PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:29034
vulners.com/securityvulns/securityvulns:doc:29035
vulners.com/securityvulns/securityvulns:doc:29036
vulners.com/securityvulns/securityvulns:doc:29037
vulners.com/securityvulns/securityvulns:doc:29038
vulners.com/securityvulns/securityvulns:doc:29039
vulners.com/securityvulns/securityvulns:doc:29040
vulners.com/securityvulns/securityvulns:doc:29041
vulners.com/securityvulns/securityvulns:doc:29042