PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:18068
vulners.com/securityvulns/securityvulns:doc:18069
vulners.com/securityvulns/securityvulns:doc:18070
vulners.com/securityvulns/securityvulns:doc:18071
vulners.com/securityvulns/securityvulns:doc:18072
vulners.com/securityvulns/securityvulns:doc:18073
vulners.com/securityvulns/securityvulns:doc:18074
vulners.com/securityvulns/securityvulns:doc:18075
vulners.com/securityvulns/securityvulns:doc:18076
vulners.com/securityvulns/securityvulns:doc:18077
vulners.com/securityvulns/securityvulns:doc:18078