PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:15480
vulners.com/securityvulns/securityvulns:doc:15481
vulners.com/securityvulns/securityvulns:doc:15482
vulners.com/securityvulns/securityvulns:doc:15484
vulners.com/securityvulns/securityvulns:doc:15485
vulners.com/securityvulns/securityvulns:doc:15486
vulners.com/securityvulns/securityvulns:doc:15487
vulners.com/securityvulns/securityvulns:doc:15488
vulners.com/securityvulns/securityvulns:doc:15489
vulners.com/securityvulns/securityvulns:doc:15490
vulners.com/securityvulns/securityvulns:doc:15491
vulners.com/securityvulns/securityvulns:doc:15492
vulners.com/securityvulns/securityvulns:doc:15493
vulners.com/securityvulns/securityvulns:doc:15494
vulners.com/securityvulns/securityvulns:doc:15495
vulners.com/securityvulns/securityvulns:doc:15496
vulners.com/securityvulns/securityvulns:doc:15497
vulners.com/securityvulns/securityvulns:doc:15498