Multiple PHP remote file inclusion vulnerabilities in USOLVED NEWSolved Lite 1.9.2, and possibly earlier, allow remote attackers to execute arbitrary PHP code via a URL in the abs_path parameter to (1) newsscript_lyt.php, (2) newsticker/newsscript_get.php, (3) inc/output/news_theme1.php, (4) inc/output/news_theme2.php, or (5) inc/output/news_theme3.php.
secunia.com/advisories/21395
securityreason.com/securityalert/1366
www.bb-pcsecurity.de/sicherheit_286.htm
www.osvdb.org/27836
www.osvdb.org/27837
www.osvdb.org/27838
www.osvdb.org/27839
www.osvdb.org/27840
www.securityfocus.com/archive/1/442434/100/0/threaded
www.securityfocus.com/bid/19379
www.usolved.net/site/index.php
www.vupen.com/english/advisories/2006/3200
exchange.xforce.ibmcloud.com/vulnerabilities/28262
www.exploit-db.com/exploits/2135