PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:26518
vulners.com/securityvulns/securityvulns:doc:26519
vulners.com/securityvulns/securityvulns:doc:26520
vulners.com/securityvulns/securityvulns:doc:26521
vulners.com/securityvulns/securityvulns:doc:26522
vulners.com/securityvulns/securityvulns:doc:26566
vulners.com/securityvulns/securityvulns:doc:26567
vulners.com/securityvulns/securityvulns:doc:26568
vulners.com/securityvulns/securityvulns:doc:26569
vulners.com/securityvulns/securityvulns:doc:26572
vulners.com/securityvulns/securityvulns:doc:26573