edit_image.php in Vibechild Directory Manager before 0.91 allows remote attackers to execute arbitrary commands via shell metacharacters in the userfile_name parameter, which is sent unfiltered to the PHP passthru function.
https://exchange.xforce.ibmcloud.com/vulnerabilities/7079
http://www.securityfocus.com/bid/3288
http://sourceforge.net/project/shownotes.php?release_id=51589
http://archives.neohapsis.com/archives/bugtraq/2001-09/0013.html