PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:28273
vulners.com/securityvulns/securityvulns:doc:28274
vulners.com/securityvulns/securityvulns:doc:28275
vulners.com/securityvulns/securityvulns:doc:28276
vulners.com/securityvulns/securityvulns:doc:28277
vulners.com/securityvulns/securityvulns:doc:28278
vulners.com/securityvulns/securityvulns:doc:28279
vulners.com/securityvulns/securityvulns:doc:28280
vulners.com/securityvulns/securityvulns:doc:28281
vulners.com/securityvulns/securityvulns:doc:28282