PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15289
vulners.com/securityvulns/securityvulns:doc:15290
vulners.com/securityvulns/securityvulns:doc:15291
vulners.com/securityvulns/securityvulns:doc:15292
vulners.com/securityvulns/securityvulns:doc:15293
vulners.com/securityvulns/securityvulns:doc:15294
vulners.com/securityvulns/securityvulns:doc:15295
vulners.com/securityvulns/securityvulns:doc:15296
vulners.com/securityvulns/securityvulns:doc:15297
vulners.com/securityvulns/securityvulns:doc:15298
vulners.com/securityvulns/securityvulns:doc:15299
vulners.com/securityvulns/securityvulns:doc:15300
vulners.com/securityvulns/securityvulns:doc:15301
vulners.com/securityvulns/securityvulns:doc:15302
vulners.com/securityvulns/securityvulns:doc:15303
vulners.com/securityvulns/securityvulns:doc:15304
vulners.com/securityvulns/securityvulns:doc:15305
vulners.com/securityvulns/securityvulns:doc:15306
vulners.com/securityvulns/securityvulns:doc:15307
vulners.com/securityvulns/securityvulns:doc:15308
vulners.com/securityvulns/securityvulns:doc:15310