Multiple PHP remote file inclusion vulnerabilities in Turnkey Web Tools PHP Live Helper 1.8 allow remote attackers to include and execute arbitrary PHP code via the abs_path parameter in (1) initiate.php, (2) waiting.php, (3) welcome.php, (4) admin/index.php, (5) javascript.php, (6) checkchat.php, and (7) blank.php.
secunia.com/advisories/19428
www.osvdb.org/24193
www.osvdb.org/24194
www.osvdb.org/24195
www.osvdb.org/24196
www.osvdb.org/24197
www.osvdb.org/24198
www.osvdb.org/24199
www.securityfocus.com/archive/1/428976/100/0/threaded
www.securityfocus.com/archive/1/437648/100/0/threaded
www.securityfocus.com/archive/1/437741/100/0/threaded
www.securityfocus.com/bid/18509
www.turnkeywebtools.com/forum/showthread.php?p=10415
www.vupen.com/english/advisories/2006/1137
www.worlddefacers.de/Public/WD-TMPLH.txt
exchange.xforce.ibmcloud.com/vulnerabilities/25489