PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:23444
vulners.com/securityvulns/securityvulns:doc:23445
vulners.com/securityvulns/securityvulns:doc:23446
vulners.com/securityvulns/securityvulns:doc:23447
vulners.com/securityvulns/securityvulns:doc:23448
vulners.com/securityvulns/securityvulns:doc:23449
vulners.com/securityvulns/securityvulns:doc:23450
vulners.com/securityvulns/securityvulns:doc:23451
vulners.com/securityvulns/securityvulns:doc:23452