PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:28047
vulners.com/securityvulns/securityvulns:doc:28048
vulners.com/securityvulns/securityvulns:doc:28049
vulners.com/securityvulns/securityvulns:doc:28050
vulners.com/securityvulns/securityvulns:doc:28051
vulners.com/securityvulns/securityvulns:doc:28061
vulners.com/securityvulns/securityvulns:doc:28062
vulners.com/securityvulns/securityvulns:doc:28063
vulners.com/securityvulns/securityvulns:doc:28068