{"id":"CVE-2017-2096","details":"smalruby-editor v0.4.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.","aliases":["GHSA-f489-655r-x6gr"],"modified":"2026-04-11T18:29:10.499547Z","published":"2017-04-28T16:59:00.577Z","references":[{"type":"ADVISORY","url":"http://jvn.jp/en/jp/JVN50197114/index.html"},{"type":"ADVISORY","url":"http://smalruby.jp/blog/2017/01/14/smalruby-editor-0-4-1-has-been-released-english.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95775"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/smalruby/smalruby-editor","events":[{"introduced":"0"},{"last_affected":"6c120959c93440e47f1721d9212c5b357056a9bd"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"0.4.0"}],"cpe":"cpe:2.3:a:smalruby:smalruby-editor:*:*:*:*:*:*:*:*"}}],"versions":["v0.0.1","v0.0.10","v0.0.11","v0.0.12","v0.0.2","v0.0.3","v0.0.4","v0.0.5","v0.0.6","v0.0.7","v0.0.8","v0.0.9","v0.1.0","v0.1.1","v0.1.10","v0.1.11","v0.1.12","v0.1.13","v0.1.14","v0.1.15","v0.1.16","v0.1.17","v0.1.18","v0.1.19","v0.1.2","v0.1.20","v0.1.21","v0.1.22","v0.1.23","v0.1.24","v0.1.3","v0.1.4","v0.1.5","v0.1.6","v0.1.7","v0.1.8","v0.1.9","v0.2.0","v0.2.1","v0.2.2","v0.2.3","v0.2.4","v0.2.5","v0.2.6","v0.2.7","v0.3.0","v0.3.1","v0.3.2","v0.3.3","v0.3.4","v0.3.5","v0.4.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-2096.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}