PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:11536
vulners.com/securityvulns/securityvulns:doc:11538
vulners.com/securityvulns/securityvulns:doc:11539
vulners.com/securityvulns/securityvulns:doc:11540
vulners.com/securityvulns/securityvulns:doc:11541
vulners.com/securityvulns/securityvulns:doc:11542
vulners.com/securityvulns/securityvulns:doc:11543
vulners.com/securityvulns/securityvulns:doc:11544
vulners.com/securityvulns/securityvulns:doc:11546