PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:12257
vulners.com/securityvulns/securityvulns:doc:12258
vulners.com/securityvulns/securityvulns:doc:12259
vulners.com/securityvulns/securityvulns:doc:12260
vulners.com/securityvulns/securityvulns:doc:12261
vulners.com/securityvulns/securityvulns:doc:12262
vulners.com/securityvulns/securityvulns:doc:12263
vulners.com/securityvulns/securityvulns:doc:12264
vulners.com/securityvulns/securityvulns:doc:12265
vulners.com/securityvulns/securityvulns:doc:12266
vulners.com/securityvulns/securityvulns:doc:12267
vulners.com/securityvulns/securityvulns:doc:12268
vulners.com/securityvulns/securityvulns:doc:12270
vulners.com/securityvulns/securityvulns:doc:12271