PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11038
vulners.com/securityvulns/securityvulns:doc:11039
vulners.com/securityvulns/securityvulns:doc:11040
vulners.com/securityvulns/securityvulns:doc:11041
vulners.com/securityvulns/securityvulns:doc:11042
vulners.com/securityvulns/securityvulns:doc:11043
vulners.com/securityvulns/securityvulns:doc:11046
vulners.com/securityvulns/securityvulns:doc:11049
vulners.com/securityvulns/securityvulns:doc:11050
vulners.com/securityvulns/securityvulns:doc:11051
vulners.com/securityvulns/securityvulns:doc:11052
vulners.com/securityvulns/securityvulns:doc:11054
vulners.com/securityvulns/securityvulns:doc:11055