Directory traversal vulnerability in memcp.php in XMB (Extreme Message Board) 1.9.6 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the langfilenew parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by header.php.
retrogod.altervista.org/xmb_196_sql.html
secunia.com/advisories/21293
securityreason.com/securityalert/1411
www.securityfocus.com/archive/1/443167/100/0/threaded
www.securityfocus.com/bid/19494
www.securityfocus.com/bid/19501
docs.xmbforum2.com/index.php?title=Security_Issue_History
exchange.xforce.ibmcloud.com/vulnerabilities/28356
www.exploit-db.com/exploits/2178