PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:24399
vulners.com/securityvulns/securityvulns:doc:24400
vulners.com/securityvulns/securityvulns:doc:24401
vulners.com/securityvulns/securityvulns:doc:24402
vulners.com/securityvulns/securityvulns:doc:24403
vulners.com/securityvulns/securityvulns:doc:24404
vulners.com/securityvulns/securityvulns:doc:24405
vulners.com/securityvulns/securityvulns:doc:24406
vulners.com/securityvulns/securityvulns:doc:24407
vulners.com/securityvulns/securityvulns:doc:24408
vulners.com/securityvulns/securityvulns:doc:24409
vulners.com/securityvulns/securityvulns:doc:24410
vulners.com/securityvulns/securityvulns:doc:24411
vulners.com/securityvulns/securityvulns:doc:24412
vulners.com/securityvulns/securityvulns:doc:24413
vulners.com/securityvulns/securityvulns:doc:24414
vulners.com/securityvulns/securityvulns:doc:24415
vulners.com/securityvulns/securityvulns:doc:24416
vulners.com/securityvulns/securityvulns:doc:24417
vulners.com/securityvulns/securityvulns:doc:24418
vulners.com/securityvulns/securityvulns:doc:24419
vulners.com/securityvulns/securityvulns:doc:24420
vulners.com/securityvulns/securityvulns:doc:24421
vulners.com/securityvulns/securityvulns:doc:24424
vulners.com/securityvulns/securityvulns:doc:24425
vulners.com/securityvulns/securityvulns:doc:24426