lib/functions/database.class.php in TestLink before 1.9.13 allows remote attackers to obtain sensitive information via unspecified vectors, which reveals the installation path in an error message.
References
Configurations
History
21 Nov 2024, 02:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://karmainsecurity.com/KIS-2014-12 - Exploit, Patch | |
References | () http://mantis.testlink.org/view.php?id=6651 - Vendor Advisory | |
References | () http://packetstormsecurity.com/files/128824/TestLink-1.9.12-Path-Disclosure.html - Exploit, Patch | |
References | () http://seclists.org/fulldisclosure/2014/Oct/106 - Exploit, Patch | |
References | () http://www.securityfocus.com/archive/1/533799/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/70713 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/97728 - | |
References | () https://gitorious.org/testlink-ga/testlink-code/commit/c943e7a397f03e1f60b096c7e6eb94fdefd8a569 - |
Information
Published : 2014-10-31 14:55
Updated : 2024-11-21 02:18
NVD link : CVE-2014-8082
Mitre link : CVE-2014-8082
CVE.ORG link : CVE-2014-8082
JSON object : View
Products Affected
testlink
- testlink
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor