PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:21846
vulners.com/securityvulns/securityvulns:doc:21847
vulners.com/securityvulns/securityvulns:doc:21848
vulners.com/securityvulns/securityvulns:doc:21849
vulners.com/securityvulns/securityvulns:doc:21850
vulners.com/securityvulns/securityvulns:doc:21851
vulners.com/securityvulns/securityvulns:doc:21852
vulners.com/securityvulns/securityvulns:doc:21853
vulners.com/securityvulns/securityvulns:doc:21859
vulners.com/securityvulns/securityvulns:doc:21864
vulners.com/securityvulns/securityvulns:doc:21865
vulners.com/securityvulns/securityvulns:doc:21867