PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:26022
vulners.com/securityvulns/securityvulns:doc:26023
vulners.com/securityvulns/securityvulns:doc:26024
vulners.com/securityvulns/securityvulns:doc:26025
vulners.com/securityvulns/securityvulns:doc:26026
vulners.com/securityvulns/securityvulns:doc:26027
vulners.com/securityvulns/securityvulns:doc:26028
vulners.com/securityvulns/securityvulns:doc:26029
vulners.com/securityvulns/securityvulns:doc:26030
vulners.com/securityvulns/securityvulns:doc:26031
vulners.com/securityvulns/securityvulns:doc:26032
vulners.com/securityvulns/securityvulns:doc:26033
vulners.com/securityvulns/securityvulns:doc:26034
vulners.com/securityvulns/securityvulns:doc:26037
vulners.com/securityvulns/securityvulns:doc:26043