PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:14435
vulners.com/securityvulns/securityvulns:doc:14436
vulners.com/securityvulns/securityvulns:doc:14437
vulners.com/securityvulns/securityvulns:doc:14438
vulners.com/securityvulns/securityvulns:doc:14439
vulners.com/securityvulns/securityvulns:doc:14440
vulners.com/securityvulns/securityvulns:doc:14441
vulners.com/securityvulns/securityvulns:doc:14442
vulners.com/securityvulns/securityvulns:doc:14444
vulners.com/securityvulns/securityvulns:doc:14445
vulners.com/securityvulns/securityvulns:doc:14446
vulners.com/securityvulns/securityvulns:doc:14447
vulners.com/securityvulns/securityvulns:doc:14448
vulners.com/securityvulns/securityvulns:doc:14449