PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11732
vulners.com/securityvulns/securityvulns:doc:11733
vulners.com/securityvulns/securityvulns:doc:11735
vulners.com/securityvulns/securityvulns:doc:11736
vulners.com/securityvulns/securityvulns:doc:11739
vulners.com/securityvulns/securityvulns:doc:11740
vulners.com/securityvulns/securityvulns:doc:11745
vulners.com/securityvulns/securityvulns:doc:11746
vulners.com/securityvulns/securityvulns:doc:11748