PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14698
vulners.com/securityvulns/securityvulns:doc:14700
vulners.com/securityvulns/securityvulns:doc:14701
vulners.com/securityvulns/securityvulns:doc:14702
vulners.com/securityvulns/securityvulns:doc:14703
vulners.com/securityvulns/securityvulns:doc:14704
vulners.com/securityvulns/securityvulns:doc:14705
vulners.com/securityvulns/securityvulns:doc:14706
vulners.com/securityvulns/securityvulns:doc:14707
vulners.com/securityvulns/securityvulns:doc:14708
vulners.com/securityvulns/securityvulns:doc:14709
vulners.com/securityvulns/securityvulns:doc:14710