PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:12566
vulners.com/securityvulns/securityvulns:doc:12567
vulners.com/securityvulns/securityvulns:doc:12568
vulners.com/securityvulns/securityvulns:doc:12569
vulners.com/securityvulns/securityvulns:doc:12570
vulners.com/securityvulns/securityvulns:doc:12571
vulners.com/securityvulns/securityvulns:doc:12572
vulners.com/securityvulns/securityvulns:doc:12573
vulners.com/securityvulns/securityvulns:doc:12574
vulners.com/securityvulns/securityvulns:doc:12575
vulners.com/securityvulns/securityvulns:doc:12577
vulners.com/securityvulns/securityvulns:doc:12579