PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:13082
vulners.com/securityvulns/securityvulns:doc:13083
vulners.com/securityvulns/securityvulns:doc:13084
vulners.com/securityvulns/securityvulns:doc:13085
vulners.com/securityvulns/securityvulns:doc:13086
vulners.com/securityvulns/securityvulns:doc:13087
vulners.com/securityvulns/securityvulns:doc:13088
vulners.com/securityvulns/securityvulns:doc:13089
vulners.com/securityvulns/securityvulns:doc:13090
vulners.com/securityvulns/securityvulns:doc:13091
vulners.com/securityvulns/securityvulns:doc:13092
vulners.com/securityvulns/securityvulns:doc:13093
vulners.com/securityvulns/securityvulns:doc:13094
vulners.com/securityvulns/securityvulns:doc:13095
vulners.com/securityvulns/securityvulns:doc:13096