PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:26998
vulners.com/securityvulns/securityvulns:doc:26999
vulners.com/securityvulns/securityvulns:doc:27000
vulners.com/securityvulns/securityvulns:doc:27001
vulners.com/securityvulns/securityvulns:doc:27008
vulners.com/securityvulns/securityvulns:doc:27009
vulners.com/securityvulns/securityvulns:doc:27010
vulners.com/securityvulns/securityvulns:doc:27011
vulners.com/securityvulns/securityvulns:doc:27012