espeak-ruby 1.0.0

1 security vulnerability found in version 1.0.0

espeak-ruby Gem for Ruby Arbitrary Command Execution

critical severity CVE-2016-10193
critical severity CVE-2016-10193
Patched versions: >= 1.0.3

espeak-ruby passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to the speak, save, bytes and bytes_wav methods in the lib/espeak/speech.rb library.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

Gem version without a license.


Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.

This gem version is available.


This gem version has not been yanked and is still available for usage.