PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14383
vulners.com/securityvulns/securityvulns:doc:14384
vulners.com/securityvulns/securityvulns:doc:14385
vulners.com/securityvulns/securityvulns:doc:14386
vulners.com/securityvulns/securityvulns:doc:14387
vulners.com/securityvulns/securityvulns:doc:14388