PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:23158
vulners.com/securityvulns/securityvulns:doc:23159
vulners.com/securityvulns/securityvulns:doc:23160
vulners.com/securityvulns/securityvulns:doc:23161
vulners.com/securityvulns/securityvulns:doc:23162
vulners.com/securityvulns/securityvulns:doc:23163
vulners.com/securityvulns/securityvulns:doc:23164
vulners.com/securityvulns/securityvulns:doc:23165
vulners.com/securityvulns/securityvulns:doc:23166
vulners.com/securityvulns/securityvulns:doc:23167
vulners.com/securityvulns/securityvulns:doc:23168
vulners.com/securityvulns/securityvulns:doc:23169
vulners.com/securityvulns/securityvulns:doc:23173
vulners.com/securityvulns/securityvulns:doc:23175
vulners.com/securityvulns/securityvulns:doc:23178
vulners.com/securityvulns/securityvulns:doc:23180