PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11506
vulners.com/securityvulns/securityvulns:doc:11507
vulners.com/securityvulns/securityvulns:doc:11508
vulners.com/securityvulns/securityvulns:doc:11509
vulners.com/securityvulns/securityvulns:doc:11510
vulners.com/securityvulns/securityvulns:doc:11511
vulners.com/securityvulns/securityvulns:doc:11512
vulners.com/securityvulns/securityvulns:doc:11513
vulners.com/securityvulns/securityvulns:doc:11514
vulners.com/securityvulns/securityvulns:doc:11515
vulners.com/securityvulns/securityvulns:doc:11518
vulners.com/securityvulns/securityvulns:doc:11523