CVE-2008-5764

WorkSimple 1.2.1 - Code Injection

Title source: llm
STIX 2.1

Description

PHP remote file inclusion vulnerability in calendar.php in WorkSimple 1.2.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the lang parameter.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Osirys · textwebappsphp
https://www.exploit-db.com/exploits/7481

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/47361
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7481
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33163
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/50726
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/32849
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/4831

Scores

EPSS 0.3869
EPSS Percentile 97.3%

Details

CWE
CWE-94
Status published
Products (1)
2500mhz/worksimple 1.2.1
Published Dec 30, 2008
Tracked Since Feb 18, 2026