PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15101
vulners.com/securityvulns/securityvulns:doc:15102
vulners.com/securityvulns/securityvulns:doc:15103
vulners.com/securityvulns/securityvulns:doc:15104
vulners.com/securityvulns/securityvulns:doc:15105
vulners.com/securityvulns/securityvulns:doc:15106
vulners.com/securityvulns/securityvulns:doc:15107
vulners.com/securityvulns/securityvulns:doc:15108
vulners.com/securityvulns/securityvulns:doc:15109
vulners.com/securityvulns/securityvulns:doc:15110
vulners.com/securityvulns/securityvulns:doc:15111
vulners.com/securityvulns/securityvulns:doc:15112
vulners.com/securityvulns/securityvulns:doc:15113
vulners.com/securityvulns/securityvulns:doc:15114
vulners.com/securityvulns/securityvulns:doc:15115
vulners.com/securityvulns/securityvulns:doc:15116
vulners.com/securityvulns/securityvulns:doc:15117
vulners.com/securityvulns/securityvulns:doc:15118
vulners.com/securityvulns/securityvulns:doc:15119
vulners.com/securityvulns/securityvulns:doc:15120
vulners.com/securityvulns/securityvulns:doc:15121
vulners.com/securityvulns/securityvulns:doc:15122
vulners.com/securityvulns/securityvulns:doc:15123