PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14661
vulners.com/securityvulns/securityvulns:doc:14662
vulners.com/securityvulns/securityvulns:doc:14663
vulners.com/securityvulns/securityvulns:doc:14664
vulners.com/securityvulns/securityvulns:doc:14665
vulners.com/securityvulns/securityvulns:doc:14666
vulners.com/securityvulns/securityvulns:doc:14670
vulners.com/securityvulns/securityvulns:doc:14671
vulners.com/securityvulns/securityvulns:doc:14672
vulners.com/securityvulns/securityvulns:doc:14673
vulners.com/securityvulns/securityvulns:doc:14674
vulners.com/securityvulns/securityvulns:doc:14675
vulners.com/securityvulns/securityvulns:doc:14676
vulners.com/securityvulns/securityvulns:doc:14677
vulners.com/securityvulns/securityvulns:doc:14678
vulners.com/securityvulns/securityvulns:doc:14679