PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:18559
vulners.com/securityvulns/securityvulns:doc:18560
vulners.com/securityvulns/securityvulns:doc:18561
vulners.com/securityvulns/securityvulns:doc:18562
vulners.com/securityvulns/securityvulns:doc:18563
vulners.com/securityvulns/securityvulns:doc:18564
vulners.com/securityvulns/securityvulns:doc:18568