PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:31627
vulners.com/securityvulns/securityvulns:doc:31628
vulners.com/securityvulns/securityvulns:doc:31629
vulners.com/securityvulns/securityvulns:doc:31630
vulners.com/securityvulns/securityvulns:doc:31631
vulners.com/securityvulns/securityvulns:doc:31632
vulners.com/securityvulns/securityvulns:doc:31633
vulners.com/securityvulns/securityvulns:doc:31634
vulners.com/securityvulns/securityvulns:doc:31635
vulners.com/securityvulns/securityvulns:doc:31636
vulners.com/securityvulns/securityvulns:doc:31637
vulners.com/securityvulns/securityvulns:doc:31638
vulners.com/securityvulns/securityvulns:doc:31639
vulners.com/securityvulns/securityvulns:doc:31641