PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:29876
vulners.com/securityvulns/securityvulns:doc:29877
vulners.com/securityvulns/securityvulns:doc:29878
vulners.com/securityvulns/securityvulns:doc:29885
vulners.com/securityvulns/securityvulns:doc:29887
vulners.com/securityvulns/securityvulns:doc:29888
vulners.com/securityvulns/securityvulns:doc:29889
vulners.com/securityvulns/securityvulns:doc:29890
vulners.com/securityvulns/securityvulns:doc:29894
vulners.com/securityvulns/securityvulns:doc:29897
vulners.com/securityvulns/securityvulns:doc:29900
vulners.com/securityvulns/securityvulns:doc:29901