Vulnerability Description
Buffer overflow in the addnewword function in typespeed 0.4.4 and earlier might allow remote attackers to execute arbitrary code via unknown vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typespeed | Typespeed | 0.2 |
References
- http://secunia.com/advisories/20379Vendor Advisory
- http://secunia.com/advisories/20393PatchVendor Advisory
- http://secunia.com/advisories/20708
- http://www.debian.org/security/2006/dsa-1084PatchVendor Advisory
- http://www.gentoo.org/security/en/glsa/glsa-200606-20.xml
- http://www.securityfocus.com/bid/18194
- http://www.vupen.com/english/advisories/2006/2087
- http://secunia.com/advisories/20379Vendor Advisory
- http://secunia.com/advisories/20393PatchVendor Advisory
- http://secunia.com/advisories/20708
- http://www.debian.org/security/2006/dsa-1084PatchVendor Advisory
- http://www.gentoo.org/security/en/glsa/glsa-200606-20.xml
- http://www.securityfocus.com/bid/18194
- http://www.vupen.com/english/advisories/2006/2087
FAQ
What is CVE-2006-1515?
CVE-2006-1515 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the addnewword function in typespeed 0.4.4 and earlier might allow remote attackers to execute arbitrary code via unknown vectors.
How severe is CVE-2006-1515?
CVE-2006-1515 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1515?
Check the references section above for vendor advisories and patch information. Affected products include: Typespeed Typespeed.