PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11414
vulners.com/securityvulns/securityvulns:doc:11415
vulners.com/securityvulns/securityvulns:doc:11416
vulners.com/securityvulns/securityvulns:doc:11417
vulners.com/securityvulns/securityvulns:doc:11419
vulners.com/securityvulns/securityvulns:doc:11420
vulners.com/securityvulns/securityvulns:doc:11421
vulners.com/securityvulns/securityvulns:doc:11423
vulners.com/securityvulns/securityvulns:doc:11424
vulners.com/securityvulns/securityvulns:doc:11425
vulners.com/securityvulns/securityvulns:doc:11426