← Retour aux CVEs
CVE-2016-10193
N/ADescription
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
Details CVE
Score CVSS v3.1N/A
Publie3/3/2017
Derniere modification4/20/2025
Sourcenvd
Observations honeypot0
Produits affectes
espeak-ruby_project:espeak-ruby
Faiblesses (CWE)
CWE-284
References
http://www.openwall.com/lists/oss-security/2017/01/31/14(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2017/02/02/5(cve@mitre.org)
https://github.com/dejan/espeak-ruby/issues/7(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2017/01/31/14(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2017/02/02/5(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/dejan/espeak-ruby/issues/7(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.