PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15600
vulners.com/securityvulns/securityvulns:doc:15601
vulners.com/securityvulns/securityvulns:doc:15602
vulners.com/securityvulns/securityvulns:doc:15603
vulners.com/securityvulns/securityvulns:doc:15604
vulners.com/securityvulns/securityvulns:doc:15605
vulners.com/securityvulns/securityvulns:doc:15606
vulners.com/securityvulns/securityvulns:doc:15607
vulners.com/securityvulns/securityvulns:doc:15608