PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15441
vulners.com/securityvulns/securityvulns:doc:15442
vulners.com/securityvulns/securityvulns:doc:15443
vulners.com/securityvulns/securityvulns:doc:15444
vulners.com/securityvulns/securityvulns:doc:15445
vulners.com/securityvulns/securityvulns:doc:15446
vulners.com/securityvulns/securityvulns:doc:15448
vulners.com/securityvulns/securityvulns:doc:15450
vulners.com/securityvulns/securityvulns:doc:15451
vulners.com/securityvulns/securityvulns:doc:15452
vulners.com/securityvulns/securityvulns:doc:15453
vulners.com/securityvulns/securityvulns:doc:15454
vulners.com/securityvulns/securityvulns:doc:15455
vulners.com/securityvulns/securityvulns:doc:15458
vulners.com/securityvulns/securityvulns:doc:15459