PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:29857
vulners.com/securityvulns/securityvulns:doc:29858
vulners.com/securityvulns/securityvulns:doc:29859
vulners.com/securityvulns/securityvulns:doc:29860
vulners.com/securityvulns/securityvulns:doc:29861
vulners.com/securityvulns/securityvulns:doc:29862
vulners.com/securityvulns/securityvulns:doc:29863
vulners.com/securityvulns/securityvulns:doc:29864
vulners.com/securityvulns/securityvulns:doc:29866
vulners.com/securityvulns/securityvulns:doc:29867
vulners.com/securityvulns/securityvulns:doc:29869
vulners.com/securityvulns/securityvulns:doc:29870
vulners.com/securityvulns/securityvulns:doc:29871