CRE Loaded 6.15 allows remote attackers to perform privileged actions, including uploading and creating arbitrary files, via a direct request to files.php. NOTE: the vendor states "The initial announcement of this risk was made on our website... and it included a patch which will close the vulnerability on all known 6.0x and 6.1x releases. We strongly encourage users of CRE Loaded 6.x, osCMax, and other users of osCommerce who have installed HTMLArea based WYSIWYG editors and Admin Access with Levels to modify thier installations at the earliest possible moment."
References
Configurations
History
21 Nov 2024, 00:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18648 - Patch, Vendor Advisory | |
References | () http://www.attrition.org/pipermail/vim/2006-February/000527.html - | |
References | () http://www.osvdb.org/22793 - | |
References | () http://www.securityfocus.com/bid/16415 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/0373 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24377 - |
Information
Published : 2006-01-31 11:03
Updated : 2024-11-21 00:06
NVD link : CVE-2006-0478
Mitre link : CVE-2006-0478
CVE.ORG link : CVE-2006-0478
JSON object : View
Products Affected
cre_loaded
- cre_loaded
CWE