### [CVE-2019-10780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10780) ![](https://img.shields.io/static/v1?label=Product&message=BibTeX-ruby&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection&color=brighgreen) ### Description BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby Kernel.open method through BibTeX.open. ### POC #### Reference - https://snyk.io/vuln/SNYK-RUBY-BIBTEXRUBY-542602 - https://snyk.io/vuln/SNYK-RUBY-BIBTEXRUBY-542602 #### Github No PoCs found on GitHub currently.