PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:13292
vulners.com/securityvulns/securityvulns:doc:13293
vulners.com/securityvulns/securityvulns:doc:13294
vulners.com/securityvulns/securityvulns:doc:13296
vulners.com/securityvulns/securityvulns:doc:13297
vulners.com/securityvulns/securityvulns:doc:13298
vulners.com/securityvulns/securityvulns:doc:13299