PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:12229
vulners.com/securityvulns/securityvulns:doc:12230
vulners.com/securityvulns/securityvulns:doc:12231
vulners.com/securityvulns/securityvulns:doc:12232
vulners.com/securityvulns/securityvulns:doc:12233
vulners.com/securityvulns/securityvulns:doc:12234
vulners.com/securityvulns/securityvulns:doc:12235
vulners.com/securityvulns/securityvulns:doc:12236
vulners.com/securityvulns/securityvulns:doc:12237
vulners.com/securityvulns/securityvulns:doc:12238
vulners.com/securityvulns/securityvulns:doc:12239
vulners.com/securityvulns/securityvulns:doc:12240
vulners.com/securityvulns/securityvulns:doc:12241
vulners.com/securityvulns/securityvulns:doc:12242