PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15628
vulners.com/securityvulns/securityvulns:doc:15629
vulners.com/securityvulns/securityvulns:doc:15630
vulners.com/securityvulns/securityvulns:doc:15631
vulners.com/securityvulns/securityvulns:doc:15632
vulners.com/securityvulns/securityvulns:doc:15633
vulners.com/securityvulns/securityvulns:doc:15634
vulners.com/securityvulns/securityvulns:doc:15635
vulners.com/securityvulns/securityvulns:doc:15636
vulners.com/securityvulns/securityvulns:doc:15637
vulners.com/securityvulns/securityvulns:doc:15638
vulners.com/securityvulns/securityvulns:doc:15639
vulners.com/securityvulns/securityvulns:doc:15640
vulners.com/securityvulns/securityvulns:doc:15641
vulners.com/securityvulns/securityvulns:doc:15643
vulners.com/securityvulns/securityvulns:doc:15644
vulners.com/securityvulns/securityvulns:doc:15650