Multiple PHP remote file inclusion vulnerabilities in OpenDock FullCore 4.4 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the doc_directory parameter in (1) sw/index_sw.php; (2) cart.php, (3) lib_cart.php, (4) lib_read_cart.php, (5) lib_sys_cart.php, and (6) txt_info_cart.php in sw/lib_cart/; (7) comment.php, (8) find_comment.php, and (9) lib_comment.php in sw/lib_comment/; (10) sw/lib_find/find.php; and other unspecified PHP scripts.
secunia.com/advisories/22410
www.osvdb.org/29906
www.osvdb.org/29907
www.osvdb.org/29908
www.osvdb.org/29909
www.osvdb.org/29910
www.osvdb.org/29911
www.osvdb.org/29912
www.osvdb.org/29913
www.osvdb.org/29914
www.osvdb.org/29915
www.securityfocus.com/bid/20573
www.vupen.com/english/advisories/2006/4052
exchange.xforce.ibmcloud.com/vulnerabilities/29578
www.exploit-db.com/exploits/2570