Multiple PHP remote file inclusion vulnerabilities in phpRaid 3.0.4 and 3.0.5 allow remote attackers to execute arbitrary code via a URL in the phpraid_dir parameter to (1) configuration.php, (3) guilds.php, (4) index.php, (5) locations.php, (6) login.php, (7) lua_output.php, (8) permissions.php, (9) profile.php, (10) raids.php, (11) register.php, (12) roster.php, and (13) view.php.Referenceshttp://www.osvdb.org/26893http://www.osvdb.org/26902http://www.osvdb.org/26901http://www.osvdb.org/26899http://secunia.com/secunia_research/2006-47/advisory/http://www.securityfocus.com/bid/18719https://exchange.xforce.ibmcloud.com/vulnerabilities/27465http://www.osvdb.org/26892http://www.osvdb.org/26896http://www.osvdb.org/26891http://www.osvdb.org/26895http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0824.htmlhttp://www.osvdb.org/26894http://www.osvdb.org/26900http://www.osvdb.org/26897http://www.osvdb.org/26898http://secunia.com/advisories/20200