source: https://www.securityfocus.com/bid/12564/info CitrusDB is reportedly affected by a vulnerability that permits the inclusion of any local PHP file. This issue is due to the application failing to properly sanitize user-supplied input. This issue is reported to affect CitrusDB 0.3.6; earlier versions may also be affected. This issue may also allow remote file includes, although this has not been confirmed. http://www.example.com/citrusdb/tools/index.php?load=../../../../../../tmp/exploit.php