PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:30272
vulners.com/securityvulns/securityvulns:doc:30273
vulners.com/securityvulns/securityvulns:doc:30274
vulners.com/securityvulns/securityvulns:doc:30275
vulners.com/securityvulns/securityvulns:doc:30276
vulners.com/securityvulns/securityvulns:doc:30277
vulners.com/securityvulns/securityvulns:doc:30278
vulners.com/securityvulns/securityvulns:doc:30281
vulners.com/securityvulns/securityvulns:doc:30282
vulners.com/securityvulns/securityvulns:doc:30283
vulners.com/securityvulns/securityvulns:doc:30285
vulners.com/securityvulns/securityvulns:doc:30286
vulners.com/securityvulns/securityvulns:doc:30290
vulners.com/securityvulns/securityvulns:doc:30291