PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:10010
vulners.com/securityvulns/securityvulns:doc:10011
vulners.com/securityvulns/securityvulns:doc:10014
vulners.com/securityvulns/securityvulns:doc:10015
vulners.com/securityvulns/securityvulns:doc:10019
vulners.com/securityvulns/securityvulns:doc:10020
vulners.com/securityvulns/securityvulns:doc:10021
vulners.com/securityvulns/securityvulns:doc:10022
vulners.com/securityvulns/securityvulns:doc:10023
vulners.com/securityvulns/securityvulns:doc:10025
vulners.com/securityvulns/securityvulns:doc:10026
vulners.com/securityvulns/securityvulns:doc:10027
vulners.com/securityvulns/securityvulns:doc:10028
vulners.com/securityvulns/securityvulns:doc:10029
vulners.com/securityvulns/securityvulns:doc:10030
vulners.com/securityvulns/securityvulns:doc:10031
vulners.com/securityvulns/securityvulns:doc:10032
vulners.com/securityvulns/securityvulns:doc:10033
vulners.com/securityvulns/securityvulns:doc:10034
vulners.com/securityvulns/securityvulns:doc:10037
vulners.com/securityvulns/securityvulns:doc:10039
vulners.com/securityvulns/securityvulns:doc:10042
vulners.com/securityvulns/securityvulns:doc:10044
vulners.com/securityvulns/securityvulns:doc:10045
vulners.com/securityvulns/securityvulns:doc:10046
vulners.com/securityvulns/securityvulns:doc:10048
vulners.com/securityvulns/securityvulns:doc:10049
vulners.com/securityvulns/securityvulns:doc:10050
vulners.com/securityvulns/securityvulns:doc:10051
vulners.com/securityvulns/securityvulns:doc:10052
vulners.com/securityvulns/securityvulns:doc:10053
vulners.com/securityvulns/securityvulns:doc:10054
vulners.com/securityvulns/securityvulns:doc:10056
vulners.com/securityvulns/securityvulns:doc:10057
vulners.com/securityvulns/securityvulns:doc:10058
vulners.com/securityvulns/securityvulns:doc:10063
vulners.com/securityvulns/securityvulns:doc:10066
vulners.com/securityvulns/securityvulns:doc:10067
vulners.com/securityvulns/securityvulns:doc:10069