PHP inclusions, SQL injections, directory traversals, crossite scripting, etc.
vulners.com/securityvulns/securityvulns:doc:8162
vulners.com/securityvulns/securityvulns:doc:8167
vulners.com/securityvulns/securityvulns:doc:8169
vulners.com/securityvulns/securityvulns:doc:8177
vulners.com/securityvulns/securityvulns:doc:8178
vulners.com/securityvulns/securityvulns:doc:8179
vulners.com/securityvulns/securityvulns:doc:8180
vulners.com/securityvulns/securityvulns:doc:8181
vulners.com/securityvulns/securityvulns:doc:8182
vulners.com/securityvulns/securityvulns:doc:8183
vulners.com/securityvulns/securityvulns:doc:8184
vulners.com/securityvulns/securityvulns:doc:8185
vulners.com/securityvulns/securityvulns:doc:8186
vulners.com/securityvulns/securityvulns:doc:8187
vulners.com/securityvulns/securityvulns:doc:8188
vulners.com/securityvulns/securityvulns:doc:8189
vulners.com/securityvulns/securityvulns:doc:8190
vulners.com/securityvulns/securityvulns:doc:8191
vulners.com/securityvulns/securityvulns:doc:8195
vulners.com/securityvulns/securityvulns:doc:8199
vulners.com/securityvulns/securityvulns:doc:8200
vulners.com/securityvulns/securityvulns:doc:8201
vulners.com/securityvulns/securityvulns:doc:8202
vulners.com/securityvulns/securityvulns:doc:8206
vulners.com/securityvulns/securityvulns:doc:8207
vulners.com/securityvulns/securityvulns:doc:8214
vulners.com/securityvulns/securityvulns:doc:8248