PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:17751
vulners.com/securityvulns/securityvulns:doc:17752
vulners.com/securityvulns/securityvulns:doc:17753
vulners.com/securityvulns/securityvulns:doc:17754
vulners.com/securityvulns/securityvulns:doc:17755
vulners.com/securityvulns/securityvulns:doc:17756
vulners.com/securityvulns/securityvulns:doc:17757
vulners.com/securityvulns/securityvulns:doc:17758
vulners.com/securityvulns/securityvulns:doc:17759
vulners.com/securityvulns/securityvulns:doc:17760
vulners.com/securityvulns/securityvulns:doc:17761