PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:26681
vulners.com/securityvulns/securityvulns:doc:26682
vulners.com/securityvulns/securityvulns:doc:26683
vulners.com/securityvulns/securityvulns:doc:26684
vulners.com/securityvulns/securityvulns:doc:26685
vulners.com/securityvulns/securityvulns:doc:26686
vulners.com/securityvulns/securityvulns:doc:26700
vulners.com/securityvulns/securityvulns:doc:26701
vulners.com/securityvulns/securityvulns:doc:26702
vulners.com/securityvulns/securityvulns:doc:26703
vulners.com/securityvulns/securityvulns:doc:26704
vulners.com/securityvulns/securityvulns:doc:26705
vulners.com/securityvulns/securityvulns:doc:26706
vulners.com/securityvulns/securityvulns:doc:26707
vulners.com/securityvulns/securityvulns:doc:26708
vulners.com/securityvulns/securityvulns:doc:26709
vulners.com/securityvulns/securityvulns:doc:26710
vulners.com/securityvulns/securityvulns:doc:26711
vulners.com/securityvulns/securityvulns:doc:26716