PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:25061
vulners.com/securityvulns/securityvulns:doc:25062
vulners.com/securityvulns/securityvulns:doc:25063
vulners.com/securityvulns/securityvulns:doc:25064
vulners.com/securityvulns/securityvulns:doc:25065
vulners.com/securityvulns/securityvulns:doc:25066
vulners.com/securityvulns/securityvulns:doc:25067
vulners.com/securityvulns/securityvulns:doc:25068
vulners.com/securityvulns/securityvulns:doc:25069
vulners.com/securityvulns/securityvulns:doc:25070
vulners.com/securityvulns/securityvulns:doc:25071
vulners.com/securityvulns/securityvulns:doc:25072
vulners.com/securityvulns/securityvulns:doc:25073
vulners.com/securityvulns/securityvulns:doc:25086
vulners.com/securityvulns/securityvulns:doc:25087
vulners.com/securityvulns/securityvulns:doc:25088