PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:13344
vulners.com/securityvulns/securityvulns:doc:13345
vulners.com/securityvulns/securityvulns:doc:13346
vulners.com/securityvulns/securityvulns:doc:13347
vulners.com/securityvulns/securityvulns:doc:13348
vulners.com/securityvulns/securityvulns:doc:13355
vulners.com/securityvulns/securityvulns:doc:13358
vulners.com/securityvulns/securityvulns:doc:13359