PHP inclusions, SQL injections, directory traversals, crossite scripting, etc.
vulners.com/securityvulns/securityvulns:doc:8052
vulners.com/securityvulns/securityvulns:doc:8053
vulners.com/securityvulns/securityvulns:doc:8056
vulners.com/securityvulns/securityvulns:doc:8061
vulners.com/securityvulns/securityvulns:doc:8062
vulners.com/securityvulns/securityvulns:doc:8063
vulners.com/securityvulns/securityvulns:doc:8064
vulners.com/securityvulns/securityvulns:doc:8065
vulners.com/securityvulns/securityvulns:doc:8069
vulners.com/securityvulns/securityvulns:doc:8070
vulners.com/securityvulns/securityvulns:doc:8071
vulners.com/securityvulns/securityvulns:doc:8072
vulners.com/securityvulns/securityvulns:doc:8073
vulners.com/securityvulns/securityvulns:doc:8081
vulners.com/securityvulns/securityvulns:doc:8082
vulners.com/securityvulns/securityvulns:doc:8087
vulners.com/securityvulns/securityvulns:doc:8090
vulners.com/securityvulns/securityvulns:doc:8091
vulners.com/securityvulns/securityvulns:doc:8092
vulners.com/securityvulns/securityvulns:doc:8094
vulners.com/securityvulns/securityvulns:doc:8095
vulners.com/securityvulns/securityvulns:doc:8103
vulners.com/securityvulns/securityvulns:doc:8104
vulners.com/securityvulns/securityvulns:doc:8105
vulners.com/securityvulns/securityvulns:doc:8106
vulners.com/securityvulns/securityvulns:doc:8107
vulners.com/securityvulns/securityvulns:doc:8108
vulners.com/securityvulns/securityvulns:doc:8111
vulners.com/securityvulns/securityvulns:doc:8112
vulners.com/securityvulns/securityvulns:doc:8113
vulners.com/securityvulns/securityvulns:doc:8114
vulners.com/securityvulns/securityvulns:doc:8115