The Sharedlog Content Management System suffers from a remote file inclusion vulnerability.
aa6fc1c056c7d1081edd9d2abca881f8c62f87fbabf864352b4724dc744a6a39
I have discovered a remote file include vulnerability in the sharedlog Content management system.
http://www.shatm.com/
http://sourceforge.net/projects/sharedlog/
Vulnerable code segment:
require_once($GLOBALS['root_dir'].'classes/!class.memcache.inc.php');
Line 5 of slideshow_uploadvideo.content.php
As usual,Successful exploitation requires that "register_globals" is enabled.
Happy hacking.