PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:10971
vulners.com/securityvulns/securityvulns:doc:10972
vulners.com/securityvulns/securityvulns:doc:10973
vulners.com/securityvulns/securityvulns:doc:10974
vulners.com/securityvulns/securityvulns:doc:10975
vulners.com/securityvulns/securityvulns:doc:10976
vulners.com/securityvulns/securityvulns:doc:10977
vulners.com/securityvulns/securityvulns:doc:10978
vulners.com/securityvulns/securityvulns:doc:10979
vulners.com/securityvulns/securityvulns:doc:10980
vulners.com/securityvulns/securityvulns:doc:10981
vulners.com/securityvulns/securityvulns:doc:10982
vulners.com/securityvulns/securityvulns:doc:10987