PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11590
vulners.com/securityvulns/securityvulns:doc:11591
vulners.com/securityvulns/securityvulns:doc:11592
vulners.com/securityvulns/securityvulns:doc:11593
vulners.com/securityvulns/securityvulns:doc:11594
vulners.com/securityvulns/securityvulns:doc:11595
vulners.com/securityvulns/securityvulns:doc:11596