PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:12487
vulners.com/securityvulns/securityvulns:doc:12488
vulners.com/securityvulns/securityvulns:doc:12489
vulners.com/securityvulns/securityvulns:doc:12490
vulners.com/securityvulns/securityvulns:doc:12491
vulners.com/securityvulns/securityvulns:doc:12492
vulners.com/securityvulns/securityvulns:doc:12493
vulners.com/securityvulns/securityvulns:doc:12494