PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11670
vulners.com/securityvulns/securityvulns:doc:11671
vulners.com/securityvulns/securityvulns:doc:11672
vulners.com/securityvulns/securityvulns:doc:11673
vulners.com/securityvulns/securityvulns:doc:11674
vulners.com/securityvulns/securityvulns:doc:11675
vulners.com/securityvulns/securityvulns:doc:11676
vulners.com/securityvulns/securityvulns:doc:11677
vulners.com/securityvulns/securityvulns:doc:11678
vulners.com/securityvulns/securityvulns:doc:11679
vulners.com/securityvulns/securityvulns:doc:11683
vulners.com/securityvulns/securityvulns:doc:11684
vulners.com/securityvulns/securityvulns:doc:11685
vulners.com/securityvulns/securityvulns:doc:11687
vulners.com/securityvulns/securityvulns:doc:11690