
vulners.com/securityvulns/securityvulns:doc:28827
vulners.com/securityvulns/securityvulns:doc:28828
vulners.com/securityvulns/securityvulns:doc:28829
vulners.com/securityvulns/securityvulns:doc:28830
vulners.com/securityvulns/securityvulns:doc:28831
vulners.com/securityvulns/securityvulns:doc:28832
vulners.com/securityvulns/securityvulns:doc:28833
vulners.com/securityvulns/securityvulns:doc:28834
vulners.com/securityvulns/securityvulns:doc:28835
vulners.com/securityvulns/securityvulns:doc:28836
vulners.com/securityvulns/securityvulns:doc:28838
vulners.com/securityvulns/securityvulns:doc:28840
vulners.com/securityvulns/securityvulns:doc:28841
vulners.com/securityvulns/securityvulns:doc:28842
vulners.com/securityvulns/securityvulns:doc:28843
vulners.com/securityvulns/securityvulns:doc:28844