PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:10942
vulners.com/securityvulns/securityvulns:doc:10943
vulners.com/securityvulns/securityvulns:doc:10944
vulners.com/securityvulns/securityvulns:doc:10945
vulners.com/securityvulns/securityvulns:doc:10946
vulners.com/securityvulns/securityvulns:doc:10947
vulners.com/securityvulns/securityvulns:doc:10948
vulners.com/securityvulns/securityvulns:doc:10949
vulners.com/securityvulns/securityvulns:doc:10956
vulners.com/securityvulns/securityvulns:doc:10957
vulners.com/securityvulns/securityvulns:doc:10961
vulners.com/securityvulns/securityvulns:doc:10962
vulners.com/securityvulns/securityvulns:doc:10963