PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:22277
vulners.com/securityvulns/securityvulns:doc:22278
vulners.com/securityvulns/securityvulns:doc:22279
vulners.com/securityvulns/securityvulns:doc:22280
vulners.com/securityvulns/securityvulns:doc:22281
vulners.com/securityvulns/securityvulns:doc:22284
vulners.com/securityvulns/securityvulns:doc:22285