PHP inclusions, SQL injections, directory traversals, crossite scripting, etc.
vulners.com/securityvulns/securityvulns:doc:8004
vulners.com/securityvulns/securityvulns:doc:8005
vulners.com/securityvulns/securityvulns:doc:8006
vulners.com/securityvulns/securityvulns:doc:8007
vulners.com/securityvulns/securityvulns:doc:8008
vulners.com/securityvulns/securityvulns:doc:8009
vulners.com/securityvulns/securityvulns:doc:8010
vulners.com/securityvulns/securityvulns:doc:8011
vulners.com/securityvulns/securityvulns:doc:8012
vulners.com/securityvulns/securityvulns:doc:8013
vulners.com/securityvulns/securityvulns:doc:8014
vulners.com/securityvulns/securityvulns:doc:8016
vulners.com/securityvulns/securityvulns:doc:8024
vulners.com/securityvulns/securityvulns:doc:8025
vulners.com/securityvulns/securityvulns:doc:8032
vulners.com/securityvulns/securityvulns:doc:8038
vulners.com/securityvulns/securityvulns:doc:8040
vulners.com/securityvulns/securityvulns:doc:8041
vulners.com/securityvulns/securityvulns:doc:8042
vulners.com/securityvulns/securityvulns:doc:8043
vulners.com/securityvulns/securityvulns:doc:8044
vulners.com/securityvulns/securityvulns:doc:8045
vulners.com/securityvulns/securityvulns:doc:8046
vulners.com/securityvulns/securityvulns:doc:8047
vulners.com/securityvulns/securityvulns:doc:8048
vulners.com/securityvulns/securityvulns:doc:8049
vulners.com/securityvulns/securityvulns:doc:8055