← Volver a CVEs
CVE-2016-10193
N/ADescripcion
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado3/3/2017
Ultima modificacion4/20/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
espeak-ruby_project:espeak-ruby
Debilidades (CWE)
CWE-284
Referencias
http://www.openwall.com/lists/oss-security/2017/01/31/14(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2017/02/02/5(cve@mitre.org)
https://github.com/dejan/espeak-ruby/issues/7(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2017/01/31/14(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2017/02/02/5(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/dejan/espeak-ruby/issues/7(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.