PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:24795
vulners.com/securityvulns/securityvulns:doc:24796
vulners.com/securityvulns/securityvulns:doc:24797
vulners.com/securityvulns/securityvulns:doc:24798
vulners.com/securityvulns/securityvulns:doc:24799
vulners.com/securityvulns/securityvulns:doc:24801
vulners.com/securityvulns/securityvulns:doc:24802
vulners.com/securityvulns/securityvulns:doc:24808
vulners.com/securityvulns/securityvulns:doc:24809