PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:31345
vulners.com/securityvulns/securityvulns:doc:31346
vulners.com/securityvulns/securityvulns:doc:31347
vulners.com/securityvulns/securityvulns:doc:31348
vulners.com/securityvulns/securityvulns:doc:31349
vulners.com/securityvulns/securityvulns:doc:31350
vulners.com/securityvulns/securityvulns:doc:31351
vulners.com/securityvulns/securityvulns:doc:31352
vulners.com/securityvulns/securityvulns:doc:31353
vulners.com/securityvulns/securityvulns:doc:31354
vulners.com/securityvulns/securityvulns:doc:31355
vulners.com/securityvulns/securityvulns:doc:31356
vulners.com/securityvulns/securityvulns:doc:31357
vulners.com/securityvulns/securityvulns:doc:31358
vulners.com/securityvulns/securityvulns:doc:31359
vulners.com/securityvulns/securityvulns:doc:31360