PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14194
vulners.com/securityvulns/securityvulns:doc:14195
vulners.com/securityvulns/securityvulns:doc:14196
vulners.com/securityvulns/securityvulns:doc:14197
vulners.com/securityvulns/securityvulns:doc:14198
vulners.com/securityvulns/securityvulns:doc:14199
vulners.com/securityvulns/securityvulns:doc:14200