PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14412
vulners.com/securityvulns/securityvulns:doc:14413
vulners.com/securityvulns/securityvulns:doc:14414
vulners.com/securityvulns/securityvulns:doc:14415
vulners.com/securityvulns/securityvulns:doc:14416
vulners.com/securityvulns/securityvulns:doc:14419
vulners.com/securityvulns/securityvulns:doc:14420
vulners.com/securityvulns/securityvulns:doc:14421
vulners.com/securityvulns/securityvulns:doc:14422
vulners.com/securityvulns/securityvulns:doc:14423
vulners.com/securityvulns/securityvulns:doc:14424
vulners.com/securityvulns/securityvulns:doc:14425
vulners.com/securityvulns/securityvulns:doc:14426
vulners.com/securityvulns/securityvulns:doc:14427