PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:13235
vulners.com/securityvulns/securityvulns:doc:13236
vulners.com/securityvulns/securityvulns:doc:13237
vulners.com/securityvulns/securityvulns:doc:13238
vulners.com/securityvulns/securityvulns:doc:13239
vulners.com/securityvulns/securityvulns:doc:13240
vulners.com/securityvulns/securityvulns:doc:13241
vulners.com/securityvulns/securityvulns:doc:13242