connection.php in FlashChat 5.0.8 allows remote attackers to bypass the role filter mechanism and gain administrative privileges by setting the s parameter to "7."
- http://packetstorm.linuxsecurity.com/0810-exploits/flashchat-bypass.txt
No PoCs found on GitHub currently.