source: https://www.securityfocus.com/bid/16822/info SPiD is prone to a local file-include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of this issue may facilitate the unauthorized viewing of files and execution of local scripts. http://www.example.com/spiddir/scan_lang_insert.php?lang=../../../../../../../../etc/passwd%00