PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:18300
vulners.com/securityvulns/securityvulns:doc:18301
vulners.com/securityvulns/securityvulns:doc:18302
vulners.com/securityvulns/securityvulns:doc:18305
vulners.com/securityvulns/securityvulns:doc:18306
vulners.com/securityvulns/securityvulns:doc:18307
vulners.com/securityvulns/securityvulns:doc:18308
vulners.com/securityvulns/securityvulns:doc:18309