PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:21944
vulners.com/securityvulns/securityvulns:doc:21945
vulners.com/securityvulns/securityvulns:doc:21946
vulners.com/securityvulns/securityvulns:doc:21947
vulners.com/securityvulns/securityvulns:doc:21948
vulners.com/securityvulns/securityvulns:doc:21949
vulners.com/securityvulns/securityvulns:doc:21950
vulners.com/securityvulns/securityvulns:doc:21951