PHP remote file inclusion vulnerability in includes/mailaccess/pop3.php in V-Webmail 1.5 through 1.6.4 allows remote attackers to execute arbitrary PHP code via a URL in the CONFIG[pear_dir] parameter.Referenceshttp://secunia.com/advisories/20297http://www.securityfocus.com/bid/30164https://www.exploit-db.com/exploits/1827https://exchange.xforce.ibmcloud.com/vulnerabilities/26694http://www.vupen.com/english/advisories/2006/1989http://securitytracker.com/id?1016160