PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15670
vulners.com/securityvulns/securityvulns:doc:15672
vulners.com/securityvulns/securityvulns:doc:15675
vulners.com/securityvulns/securityvulns:doc:15676
vulners.com/securityvulns/securityvulns:doc:15677
vulners.com/securityvulns/securityvulns:doc:15680
vulners.com/securityvulns/securityvulns:doc:15681