PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:9847
vulners.com/securityvulns/securityvulns:doc:9852
vulners.com/securityvulns/securityvulns:doc:9853
vulners.com/securityvulns/securityvulns:doc:9869
vulners.com/securityvulns/securityvulns:doc:9871
vulners.com/securityvulns/securityvulns:doc:9873
vulners.com/securityvulns/securityvulns:doc:9874
vulners.com/securityvulns/securityvulns:doc:9875
vulners.com/securityvulns/securityvulns:doc:9887
vulners.com/securityvulns/securityvulns:doc:9888