PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11452
vulners.com/securityvulns/securityvulns:doc:11453
vulners.com/securityvulns/securityvulns:doc:11454
vulners.com/securityvulns/securityvulns:doc:11455
vulners.com/securityvulns/securityvulns:doc:11456
vulners.com/securityvulns/securityvulns:doc:11457
vulners.com/securityvulns/securityvulns:doc:11458
vulners.com/securityvulns/securityvulns:doc:11459
vulners.com/securityvulns/securityvulns:doc:11463
vulners.com/securityvulns/securityvulns:doc:11464
vulners.com/securityvulns/securityvulns:doc:11465
vulners.com/securityvulns/securityvulns:doc:11466
vulners.com/securityvulns/securityvulns:doc:11469
vulners.com/securityvulns/securityvulns:doc:11470
vulners.com/securityvulns/securityvulns:doc:11471
vulners.com/securityvulns/securityvulns:doc:11472
vulners.com/securityvulns/securityvulns:doc:11473
vulners.com/securityvulns/securityvulns:doc:11474
vulners.com/securityvulns/securityvulns:doc:11475
vulners.com/securityvulns/securityvulns:doc:11476