PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:28981
vulners.com/securityvulns/securityvulns:doc:28982
vulners.com/securityvulns/securityvulns:doc:28983
vulners.com/securityvulns/securityvulns:doc:28984
vulners.com/securityvulns/securityvulns:doc:28985
vulners.com/securityvulns/securityvulns:doc:28986
vulners.com/securityvulns/securityvulns:doc:28987
vulners.com/securityvulns/securityvulns:doc:28988
vulners.com/securityvulns/securityvulns:doc:28989
vulners.com/securityvulns/securityvulns:doc:28990