PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:19783
vulners.com/securityvulns/securityvulns:doc:19784
vulners.com/securityvulns/securityvulns:doc:19785
vulners.com/securityvulns/securityvulns:doc:19786
vulners.com/securityvulns/securityvulns:doc:19787
vulners.com/securityvulns/securityvulns:doc:19788
vulners.com/securityvulns/securityvulns:doc:19789
vulners.com/securityvulns/securityvulns:doc:19790
vulners.com/securityvulns/securityvulns:doc:19791
vulners.com/securityvulns/securityvulns:doc:19792
vulners.com/securityvulns/securityvulns:doc:19793
vulners.com/securityvulns/securityvulns:doc:19798
vulners.com/securityvulns/securityvulns:doc:19799
vulners.com/securityvulns/securityvulns:doc:19800
vulners.com/securityvulns/securityvulns:doc:19801