PHP inclusions, SQL injections, directory traversals, crossite scripting, etc.
vulners.com/securityvulns/securityvulns:doc:8272
vulners.com/securityvulns/securityvulns:doc:8273
vulners.com/securityvulns/securityvulns:doc:8276
vulners.com/securityvulns/securityvulns:doc:8278
vulners.com/securityvulns/securityvulns:doc:8280
vulners.com/securityvulns/securityvulns:doc:8287
vulners.com/securityvulns/securityvulns:doc:8291
vulners.com/securityvulns/securityvulns:doc:8292
vulners.com/securityvulns/securityvulns:doc:8293
vulners.com/securityvulns/securityvulns:doc:8295
vulners.com/securityvulns/securityvulns:doc:8301
vulners.com/securityvulns/securityvulns:doc:8317
vulners.com/securityvulns/securityvulns:doc:8318
vulners.com/securityvulns/securityvulns:doc:8319
vulners.com/securityvulns/securityvulns:doc:8320
vulners.com/securityvulns/securityvulns:doc:8322
vulners.com/securityvulns/securityvulns:doc:8334
vulners.com/securityvulns/securityvulns:doc:8337
vulners.com/securityvulns/securityvulns:doc:8340
vulners.com/securityvulns/securityvulns:doc:8341
vulners.com/securityvulns/securityvulns:doc:8346
vulners.com/securityvulns/securityvulns:doc:8348
vulners.com/securityvulns/securityvulns:doc:8354
vulners.com/securityvulns/securityvulns:doc:8355
vulners.com/securityvulns/securityvulns:doc:8356
vulners.com/securityvulns/securityvulns:doc:8357