PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11888
vulners.com/securityvulns/securityvulns:doc:11889
vulners.com/securityvulns/securityvulns:doc:11890
vulners.com/securityvulns/securityvulns:doc:11891
vulners.com/securityvulns/securityvulns:doc:11895
vulners.com/securityvulns/securityvulns:doc:11903