espeak-ruby 1.0.0
1 security vulnerability
found in version
1.0.0
espeak-ruby Gem for Ruby Arbitrary Command Execution
critical severity CVE-2016-10193
critical severity
CVE-2016-10193
Patched versions:
>= 1.0.3
espeak-ruby passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to the speak, save, bytes and bytes_wav methods in the lib/espeak/speech.rb library.
No officially reported memory leakage issues detected.
This gem version does not have any officially reported memory leaked issues.
Gem version without a license.
Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.
This gem version is available.
This gem version has not been yanked and is still available for usage.