PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:17349
vulners.com/securityvulns/securityvulns:doc:17351
vulners.com/securityvulns/securityvulns:doc:17352
vulners.com/securityvulns/securityvulns:doc:17353
vulners.com/securityvulns/securityvulns:doc:17354
vulners.com/securityvulns/securityvulns:doc:17355
vulners.com/securityvulns/securityvulns:doc:17356
vulners.com/securityvulns/securityvulns:doc:17357
vulners.com/securityvulns/securityvulns:doc:17358