PHP inclusions, SQL injections, directory traversals, crossite scripting, etc.
vulners.com/securityvulns/securityvulns:doc:8374
vulners.com/securityvulns/securityvulns:doc:8375
vulners.com/securityvulns/securityvulns:doc:8381
vulners.com/securityvulns/securityvulns:doc:8382
vulners.com/securityvulns/securityvulns:doc:8383
vulners.com/securityvulns/securityvulns:doc:8385
vulners.com/securityvulns/securityvulns:doc:8387
vulners.com/securityvulns/securityvulns:doc:8390
vulners.com/securityvulns/securityvulns:doc:8391
vulners.com/securityvulns/securityvulns:doc:8392
vulners.com/securityvulns/securityvulns:doc:8394
vulners.com/securityvulns/securityvulns:doc:8396
vulners.com/securityvulns/securityvulns:doc:8398
vulners.com/securityvulns/securityvulns:doc:8399
vulners.com/securityvulns/securityvulns:doc:8400
vulners.com/securityvulns/securityvulns:doc:8401
vulners.com/securityvulns/securityvulns:doc:8402
vulners.com/securityvulns/securityvulns:doc:8404
vulners.com/securityvulns/securityvulns:doc:8405
vulners.com/securityvulns/securityvulns:doc:8409
vulners.com/securityvulns/securityvulns:doc:8412
vulners.com/securityvulns/securityvulns:doc:8414
vulners.com/securityvulns/securityvulns:doc:8415
vulners.com/securityvulns/securityvulns:doc:8417
vulners.com/securityvulns/securityvulns:doc:8418