PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:27486
vulners.com/securityvulns/securityvulns:doc:27487
vulners.com/securityvulns/securityvulns:doc:27488
vulners.com/securityvulns/securityvulns:doc:27489
vulners.com/securityvulns/securityvulns:doc:27490
vulners.com/securityvulns/securityvulns:doc:27491
vulners.com/securityvulns/securityvulns:doc:27492
vulners.com/securityvulns/securityvulns:doc:27493
vulners.com/securityvulns/securityvulns:doc:27494
vulners.com/securityvulns/securityvulns:doc:27495
vulners.com/securityvulns/securityvulns:doc:27496