PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14069
vulners.com/securityvulns/securityvulns:doc:14070
vulners.com/securityvulns/securityvulns:doc:14071
vulners.com/securityvulns/securityvulns:doc:14072
vulners.com/securityvulns/securityvulns:doc:14073
vulners.com/securityvulns/securityvulns:doc:14074
vulners.com/securityvulns/securityvulns:doc:14075
vulners.com/securityvulns/securityvulns:doc:14076