PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:13807
vulners.com/securityvulns/securityvulns:doc:13809
vulners.com/securityvulns/securityvulns:doc:13810
vulners.com/securityvulns/securityvulns:doc:13811
vulners.com/securityvulns/securityvulns:doc:13812
vulners.com/securityvulns/securityvulns:doc:13814
vulners.com/securityvulns/securityvulns:doc:13815
vulners.com/securityvulns/securityvulns:doc:13818
vulners.com/securityvulns/securityvulns:doc:13819
vulners.com/securityvulns/securityvulns:doc:13820
vulners.com/securityvulns/securityvulns:doc:13821
vulners.com/securityvulns/securityvulns:doc:13822
vulners.com/securityvulns/securityvulns:doc:13824
vulners.com/securityvulns/securityvulns:doc:13825