PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:27082
vulners.com/securityvulns/securityvulns:doc:27083
vulners.com/securityvulns/securityvulns:doc:27084
vulners.com/securityvulns/securityvulns:doc:27086
vulners.com/securityvulns/securityvulns:doc:27087
vulners.com/securityvulns/securityvulns:doc:27092
vulners.com/securityvulns/securityvulns:doc:27093