PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14593
vulners.com/securityvulns/securityvulns:doc:14594
vulners.com/securityvulns/securityvulns:doc:14595
vulners.com/securityvulns/securityvulns:doc:14596
vulners.com/securityvulns/securityvulns:doc:14597
vulners.com/securityvulns/securityvulns:doc:14598
vulners.com/securityvulns/securityvulns:doc:14599
vulners.com/securityvulns/securityvulns:doc:14600
vulners.com/securityvulns/securityvulns:doc:14603
vulners.com/securityvulns/securityvulns:doc:14604
vulners.com/securityvulns/securityvulns:doc:14605
vulners.com/securityvulns/securityvulns:doc:14606
vulners.com/securityvulns/securityvulns:doc:14607