PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:23504
vulners.com/securityvulns/securityvulns:doc:23505
vulners.com/securityvulns/securityvulns:doc:23506
vulners.com/securityvulns/securityvulns:doc:23507
vulners.com/securityvulns/securityvulns:doc:23508
vulners.com/securityvulns/securityvulns:doc:23509
vulners.com/securityvulns/securityvulns:doc:23510
vulners.com/securityvulns/securityvulns:doc:23511
vulners.com/securityvulns/securityvulns:doc:23512
vulners.com/securityvulns/securityvulns:doc:23513
vulners.com/securityvulns/securityvulns:doc:23514
vulners.com/securityvulns/securityvulns:doc:23515
vulners.com/securityvulns/securityvulns:doc:23526
vulners.com/securityvulns/securityvulns:doc:23527