PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14923
vulners.com/securityvulns/securityvulns:doc:14924
vulners.com/securityvulns/securityvulns:doc:14926
vulners.com/securityvulns/securityvulns:doc:14927
vulners.com/securityvulns/securityvulns:doc:14928
vulners.com/securityvulns/securityvulns:doc:14929
vulners.com/securityvulns/securityvulns:doc:14931
vulners.com/securityvulns/securityvulns:doc:14933
vulners.com/securityvulns/securityvulns:doc:14934
vulners.com/securityvulns/securityvulns:doc:14935
vulners.com/securityvulns/securityvulns:doc:14936