PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:12439
vulners.com/securityvulns/securityvulns:doc:12440
vulners.com/securityvulns/securityvulns:doc:12441
vulners.com/securityvulns/securityvulns:doc:12442
vulners.com/securityvulns/securityvulns:doc:12443
vulners.com/securityvulns/securityvulns:doc:12444
vulners.com/securityvulns/securityvulns:doc:12445
vulners.com/securityvulns/securityvulns:doc:12446
vulners.com/securityvulns/securityvulns:doc:12447
vulners.com/securityvulns/securityvulns:doc:12448