PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:13105
vulners.com/securityvulns/securityvulns:doc:13106
vulners.com/securityvulns/securityvulns:doc:13107
vulners.com/securityvulns/securityvulns:doc:13108
vulners.com/securityvulns/securityvulns:doc:13109
vulners.com/securityvulns/securityvulns:doc:13110
vulners.com/securityvulns/securityvulns:doc:13111
vulners.com/securityvulns/securityvulns:doc:13112
vulners.com/securityvulns/securityvulns:doc:13113
vulners.com/securityvulns/securityvulns:doc:13115
vulners.com/securityvulns/securityvulns:doc:13116
vulners.com/securityvulns/securityvulns:doc:13117
vulners.com/securityvulns/securityvulns:doc:13118
vulners.com/securityvulns/securityvulns:doc:13119
vulners.com/securityvulns/securityvulns:doc:13120
vulners.com/securityvulns/securityvulns:doc:13121
vulners.com/securityvulns/securityvulns:doc:13122
vulners.com/securityvulns/securityvulns:doc:13123
vulners.com/securityvulns/securityvulns:doc:13124
vulners.com/securityvulns/securityvulns:doc:13125
vulners.com/securityvulns/securityvulns:doc:13126
vulners.com/securityvulns/securityvulns:doc:13127
vulners.com/securityvulns/securityvulns:doc:13128
vulners.com/securityvulns/securityvulns:doc:13129
vulners.com/securityvulns/securityvulns:doc:13130