PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11379
vulners.com/securityvulns/securityvulns:doc:11380
vulners.com/securityvulns/securityvulns:doc:11381
vulners.com/securityvulns/securityvulns:doc:11382
vulners.com/securityvulns/securityvulns:doc:11383
vulners.com/securityvulns/securityvulns:doc:11384
vulners.com/securityvulns/securityvulns:doc:11385
vulners.com/securityvulns/securityvulns:doc:11386
vulners.com/securityvulns/securityvulns:doc:11387
vulners.com/securityvulns/securityvulns:doc:11388
vulners.com/securityvulns/securityvulns:doc:11389
vulners.com/securityvulns/securityvulns:doc:11390
vulners.com/securityvulns/securityvulns:doc:11404
vulners.com/securityvulns/securityvulns:doc:11405
vulners.com/securityvulns/securityvulns:doc:11406
vulners.com/securityvulns/securityvulns:doc:11407
vulners.com/securityvulns/securityvulns:doc:11408
vulners.com/securityvulns/securityvulns:doc:11409
vulners.com/securityvulns/securityvulns:doc:11410
vulners.com/securityvulns/securityvulns:doc:11411