CVE-2006-0478

CRE Loaded 6.15 allows remote attackers to perform privileged actions, including uploading and creating arbitrary files, via a direct request to files.php. NOTE: the vendor states "The initial announcement of this risk was made on our website... and it included a patch which will close the vulnerability on all known 6.0x and 6.1x releases. We strongly encourage users of CRE Loaded 6.x, osCMax, and other users of osCommerce who have installed HTMLArea based WYSIWYG editors and Admin Access with Levels to modify thier installations at the earliest possible moment."
Configurations

Configuration 1 (hide)

cpe:2.3:a:cre_loaded:cre_loaded:6.15:*:*:*:*:*:*:*

History

21 Nov 2024, 00:06

Type Values Removed Values Added
References () http://secunia.com/advisories/18648 - Patch, Vendor Advisory () http://secunia.com/advisories/18648 - Patch, Vendor Advisory
References () http://www.attrition.org/pipermail/vim/2006-February/000527.html - () http://www.attrition.org/pipermail/vim/2006-February/000527.html -
References () http://www.osvdb.org/22793 - () http://www.osvdb.org/22793 -
References () http://www.securityfocus.com/bid/16415 - Patch () http://www.securityfocus.com/bid/16415 - Patch
References () http://www.vupen.com/english/advisories/2006/0373 - () http://www.vupen.com/english/advisories/2006/0373 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24377 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24377 -

Information

Published : 2006-01-31 11:03

Updated : 2024-11-21 00:06


NVD link : CVE-2006-0478

Mitre link : CVE-2006-0478

CVE.ORG link : CVE-2006-0478


JSON object : View

Products Affected

cre_loaded

  • cre_loaded