PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:12176
vulners.com/securityvulns/securityvulns:doc:12177
vulners.com/securityvulns/securityvulns:doc:12178
vulners.com/securityvulns/securityvulns:doc:12179
vulners.com/securityvulns/securityvulns:doc:12180
vulners.com/securityvulns/securityvulns:doc:12181
vulners.com/securityvulns/securityvulns:doc:12182
vulners.com/securityvulns/securityvulns:doc:12183
vulners.com/securityvulns/securityvulns:doc:12185
vulners.com/securityvulns/securityvulns:doc:12186
vulners.com/securityvulns/securityvulns:doc:12187
vulners.com/securityvulns/securityvulns:doc:12189
vulners.com/securityvulns/securityvulns:doc:12190