PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14342
vulners.com/securityvulns/securityvulns:doc:14343
vulners.com/securityvulns/securityvulns:doc:14344
vulners.com/securityvulns/securityvulns:doc:14345
vulners.com/securityvulns/securityvulns:doc:14346
vulners.com/securityvulns/securityvulns:doc:14347
vulners.com/securityvulns/securityvulns:doc:14348
vulners.com/securityvulns/securityvulns:doc:14349
vulners.com/securityvulns/securityvulns:doc:14351
vulners.com/securityvulns/securityvulns:doc:14352
vulners.com/securityvulns/securityvulns:doc:14353
vulners.com/securityvulns/securityvulns:doc:14354
vulners.com/securityvulns/securityvulns:doc:14355
vulners.com/securityvulns/securityvulns:doc:14356
vulners.com/securityvulns/securityvulns:doc:14357
vulners.com/securityvulns/securityvulns:doc:14358
vulners.com/securityvulns/securityvulns:doc:14359
vulners.com/securityvulns/securityvulns:doc:14360
vulners.com/securityvulns/securityvulns:doc:14361
vulners.com/securityvulns/securityvulns:doc:14362
vulners.com/securityvulns/securityvulns:doc:14363
vulners.com/securityvulns/securityvulns:doc:14364
vulners.com/securityvulns/securityvulns:doc:14365