PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:26263
vulners.com/securityvulns/securityvulns:doc:26264
vulners.com/securityvulns/securityvulns:doc:26265
vulners.com/securityvulns/securityvulns:doc:26266
vulners.com/securityvulns/securityvulns:doc:26267
vulners.com/securityvulns/securityvulns:doc:26268
vulners.com/securityvulns/securityvulns:doc:26269
vulners.com/securityvulns/securityvulns:doc:26271
vulners.com/securityvulns/securityvulns:doc:26279
vulners.com/securityvulns/securityvulns:doc:26284
vulners.com/securityvulns/securityvulns:doc:26285
vulners.com/securityvulns/securityvulns:doc:26287