PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:29513
vulners.com/securityvulns/securityvulns:doc:29514
vulners.com/securityvulns/securityvulns:doc:29515
vulners.com/securityvulns/securityvulns:doc:29516
vulners.com/securityvulns/securityvulns:doc:29517
vulners.com/securityvulns/securityvulns:doc:29518
vulners.com/securityvulns/securityvulns:doc:29519
vulners.com/securityvulns/securityvulns:doc:29520
vulners.com/securityvulns/securityvulns:doc:29521
vulners.com/securityvulns/securityvulns:doc:29522
vulners.com/securityvulns/securityvulns:doc:29523
vulners.com/securityvulns/securityvulns:doc:29524
vulners.com/securityvulns/securityvulns:doc:29525
vulners.com/securityvulns/securityvulns:doc:29526
vulners.com/securityvulns/securityvulns:doc:29527
vulners.com/securityvulns/securityvulns:doc:29528
vulners.com/securityvulns/securityvulns:doc:29529
vulners.com/securityvulns/securityvulns:doc:29530
vulners.com/securityvulns/securityvulns:doc:29531
vulners.com/securityvulns/securityvulns:doc:29532
vulners.com/securityvulns/securityvulns:doc:29533