PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11493
vulners.com/securityvulns/securityvulns:doc:11494
vulners.com/securityvulns/securityvulns:doc:11495
vulners.com/securityvulns/securityvulns:doc:11496
vulners.com/securityvulns/securityvulns:doc:11499
vulners.com/securityvulns/securityvulns:doc:11500
vulners.com/securityvulns/securityvulns:doc:11501
vulners.com/securityvulns/securityvulns:doc:11502
vulners.com/securityvulns/securityvulns:doc:11503