Buffer overflow in the addnewword function in typespeed 0.4.4 and earlier might allow remote attackers to execute arbitrary code via unknown vectors.
References
Link | Resource |
---|---|
http://secunia.com/advisories/20379 | Vendor Advisory |
http://secunia.com/advisories/20393 | Patch Vendor Advisory |
http://secunia.com/advisories/20708 | |
http://www.debian.org/security/2006/dsa-1084 | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200606-20.xml | |
http://www.securityfocus.com/bid/18194 | |
http://www.vupen.com/english/advisories/2006/2087 | |
http://secunia.com/advisories/20379 | Vendor Advisory |
http://secunia.com/advisories/20393 | Patch Vendor Advisory |
http://secunia.com/advisories/20708 | |
http://www.debian.org/security/2006/dsa-1084 | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200606-20.xml | |
http://www.securityfocus.com/bid/18194 | |
http://www.vupen.com/english/advisories/2006/2087 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20379 - Vendor Advisory | |
References | () http://secunia.com/advisories/20393 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/20708 - | |
References | () http://www.debian.org/security/2006/dsa-1084 - Patch, Vendor Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200606-20.xml - | |
References | () http://www.securityfocus.com/bid/18194 - | |
References | () http://www.vupen.com/english/advisories/2006/2087 - |
Information
Published : 2006-05-31 18:02
Updated : 2024-11-21 00:09
NVD link : CVE-2006-1515
Mitre link : CVE-2006-1515
CVE.ORG link : CVE-2006-1515
JSON object : View
Products Affected
typespeed
- typespeed
CWE