PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:29670
vulners.com/securityvulns/securityvulns:doc:29671
vulners.com/securityvulns/securityvulns:doc:29672
vulners.com/securityvulns/securityvulns:doc:29673
vulners.com/securityvulns/securityvulns:doc:29674
vulners.com/securityvulns/securityvulns:doc:29675
vulners.com/securityvulns/securityvulns:doc:29676
vulners.com/securityvulns/securityvulns:doc:29677
vulners.com/securityvulns/securityvulns:doc:29683