PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:26208
vulners.com/securityvulns/securityvulns:doc:26209
vulners.com/securityvulns/securityvulns:doc:26210
vulners.com/securityvulns/securityvulns:doc:26214
vulners.com/securityvulns/securityvulns:doc:26215
vulners.com/securityvulns/securityvulns:doc:26216
vulners.com/securityvulns/securityvulns:doc:26217
vulners.com/securityvulns/securityvulns:doc:26218
vulners.com/securityvulns/securityvulns:doc:26219
vulners.com/securityvulns/securityvulns:doc:26220
vulners.com/securityvulns/securityvulns:doc:26221
vulners.com/securityvulns/securityvulns:doc:26228
vulners.com/securityvulns/securityvulns:doc:26229