PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14050
vulners.com/securityvulns/securityvulns:doc:14051
vulners.com/securityvulns/securityvulns:doc:14052
vulners.com/securityvulns/securityvulns:doc:14053
vulners.com/securityvulns/securityvulns:doc:14054
vulners.com/securityvulns/securityvulns:doc:14055
vulners.com/securityvulns/securityvulns:doc:14056
vulners.com/securityvulns/securityvulns:doc:14057
vulners.com/securityvulns/securityvulns:doc:14058
vulners.com/securityvulns/securityvulns:doc:14059
vulners.com/securityvulns/securityvulns:doc:14060
vulners.com/securityvulns/securityvulns:doc:14063
vulners.com/securityvulns/securityvulns:doc:14064
vulners.com/securityvulns/securityvulns:doc:14065
vulners.com/securityvulns/securityvulns:doc:14066