PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11524
vulners.com/securityvulns/securityvulns:doc:11525
vulners.com/securityvulns/securityvulns:doc:11526
vulners.com/securityvulns/securityvulns:doc:11528
vulners.com/securityvulns/securityvulns:doc:11529
vulners.com/securityvulns/securityvulns:doc:11530
vulners.com/securityvulns/securityvulns:doc:11531
vulners.com/securityvulns/securityvulns:doc:11532
vulners.com/securityvulns/securityvulns:doc:11533
vulners.com/securityvulns/securityvulns:doc:11534
vulners.com/securityvulns/securityvulns:doc:11535