PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15225
vulners.com/securityvulns/securityvulns:doc:15226
vulners.com/securityvulns/securityvulns:doc:15227
vulners.com/securityvulns/securityvulns:doc:15228
vulners.com/securityvulns/securityvulns:doc:15229
vulners.com/securityvulns/securityvulns:doc:15231
vulners.com/securityvulns/securityvulns:doc:15232