Show filters
32 Total Results
Displaying 11-20 of 32
Sort by:
Attacker Value
Unknown

CVE-2020-8639

Disclosure Date: April 03, 2020 (last updated February 21, 2025)
An unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by uploading a file with an executable extension. This allows an authenticated attacker to upload a malicious file (containing PHP code to execute operating system commands) to a publicly accessible directory of the application.
Attacker Value
Unknown

CVE-2019-20107

Disclosure Date: March 05, 2020 (last updated February 21, 2025)
Multiple SQL injection vulnerabilities in TestLink through 1.9.19 allows remote authenticated users to execute arbitrary SQL commands via the (1) tproject_id parameter to keywordsView.php; the (2) req_spec_id parameter to reqSpecCompareRevisions.php; the (3) requirement_id parameter to reqCompareVersions.php; the (4) build_id parameter to planUpdateTC.php; the (5) tplan_id parameter to newest_tcversions.php; the (6) tplan_id parameter to tcCreatedPerUserGUI.php; the (7) tcase_id parameter to tcAssign2Tplan.php; or the (8) testcase_id parameter to tcCompareVersions.php. Authentication is often easy to achieve: a guest account, that can execute this attack, can be created by anyone in the default configuration.
Attacker Value
Unknown

CVE-2020-8841

Disclosure Date: February 10, 2020 (last updated February 21, 2025)
An issue was discovered in TestLink 1.9.19. The relation_type parameter of the lib/requirements/reqSearch.php endpoint is vulnerable to authenticated SQL Injection.
Attacker Value
Unknown

CVE-2019-20381

Disclosure Date: January 20, 2020 (last updated February 21, 2025)
TestLink before 1.9.20 allows XSS via non-lowercase javascript: in the index.php reqURI parameter. NOTE: this issue exists because of an incomplete fix for CVE-2019-19491.
Attacker Value
Unknown

CVE-2019-19491

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
TestLink 1.9.19 has XSS via the lib/testcases/archiveData.php edit parameter, the index.php reqURI parameter, or the URI in a lib/testcases/tcEdit.php?doAction=doDeleteStep request.
Attacker Value
Unknown

CVE-2019-10378

Disclosure Date: August 07, 2019 (last updated October 26, 2023)
Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Attacker Value
Unknown

CVE-2019-14471

Disclosure Date: August 01, 2019 (last updated November 27, 2024)
TestLink 1.9.19 has XSS via the error.php message parameter.
0
Attacker Value
Unknown

CVE-2018-1000113

Disclosure Date: March 13, 2018 (last updated November 26, 2024)
A cross-site scripting vulnerability exists in Jenkins TestLink Plugin 2.12 and earlier in TestLinkBuildAction/summary.jelly and others that allow an attacker who can control e.g. TestLink report names to have Jenkins serve arbitrary HTML and JavaScript
0
Attacker Value
Unknown

CVE-2018-7668

Disclosure Date: March 05, 2018 (last updated November 26, 2024)
TestLink through 1.9.16 allows remote attackers to read arbitrary attachments via a modified ID field to /lib/attachments/attachmentdownload.php.
0
Attacker Value
Unknown

CVE-2018-7466

Disclosure Date: February 25, 2018 (last updated November 26, 2024)
install/installNewDB.php in TestLink through 1.9.16 allows remote attackers to conduct injection attacks by leveraging control over DB LOGIN NAMES data during installation to provide a long, crafted value.
0