PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:12515
vulners.com/securityvulns/securityvulns:doc:12516
vulners.com/securityvulns/securityvulns:doc:12517
vulners.com/securityvulns/securityvulns:doc:12518
vulners.com/securityvulns/securityvulns:doc:12519
vulners.com/securityvulns/securityvulns:doc:12520
vulners.com/securityvulns/securityvulns:doc:12521
vulners.com/securityvulns/securityvulns:doc:12522
vulners.com/securityvulns/securityvulns:doc:12523
vulners.com/securityvulns/securityvulns:doc:12524
vulners.com/securityvulns/securityvulns:doc:12525
vulners.com/securityvulns/securityvulns:doc:12530
vulners.com/securityvulns/securityvulns:doc:12533