PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:19297
vulners.com/securityvulns/securityvulns:doc:19298
vulners.com/securityvulns/securityvulns:doc:19299
vulners.com/securityvulns/securityvulns:doc:19300
vulners.com/securityvulns/securityvulns:doc:19301
vulners.com/securityvulns/securityvulns:doc:19302
vulners.com/securityvulns/securityvulns:doc:19303
vulners.com/securityvulns/securityvulns:doc:19304
vulners.com/securityvulns/securityvulns:doc:19305
vulners.com/securityvulns/securityvulns:doc:19310
vulners.com/securityvulns/securityvulns:doc:19313