PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11273
vulners.com/securityvulns/securityvulns:doc:11274
vulners.com/securityvulns/securityvulns:doc:11275
vulners.com/securityvulns/securityvulns:doc:11276
vulners.com/securityvulns/securityvulns:doc:11277
vulners.com/securityvulns/securityvulns:doc:11280
vulners.com/securityvulns/securityvulns:doc:11281
vulners.com/securityvulns/securityvulns:doc:11282
vulners.com/securityvulns/securityvulns:doc:11283
vulners.com/securityvulns/securityvulns:doc:11284
vulners.com/securityvulns/securityvulns:doc:11288
vulners.com/securityvulns/securityvulns:doc:11289
vulners.com/securityvulns/securityvulns:doc:11290
vulners.com/securityvulns/securityvulns:doc:11291