PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:32085
vulners.com/securityvulns/securityvulns:doc:32086
vulners.com/securityvulns/securityvulns:doc:32087
vulners.com/securityvulns/securityvulns:doc:32088
vulners.com/securityvulns/securityvulns:doc:32089
vulners.com/securityvulns/securityvulns:doc:32090
vulners.com/securityvulns/securityvulns:doc:32091
vulners.com/securityvulns/securityvulns:doc:32092
vulners.com/securityvulns/securityvulns:doc:32093
vulners.com/securityvulns/securityvulns:doc:32094
vulners.com/securityvulns/securityvulns:doc:32095
vulners.com/securityvulns/securityvulns:doc:32097
vulners.com/securityvulns/securityvulns:doc:32098
vulners.com/securityvulns/securityvulns:doc:32099
vulners.com/securityvulns/securityvulns:doc:32100
vulners.com/securityvulns/securityvulns:doc:32101
vulners.com/securityvulns/securityvulns:doc:32102
vulners.com/securityvulns/securityvulns:doc:32103
vulners.com/securityvulns/securityvulns:doc:32104
vulners.com/securityvulns/securityvulns:doc:32105
vulners.com/securityvulns/securityvulns:doc:32106
vulners.com/securityvulns/securityvulns:doc:32107
vulners.com/securityvulns/securityvulns:doc:32108
vulners.com/securityvulns/securityvulns:doc:32109
vulners.com/securityvulns/securityvulns:doc:32110
vulners.com/securityvulns/securityvulns:doc:32111
vulners.com/securityvulns/securityvulns:doc:32113
vulners.com/securityvulns/securityvulns:doc:32119