PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11553
vulners.com/securityvulns/securityvulns:doc:11554
vulners.com/securityvulns/securityvulns:doc:11555
vulners.com/securityvulns/securityvulns:doc:11556
vulners.com/securityvulns/securityvulns:doc:11557
vulners.com/securityvulns/securityvulns:doc:11558
vulners.com/securityvulns/securityvulns:doc:11559
vulners.com/securityvulns/securityvulns:doc:11560
vulners.com/securityvulns/securityvulns:doc:11566
vulners.com/securityvulns/securityvulns:doc:11571
vulners.com/securityvulns/securityvulns:doc:11572
vulners.com/securityvulns/securityvulns:doc:11574
vulners.com/securityvulns/securityvulns:doc:11575
vulners.com/securityvulns/securityvulns:doc:11576
vulners.com/securityvulns/securityvulns:doc:11577
vulners.com/securityvulns/securityvulns:doc:11579
vulners.com/securityvulns/securityvulns:doc:11580