PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:12382
vulners.com/securityvulns/securityvulns:doc:12387
vulners.com/securityvulns/securityvulns:doc:12388
vulners.com/securityvulns/securityvulns:doc:12389
vulners.com/securityvulns/securityvulns:doc:12390
vulners.com/securityvulns/securityvulns:doc:12391
vulners.com/securityvulns/securityvulns:doc:12392
vulners.com/securityvulns/securityvulns:doc:12393