PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11111
vulners.com/securityvulns/securityvulns:doc:11112
vulners.com/securityvulns/securityvulns:doc:11113
vulners.com/securityvulns/securityvulns:doc:11114
vulners.com/securityvulns/securityvulns:doc:11115
vulners.com/securityvulns/securityvulns:doc:11118
vulners.com/securityvulns/securityvulns:doc:11119
vulners.com/securityvulns/securityvulns:doc:11120
vulners.com/securityvulns/securityvulns:doc:11121
vulners.com/securityvulns/securityvulns:doc:11122
vulners.com/securityvulns/securityvulns:doc:11123
vulners.com/securityvulns/securityvulns:doc:11124
vulners.com/securityvulns/securityvulns:doc:11125