PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:30302
vulners.com/securityvulns/securityvulns:doc:30303
vulners.com/securityvulns/securityvulns:doc:30304
vulners.com/securityvulns/securityvulns:doc:30305
vulners.com/securityvulns/securityvulns:doc:30306
vulners.com/securityvulns/securityvulns:doc:30307
vulners.com/securityvulns/securityvulns:doc:30308
vulners.com/securityvulns/securityvulns:doc:30309
vulners.com/securityvulns/securityvulns:doc:30310
vulners.com/securityvulns/securityvulns:doc:30311
vulners.com/securityvulns/securityvulns:doc:30312