PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14778
vulners.com/securityvulns/securityvulns:doc:14779
vulners.com/securityvulns/securityvulns:doc:14780
vulners.com/securityvulns/securityvulns:doc:14781
vulners.com/securityvulns/securityvulns:doc:14782
vulners.com/securityvulns/securityvulns:doc:14783
vulners.com/securityvulns/securityvulns:doc:14784
vulners.com/securityvulns/securityvulns:doc:14785
vulners.com/securityvulns/securityvulns:doc:14786
vulners.com/securityvulns/securityvulns:doc:14787
vulners.com/securityvulns/securityvulns:doc:14788
vulners.com/securityvulns/securityvulns:doc:14789
vulners.com/securityvulns/securityvulns:doc:14790
vulners.com/securityvulns/securityvulns:doc:14791
vulners.com/securityvulns/securityvulns:doc:14792
vulners.com/securityvulns/securityvulns:doc:14793
vulners.com/securityvulns/securityvulns:doc:14794
vulners.com/securityvulns/securityvulns:doc:14795
vulners.com/securityvulns/securityvulns:doc:14796
vulners.com/securityvulns/securityvulns:doc:14797
vulners.com/securityvulns/securityvulns:doc:14798
vulners.com/securityvulns/securityvulns:doc:14800
vulners.com/securityvulns/securityvulns:doc:14801
vulners.com/securityvulns/securityvulns:doc:14802
vulners.com/securityvulns/securityvulns:doc:14803
vulners.com/securityvulns/securityvulns:doc:14804