Critical severity9.8NVD Advisory· Published Apr 28, 2017· Updated May 13, 2026
CVE-2017-2096
CVE-2017-2096
Description
smalruby-editor v0.4.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
smalruby-editorRubyGems | < 0.4.1 | 0.4.1 |
smalrubyRubyGems | < 0.1.11 | 0.1.11 |
Affected products
2- Range: v0.4.0 and earlier
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- jvn.jp/en/jp/JVN50197114/index.htmlnvdThird Party AdvisoryVDB EntryWEB
- smalruby.jp/blog/2017/01/14/smalruby-editor-0-4-1-has-been-released-english.htmlnvdRelease NotesVendor AdvisoryWEB
- www.securityfocus.com/bid/95775nvdThird Party AdvisoryVDB Entry
- github.com/advisories/GHSA-f489-655r-x6grghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-2096ghsaADVISORY
- github.com/rubysec/ruby-advisory-db/blob/master/gems/smalruby/CVE-2017-2096.ymlghsaWEB
- web.archive.org/web/20200227194312/http://www.securityfocus.com/bid/95775ghsaWEB
News mentions
0No linked articles in our index yet.