PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:18236
vulners.com/securityvulns/securityvulns:doc:18237
vulners.com/securityvulns/securityvulns:doc:18238
vulners.com/securityvulns/securityvulns:doc:18239
vulners.com/securityvulns/securityvulns:doc:18242
vulners.com/securityvulns/securityvulns:doc:18243
vulners.com/securityvulns/securityvulns:doc:18244
vulners.com/securityvulns/securityvulns:doc:18245