PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:9894
vulners.com/securityvulns/securityvulns:doc:9895
vulners.com/securityvulns/securityvulns:doc:9897
vulners.com/securityvulns/securityvulns:doc:9900
vulners.com/securityvulns/securityvulns:doc:9908
vulners.com/securityvulns/securityvulns:doc:9909
vulners.com/securityvulns/securityvulns:doc:9923
vulners.com/securityvulns/securityvulns:doc:9930
vulners.com/securityvulns/securityvulns:doc:9931
vulners.com/securityvulns/securityvulns:doc:9934
vulners.com/securityvulns/securityvulns:doc:9935
vulners.com/securityvulns/securityvulns:doc:9936
vulners.com/securityvulns/securityvulns:doc:9937
vulners.com/securityvulns/securityvulns:doc:9938
vulners.com/securityvulns/securityvulns:doc:9953
vulners.com/securityvulns/securityvulns:doc:9954
vulners.com/securityvulns/securityvulns:doc:9957
vulners.com/securityvulns/securityvulns:doc:9959