PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11863
vulners.com/securityvulns/securityvulns:doc:11864
vulners.com/securityvulns/securityvulns:doc:11865
vulners.com/securityvulns/securityvulns:doc:11866
vulners.com/securityvulns/securityvulns:doc:11867
vulners.com/securityvulns/securityvulns:doc:11868
vulners.com/securityvulns/securityvulns:doc:11869
vulners.com/securityvulns/securityvulns:doc:11873