PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15986
vulners.com/securityvulns/securityvulns:doc:15988
vulners.com/securityvulns/securityvulns:doc:15989
vulners.com/securityvulns/securityvulns:doc:15990
vulners.com/securityvulns/securityvulns:doc:15991
vulners.com/securityvulns/securityvulns:doc:15992
vulners.com/securityvulns/securityvulns:doc:15993
vulners.com/securityvulns/securityvulns:doc:15994
vulners.com/securityvulns/securityvulns:doc:15995