PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:10727
vulners.com/securityvulns/securityvulns:doc:10728
vulners.com/securityvulns/securityvulns:doc:10730
vulners.com/securityvulns/securityvulns:doc:10741
vulners.com/securityvulns/securityvulns:doc:10742
vulners.com/securityvulns/securityvulns:doc:10743
vulners.com/securityvulns/securityvulns:doc:10744
vulners.com/securityvulns/securityvulns:doc:10745
vulners.com/securityvulns/securityvulns:doc:10748
vulners.com/securityvulns/securityvulns:doc:10750