PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:24571
vulners.com/securityvulns/securityvulns:doc:24572
vulners.com/securityvulns/securityvulns:doc:24573
vulners.com/securityvulns/securityvulns:doc:24574
vulners.com/securityvulns/securityvulns:doc:24575
vulners.com/securityvulns/securityvulns:doc:24576
vulners.com/securityvulns/securityvulns:doc:24577