PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:19266
vulners.com/securityvulns/securityvulns:doc:19267
vulners.com/securityvulns/securityvulns:doc:19268
vulners.com/securityvulns/securityvulns:doc:19269
vulners.com/securityvulns/securityvulns:doc:19270
vulners.com/securityvulns/securityvulns:doc:19271
vulners.com/securityvulns/securityvulns:doc:19272
vulners.com/securityvulns/securityvulns:doc:19273
vulners.com/securityvulns/securityvulns:doc:19274
vulners.com/securityvulns/securityvulns:doc:19275
vulners.com/securityvulns/securityvulns:doc:19276
vulners.com/securityvulns/securityvulns:doc:19277
vulners.com/securityvulns/securityvulns:doc:19278
vulners.com/securityvulns/securityvulns:doc:19279
vulners.com/securityvulns/securityvulns:doc:19281