PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:16152
vulners.com/securityvulns/securityvulns:doc:16153
vulners.com/securityvulns/securityvulns:doc:16154
vulners.com/securityvulns/securityvulns:doc:16155
vulners.com/securityvulns/securityvulns:doc:16156
vulners.com/securityvulns/securityvulns:doc:16157
vulners.com/securityvulns/securityvulns:doc:16158
vulners.com/securityvulns/securityvulns:doc:16159
vulners.com/securityvulns/securityvulns:doc:16161