PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:31582
vulners.com/securityvulns/securityvulns:doc:31583
vulners.com/securityvulns/securityvulns:doc:31584
vulners.com/securityvulns/securityvulns:doc:31585
vulners.com/securityvulns/securityvulns:doc:31586
vulners.com/securityvulns/securityvulns:doc:31587
vulners.com/securityvulns/securityvulns:doc:31588