PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:27031
vulners.com/securityvulns/securityvulns:doc:27032
vulners.com/securityvulns/securityvulns:doc:27035
vulners.com/securityvulns/securityvulns:doc:27041
vulners.com/securityvulns/securityvulns:doc:27042
vulners.com/securityvulns/securityvulns:doc:27043
vulners.com/securityvulns/securityvulns:doc:27044
vulners.com/securityvulns/securityvulns:doc:27045
vulners.com/securityvulns/securityvulns:doc:27049