PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:16281
vulners.com/securityvulns/securityvulns:doc:16283
vulners.com/securityvulns/securityvulns:doc:16284
vulners.com/securityvulns/securityvulns:doc:16286
vulners.com/securityvulns/securityvulns:doc:16287
vulners.com/securityvulns/securityvulns:doc:16288
vulners.com/securityvulns/securityvulns:doc:16291
vulners.com/securityvulns/securityvulns:doc:16294
vulners.com/securityvulns/securityvulns:doc:16295
vulners.com/securityvulns/securityvulns:doc:16296