PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11750
vulners.com/securityvulns/securityvulns:doc:11751
vulners.com/securityvulns/securityvulns:doc:11752
vulners.com/securityvulns/securityvulns:doc:11753
vulners.com/securityvulns/securityvulns:doc:11754
vulners.com/securityvulns/securityvulns:doc:11755
vulners.com/securityvulns/securityvulns:doc:11756
vulners.com/securityvulns/securityvulns:doc:11757
vulners.com/securityvulns/securityvulns:doc:11758
vulners.com/securityvulns/securityvulns:doc:11762
vulners.com/securityvulns/securityvulns:doc:11763
vulners.com/securityvulns/securityvulns:doc:11764
vulners.com/securityvulns/securityvulns:doc:11767
vulners.com/securityvulns/securityvulns:doc:11768