PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:27693
vulners.com/securityvulns/securityvulns:doc:27694
vulners.com/securityvulns/securityvulns:doc:27695
vulners.com/securityvulns/securityvulns:doc:27696
vulners.com/securityvulns/securityvulns:doc:27697
vulners.com/securityvulns/securityvulns:doc:27698
vulners.com/securityvulns/securityvulns:doc:27699
vulners.com/securityvulns/securityvulns:doc:27702
vulners.com/securityvulns/securityvulns:doc:27706
vulners.com/securityvulns/securityvulns:doc:27709
vulners.com/securityvulns/securityvulns:doc:27710