PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15691
vulners.com/securityvulns/securityvulns:doc:15692
vulners.com/securityvulns/securityvulns:doc:15693
vulners.com/securityvulns/securityvulns:doc:15694
vulners.com/securityvulns/securityvulns:doc:15695
vulners.com/securityvulns/securityvulns:doc:15696
vulners.com/securityvulns/securityvulns:doc:15698
vulners.com/securityvulns/securityvulns:doc:15704
vulners.com/securityvulns/securityvulns:doc:15705
vulners.com/securityvulns/securityvulns:doc:15706
vulners.com/securityvulns/securityvulns:doc:15707
vulners.com/securityvulns/securityvulns:doc:15708
vulners.com/securityvulns/securityvulns:doc:15709
vulners.com/securityvulns/securityvulns:doc:15710
vulners.com/securityvulns/securityvulns:doc:15711