PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:28759
vulners.com/securityvulns/securityvulns:doc:28760
vulners.com/securityvulns/securityvulns:doc:28761
vulners.com/securityvulns/securityvulns:doc:28762
vulners.com/securityvulns/securityvulns:doc:28763
vulners.com/securityvulns/securityvulns:doc:28764
vulners.com/securityvulns/securityvulns:doc:28765
vulners.com/securityvulns/securityvulns:doc:28766
vulners.com/securityvulns/securityvulns:doc:28767
vulners.com/securityvulns/securityvulns:doc:28768