PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:31506
vulners.com/securityvulns/securityvulns:doc:31507
vulners.com/securityvulns/securityvulns:doc:31512
vulners.com/securityvulns/securityvulns:doc:31513
vulners.com/securityvulns/securityvulns:doc:31514
vulners.com/securityvulns/securityvulns:doc:31515
vulners.com/securityvulns/securityvulns:doc:31516
vulners.com/securityvulns/securityvulns:doc:31517
vulners.com/securityvulns/securityvulns:doc:31518
vulners.com/securityvulns/securityvulns:doc:31519
vulners.com/securityvulns/securityvulns:doc:31521
vulners.com/securityvulns/securityvulns:doc:31522
vulners.com/securityvulns/securityvulns:doc:31523
vulners.com/securityvulns/securityvulns:doc:31526
vulners.com/securityvulns/securityvulns:doc:31531
vulners.com/securityvulns/securityvulns:doc:31534
vulners.com/securityvulns/securityvulns:doc:31535
vulners.com/securityvulns/securityvulns:doc:31538
vulners.com/securityvulns/securityvulns:doc:31541
vulners.com/securityvulns/securityvulns:doc:31542
vulners.com/securityvulns/securityvulns:doc:31543
vulners.com/securityvulns/securityvulns:doc:31544
vulners.com/securityvulns/securityvulns:doc:31545
vulners.com/securityvulns/securityvulns:doc:31546
vulners.com/securityvulns/securityvulns:doc:31547