PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14092
vulners.com/securityvulns/securityvulns:doc:14093
vulners.com/securityvulns/securityvulns:doc:14094
vulners.com/securityvulns/securityvulns:doc:14095
vulners.com/securityvulns/securityvulns:doc:14096
vulners.com/securityvulns/securityvulns:doc:14097
vulners.com/securityvulns/securityvulns:doc:14098
vulners.com/securityvulns/securityvulns:doc:14099
vulners.com/securityvulns/securityvulns:doc:14100
vulners.com/securityvulns/securityvulns:doc:14101
vulners.com/securityvulns/securityvulns:doc:14102
vulners.com/securityvulns/securityvulns:doc:14103
vulners.com/securityvulns/securityvulns:doc:14104
vulners.com/securityvulns/securityvulns:doc:14105
vulners.com/securityvulns/securityvulns:doc:14110