PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:28302
vulners.com/securityvulns/securityvulns:doc:28303
vulners.com/securityvulns/securityvulns:doc:28304
vulners.com/securityvulns/securityvulns:doc:28305
vulners.com/securityvulns/securityvulns:doc:28306
vulners.com/securityvulns/securityvulns:doc:28307
vulners.com/securityvulns/securityvulns:doc:28308
vulners.com/securityvulns/securityvulns:doc:28309
vulners.com/securityvulns/securityvulns:doc:28311
vulners.com/securityvulns/securityvulns:doc:28312