PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:16369
vulners.com/securityvulns/securityvulns:doc:16370
vulners.com/securityvulns/securityvulns:doc:16371
vulners.com/securityvulns/securityvulns:doc:16372
vulners.com/securityvulns/securityvulns:doc:16375
vulners.com/securityvulns/securityvulns:doc:16378
vulners.com/securityvulns/securityvulns:doc:16379
vulners.com/securityvulns/securityvulns:doc:16380
vulners.com/securityvulns/securityvulns:doc:16384
vulners.com/securityvulns/securityvulns:doc:16387
vulners.com/securityvulns/securityvulns:doc:16392
vulners.com/securityvulns/securityvulns:doc:16393
vulners.com/securityvulns/securityvulns:doc:16394
vulners.com/securityvulns/securityvulns:doc:16395
vulners.com/securityvulns/securityvulns:doc:16396
vulners.com/securityvulns/securityvulns:doc:16397
vulners.com/securityvulns/securityvulns:doc:16398