PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14809
vulners.com/securityvulns/securityvulns:doc:14810
vulners.com/securityvulns/securityvulns:doc:14813
vulners.com/securityvulns/securityvulns:doc:14815
vulners.com/securityvulns/securityvulns:doc:14817
vulners.com/securityvulns/securityvulns:doc:14823
vulners.com/securityvulns/securityvulns:doc:14824
vulners.com/securityvulns/securityvulns:doc:14825
vulners.com/securityvulns/securityvulns:doc:14827
vulners.com/securityvulns/securityvulns:doc:14829