PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15924
vulners.com/securityvulns/securityvulns:doc:15926
vulners.com/securityvulns/securityvulns:doc:15927
vulners.com/securityvulns/securityvulns:doc:15928
vulners.com/securityvulns/securityvulns:doc:15929
vulners.com/securityvulns/securityvulns:doc:15930
vulners.com/securityvulns/securityvulns:doc:15931
vulners.com/securityvulns/securityvulns:doc:15932
vulners.com/securityvulns/securityvulns:doc:15933
vulners.com/securityvulns/securityvulns:doc:15934
vulners.com/securityvulns/securityvulns:doc:15935
vulners.com/securityvulns/securityvulns:doc:15946
vulners.com/securityvulns/securityvulns:doc:15947