PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11939
vulners.com/securityvulns/securityvulns:doc:11940
vulners.com/securityvulns/securityvulns:doc:11941
vulners.com/securityvulns/securityvulns:doc:11942
vulners.com/securityvulns/securityvulns:doc:11943
vulners.com/securityvulns/securityvulns:doc:11944
vulners.com/securityvulns/securityvulns:doc:11945
vulners.com/securityvulns/securityvulns:doc:11946
vulners.com/securityvulns/securityvulns:doc:11947
vulners.com/securityvulns/securityvulns:doc:11948
vulners.com/securityvulns/securityvulns:doc:11949