PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14450
vulners.com/securityvulns/securityvulns:doc:14451
vulners.com/securityvulns/securityvulns:doc:14452
vulners.com/securityvulns/securityvulns:doc:14453
vulners.com/securityvulns/securityvulns:doc:14454
vulners.com/securityvulns/securityvulns:doc:14455
vulners.com/securityvulns/securityvulns:doc:14456
vulners.com/securityvulns/securityvulns:doc:14457
vulners.com/securityvulns/securityvulns:doc:14458
vulners.com/securityvulns/securityvulns:doc:14459
vulners.com/securityvulns/securityvulns:doc:14460
vulners.com/securityvulns/securityvulns:doc:14461
vulners.com/securityvulns/securityvulns:doc:14462
vulners.com/securityvulns/securityvulns:doc:14463
vulners.com/securityvulns/securityvulns:doc:14464
vulners.com/securityvulns/securityvulns:doc:14465
vulners.com/securityvulns/securityvulns:doc:14468
vulners.com/securityvulns/securityvulns:doc:14469
vulners.com/securityvulns/securityvulns:doc:14470
vulners.com/securityvulns/securityvulns:doc:14471
vulners.com/securityvulns/securityvulns:doc:14472
vulners.com/securityvulns/securityvulns:doc:14473
vulners.com/securityvulns/securityvulns:doc:14481
vulners.com/securityvulns/securityvulns:doc:14482