← Back to CVEs
CVE-2016-10193
N/ADescription
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
CVE Details
CVSS v3.1 ScoreN/A
Published3/3/2017
Last Modified4/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
espeak-ruby_project:espeak-ruby
Weaknesses (CWE)
CWE-284
References
http://www.openwall.com/lists/oss-security/2017/01/31/14(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2017/02/02/5(cve@mitre.org)
https://github.com/dejan/espeak-ruby/issues/7(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2017/01/31/14(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2017/02/02/5(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/dejan/espeak-ruby/issues/7(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.