PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:26329
vulners.com/securityvulns/securityvulns:doc:26330
vulners.com/securityvulns/securityvulns:doc:26331
vulners.com/securityvulns/securityvulns:doc:26332
vulners.com/securityvulns/securityvulns:doc:26333
vulners.com/securityvulns/securityvulns:doc:26334
vulners.com/securityvulns/securityvulns:doc:26351