lib/execute/execSetResults.php in TestLink before 1.9.13 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the filter_result_result parameter.
karmainsecurity.com/KIS-2014-11
mantis.testlink.org/view.php?id=6651
seclists.org/fulldisclosure/2014/Oct/105
www.securityfocus.com/archive/1/533798/100/0/threaded
www.securityfocus.com/bid/70711
exchange.xforce.ibmcloud.com/vulnerabilities/97727
gitorious.org/testlink-ga/testlink-code/commit/a519da3a45d80077e4eab957eb793b03652f57dc