PHP inclusions, SQL injections, directory traversals, crossite scripting, spam sending, etc.
vulners.com/securityvulns/securityvulns:doc:7813
vulners.com/securityvulns/securityvulns:doc:7814
vulners.com/securityvulns/securityvulns:doc:7817
vulners.com/securityvulns/securityvulns:doc:7819
vulners.com/securityvulns/securityvulns:doc:7820
vulners.com/securityvulns/securityvulns:doc:7821
vulners.com/securityvulns/securityvulns:doc:7822
vulners.com/securityvulns/securityvulns:doc:7823
vulners.com/securityvulns/securityvulns:doc:7824
vulners.com/securityvulns/securityvulns:doc:7825
vulners.com/securityvulns/securityvulns:doc:7826
vulners.com/securityvulns/securityvulns:doc:7827
vulners.com/securityvulns/securityvulns:doc:7828
vulners.com/securityvulns/securityvulns:doc:7830
vulners.com/securityvulns/securityvulns:doc:7834
vulners.com/securityvulns/securityvulns:doc:7838
vulners.com/securityvulns/securityvulns:doc:7842
vulners.com/securityvulns/securityvulns:doc:7846
vulners.com/securityvulns/securityvulns:doc:7850
vulners.com/securityvulns/securityvulns:doc:7854
vulners.com/securityvulns/securityvulns:doc:7855
vulners.com/securityvulns/securityvulns:doc:7856
vulners.com/securityvulns/securityvulns:doc:7857
vulners.com/securityvulns/securityvulns:doc:7859
vulners.com/securityvulns/securityvulns:doc:7860
vulners.com/securityvulns/securityvulns:doc:7861
vulners.com/securityvulns/securityvulns:doc:7862
vulners.com/securityvulns/securityvulns:doc:7865
vulners.com/securityvulns/securityvulns:doc:7870
vulners.com/securityvulns/securityvulns:doc:7875