CVE-2006-0478

critical

Description

CRE Loaded 6.15 allows remote attackers to perform privileged actions, including uploading and creating arbitrary files, via a direct request to files.php. NOTE: the vendor states "The initial announcement of this risk was made on our website... and it included a patch which will close the vulnerability on all known 6.0x and 6.1x releases. We strongly encourage users of CRE Loaded 6.x, osCMax, and other users of osCommerce who have installed HTMLArea based WYSIWYG editors and Admin Access with Levels to modify thier installations at the earliest possible moment."

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/24377

http://www.vupen.com/english/advisories/2006/0373

http://www.securityfocus.com/bid/16415

http://www.osvdb.org/22793

http://www.attrition.org/pipermail/vim/2006-February/000527.html

http://secunia.com/advisories/18648

Details

Source: Mitre, NVD

Published: 2006-01-31

Updated: 2026-04-16

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.07607