PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:25722
vulners.com/securityvulns/securityvulns:doc:25724
vulners.com/securityvulns/securityvulns:doc:25725
vulners.com/securityvulns/securityvulns:doc:25726
vulners.com/securityvulns/securityvulns:doc:25727
vulners.com/securityvulns/securityvulns:doc:25728
vulners.com/securityvulns/securityvulns:doc:25729
vulners.com/securityvulns/securityvulns:doc:25730
vulners.com/securityvulns/securityvulns:doc:25731
vulners.com/securityvulns/securityvulns:doc:25732
vulners.com/securityvulns/securityvulns:doc:25733
vulners.com/securityvulns/securityvulns:doc:25734