PHP inclusions, SQL injections, directory traversals, crossite scripting, etc.
vulners.com/securityvulns/securityvulns:doc:7942
vulners.com/securityvulns/securityvulns:doc:7945
vulners.com/securityvulns/securityvulns:doc:7946
vulners.com/securityvulns/securityvulns:doc:7947
vulners.com/securityvulns/securityvulns:doc:7948
vulners.com/securityvulns/securityvulns:doc:7949
vulners.com/securityvulns/securityvulns:doc:7952
vulners.com/securityvulns/securityvulns:doc:7953
vulners.com/securityvulns/securityvulns:doc:7959
vulners.com/securityvulns/securityvulns:doc:7960
vulners.com/securityvulns/securityvulns:doc:7961
vulners.com/securityvulns/securityvulns:doc:7962
vulners.com/securityvulns/securityvulns:doc:7963
vulners.com/securityvulns/securityvulns:doc:7964
vulners.com/securityvulns/securityvulns:doc:7965
vulners.com/securityvulns/securityvulns:doc:7969
vulners.com/securityvulns/securityvulns:doc:7985
vulners.com/securityvulns/securityvulns:doc:7986
vulners.com/securityvulns/securityvulns:doc:7987
vulners.com/securityvulns/securityvulns:doc:7988
vulners.com/securityvulns/securityvulns:doc:7989
vulners.com/securityvulns/securityvulns:doc:7991
vulners.com/securityvulns/securityvulns:doc:7992
vulners.com/securityvulns/securityvulns:doc:7993
vulners.com/securityvulns/securityvulns:doc:7994
vulners.com/securityvulns/securityvulns:doc:7995
vulners.com/securityvulns/securityvulns:doc:7997
vulners.com/securityvulns/securityvulns:doc:7999
vulners.com/securityvulns/securityvulns:doc:8002
vulners.com/securityvulns/securityvulns:doc:8786