Multiple SQL injection vulnerabilities in TestLink through 1.9.19 allows remote authenticated users to execute arbitrary SQL commands via the (1) tprojectid parameter to keywordsView.php; the (2) reqspecid parameter to reqSpecCompareRevisions.php; the (3) requirementid parameter to reqCompareVersions.php; the (4) buildid parameter to planUpdateTC.php; the (5) tplanid parameter to newesttcversions.php; the (6) tplanid parameter to tcCreatedPerUserGUI.php; the (7) tcaseid parameter to tcAssign2Tplan.php; or the (8) testcaseid parameter to tcCompareVersions.php. Authentication is often easy to achieve: a guest account, that can execute this attack, can be created by anyone in the default configuration.