PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:31559
vulners.com/securityvulns/securityvulns:doc:31560
vulners.com/securityvulns/securityvulns:doc:31561
vulners.com/securityvulns/securityvulns:doc:31562
vulners.com/securityvulns/securityvulns:doc:31565
vulners.com/securityvulns/securityvulns:doc:31566
vulners.com/securityvulns/securityvulns:doc:31567
vulners.com/securityvulns/securityvulns:doc:31575
vulners.com/securityvulns/securityvulns:doc:31577