PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15530
vulners.com/securityvulns/securityvulns:doc:15531
vulners.com/securityvulns/securityvulns:doc:15532
vulners.com/securityvulns/securityvulns:doc:15534
vulners.com/securityvulns/securityvulns:doc:15535
vulners.com/securityvulns/securityvulns:doc:15536
vulners.com/securityvulns/securityvulns:doc:15537
vulners.com/securityvulns/securityvulns:doc:15538
vulners.com/securityvulns/securityvulns:doc:15539
vulners.com/securityvulns/securityvulns:doc:15540
vulners.com/securityvulns/securityvulns:doc:15541
vulners.com/securityvulns/securityvulns:doc:15542