PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14587
vulners.com/securityvulns/securityvulns:doc:14589
vulners.com/securityvulns/securityvulns:doc:14590
vulners.com/securityvulns/securityvulns:doc:14591
vulners.com/securityvulns/securityvulns:doc:14592