PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:17485
vulners.com/securityvulns/securityvulns:doc:17486
vulners.com/securityvulns/securityvulns:doc:17487
vulners.com/securityvulns/securityvulns:doc:17488
vulners.com/securityvulns/securityvulns:doc:17489
vulners.com/securityvulns/securityvulns:doc:17490
vulners.com/securityvulns/securityvulns:doc:17491
vulners.com/securityvulns/securityvulns:doc:17492
vulners.com/securityvulns/securityvulns:doc:17493
vulners.com/securityvulns/securityvulns:doc:17494
vulners.com/securityvulns/securityvulns:doc:17495
vulners.com/securityvulns/securityvulns:doc:17504
vulners.com/securityvulns/securityvulns:doc:17506
vulners.com/securityvulns/securityvulns:doc:17507
vulners.com/securityvulns/securityvulns:doc:17508