index.php in EZDatabase before 2.1.2 does not properly cleanse the p parameter before constructing and including a .php filename, which allows remote attackers to conduct directory traversal attacks, and produces resultant cross-site scripting (XSS) and path disclosure.
https://exchange.xforce.ibmcloud.com/vulnerabilities/24135
https://exchange.xforce.ibmcloud.com/vulnerabilities/24134
http://zur.homelinux.com/Advisories/ezdatabase_dir_trans.txt
http://www.securityfocus.com/archive/1/422071/100/0/threaded