Users of the phpChess application for their website should take note of this new advisory posted on the Secunia website. It's related to a vulnerability that allows for multiple file inclusion, allowing for malicious code to be included. This issue is for Community Edition versions 2.x.
GolD_M has discovered some vulnerabilities in phpChess Community Edition, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system.
The issue surrounds the "root_path" parameter not being properly verified before the include happens. If register_globals is on, this could be overridden and malicious code could be injected. The recommended fix for the issue is to go in and correct the source code, making it validate the location of the file (and that it exists) before it is included.