PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:29945
vulners.com/securityvulns/securityvulns:doc:29946
vulners.com/securityvulns/securityvulns:doc:29948
vulners.com/securityvulns/securityvulns:doc:29949
vulners.com/securityvulns/securityvulns:doc:29950
vulners.com/securityvulns/securityvulns:doc:29951
vulners.com/securityvulns/securityvulns:doc:29952
vulners.com/securityvulns/securityvulns:doc:29953
vulners.com/securityvulns/securityvulns:doc:29954
vulners.com/securityvulns/securityvulns:doc:29955
vulners.com/securityvulns/securityvulns:doc:29956
vulners.com/securityvulns/securityvulns:doc:29968
vulners.com/securityvulns/securityvulns:doc:29973