PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:16225
vulners.com/securityvulns/securityvulns:doc:16226
vulners.com/securityvulns/securityvulns:doc:16227
vulners.com/securityvulns/securityvulns:doc:16228
vulners.com/securityvulns/securityvulns:doc:16235
vulners.com/securityvulns/securityvulns:doc:16236
vulners.com/securityvulns/securityvulns:doc:16237