I have discovered a remote file include vulnerability in the sharedlog Content management system.
http://www.shatm.com/
http://sourceforge.net/projects/sharedlog/
Vulnerable code segment:
require_once($GLOBALS['root_dir'].'classes/!class.memcache.inc.php');
Line 5 of slideshow_uploadvideo.content.php
As usual,Successful exploitation requires that "register_globals" is enabled.
Happy hacking.