PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14487
vulners.com/securityvulns/securityvulns:doc:14488
vulners.com/securityvulns/securityvulns:doc:14489
vulners.com/securityvulns/securityvulns:doc:14490
vulners.com/securityvulns/securityvulns:doc:14491
vulners.com/securityvulns/securityvulns:doc:14492
vulners.com/securityvulns/securityvulns:doc:14493
vulners.com/securityvulns/securityvulns:doc:14494
vulners.com/securityvulns/securityvulns:doc:14495
vulners.com/securityvulns/securityvulns:doc:14496
vulners.com/securityvulns/securityvulns:doc:14497
vulners.com/securityvulns/securityvulns:doc:14498
vulners.com/securityvulns/securityvulns:doc:14499
vulners.com/securityvulns/securityvulns:doc:14500
vulners.com/securityvulns/securityvulns:doc:14501
vulners.com/securityvulns/securityvulns:doc:14502
vulners.com/securityvulns/securityvulns:doc:14503
vulners.com/securityvulns/securityvulns:doc:14504
vulners.com/securityvulns/securityvulns:doc:14505