PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15353
vulners.com/securityvulns/securityvulns:doc:15354
vulners.com/securityvulns/securityvulns:doc:15355
vulners.com/securityvulns/securityvulns:doc:15356
vulners.com/securityvulns/securityvulns:doc:15357
vulners.com/securityvulns/securityvulns:doc:15361