PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:23370
vulners.com/securityvulns/securityvulns:doc:23371
vulners.com/securityvulns/securityvulns:doc:23372
vulners.com/securityvulns/securityvulns:doc:23373
vulners.com/securityvulns/securityvulns:doc:23374
vulners.com/securityvulns/securityvulns:doc:23375
vulners.com/securityvulns/securityvulns:doc:23376
vulners.com/securityvulns/securityvulns:doc:23377
vulners.com/securityvulns/securityvulns:doc:23378
vulners.com/securityvulns/securityvulns:doc:23379
vulners.com/securityvulns/securityvulns:doc:23385
vulners.com/securityvulns/securityvulns:doc:23387
vulners.com/securityvulns/securityvulns:doc:23388
vulners.com/securityvulns/securityvulns:doc:23389