PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:13251
vulners.com/securityvulns/securityvulns:doc:13252
vulners.com/securityvulns/securityvulns:doc:13253
vulners.com/securityvulns/securityvulns:doc:13254
vulners.com/securityvulns/securityvulns:doc:13255
vulners.com/securityvulns/securityvulns:doc:13256
vulners.com/securityvulns/securityvulns:doc:13257
vulners.com/securityvulns/securityvulns:doc:13258
vulners.com/securityvulns/securityvulns:doc:13259
vulners.com/securityvulns/securityvulns:doc:13260
vulners.com/securityvulns/securityvulns:doc:13261
vulners.com/securityvulns/securityvulns:doc:13262
vulners.com/securityvulns/securityvulns:doc:13263
vulners.com/securityvulns/securityvulns:doc:13264
vulners.com/securityvulns/securityvulns:doc:13265
vulners.com/securityvulns/securityvulns:doc:13266
vulners.com/securityvulns/securityvulns:doc:13267
vulners.com/securityvulns/securityvulns:doc:13268