Unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 Sirius and earlier allows remote attackers to execute arbitrary PHP code via a filepath parameter that contains a filename with a .php extension, which is uploaded to the img/wiki/ directory.
isc.sans.org/diary.php?storyid=1672
secunia.com/advisories/21733
secunia.com/advisories/22100
security.gentoo.org/glsa/glsa-200609-16.xml
tikiwiki.org/tiki-read_article.php?articleId=136
www.osvdb.org/28456
www.securityfocus.com/bid/19819
www.vupen.com/english/advisories/2006/3450
www.exploit-db.com/exploits/2288