PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:13243
vulners.com/securityvulns/securityvulns:doc:13244
vulners.com/securityvulns/securityvulns:doc:13245
vulners.com/securityvulns/securityvulns:doc:13246
vulners.com/securityvulns/securityvulns:doc:13247
vulners.com/securityvulns/securityvulns:doc:13248
vulners.com/securityvulns/securityvulns:doc:13249
vulners.com/securityvulns/securityvulns:doc:13250