PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:17279
vulners.com/securityvulns/securityvulns:doc:17280
vulners.com/securityvulns/securityvulns:doc:17281
vulners.com/securityvulns/securityvulns:doc:17282
vulners.com/securityvulns/securityvulns:doc:17283
vulners.com/securityvulns/securityvulns:doc:17284
vulners.com/securityvulns/securityvulns:doc:17285
vulners.com/securityvulns/securityvulns:doc:17286
vulners.com/securityvulns/securityvulns:doc:17287
vulners.com/securityvulns/securityvulns:doc:17288
vulners.com/securityvulns/securityvulns:doc:17289
vulners.com/securityvulns/securityvulns:doc:17290