PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15967
vulners.com/securityvulns/securityvulns:doc:15968
vulners.com/securityvulns/securityvulns:doc:15969
vulners.com/securityvulns/securityvulns:doc:15970
vulners.com/securityvulns/securityvulns:doc:15971
vulners.com/securityvulns/securityvulns:doc:15972
vulners.com/securityvulns/securityvulns:doc:15973
vulners.com/securityvulns/securityvulns:doc:15974