PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15908
vulners.com/securityvulns/securityvulns:doc:15909
vulners.com/securityvulns/securityvulns:doc:15910
vulners.com/securityvulns/securityvulns:doc:15911
vulners.com/securityvulns/securityvulns:doc:15912
vulners.com/securityvulns/securityvulns:doc:15913
vulners.com/securityvulns/securityvulns:doc:15914
vulners.com/securityvulns/securityvulns:doc:15919
vulners.com/securityvulns/securityvulns:doc:15920
vulners.com/securityvulns/securityvulns:doc:15921
vulners.com/securityvulns/securityvulns:doc:15922
vulners.com/securityvulns/securityvulns:doc:15923