CVE-2024-43402
- EPSS 0.34%
- Published 04.09.2024 16:15:06
- Last modified 01.10.2024 15:12:09
Rust is a programming language. The fix for CVE-2024-24576, where `std::process::Command` incorrectly escaped arguments when invoking batch files on Windows, was incomplete. Prior to Rust version 1.81.0, it was possible to bypass the fix when the bat...
CVE-2024-3566
- EPSS 5.83%
- Published 10.04.2024 16:15:16
- Last modified 25.06.2025 20:24:12
A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.
- EPSS 83.88%
- Published 09.04.2024 18:15:08
- Last modified 21.11.2024 08:59:27
Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `...
CVE-2023-40030
- EPSS 0.13%
- Published 24.08.2023 23:15:09
- Last modified 21.11.2024 08:18:33
Cargo downloads a Rust project’s dependencies and compiles the project. Starting in Rust 1.60.0 and prior to 1.72, Cargo did not escape Cargo feature names when including them in the report generated by `cargo build --timings`. A malicious package in...
CVE-2022-21658
- EPSS 0.89%
- Published 20.01.2022 18:15:07
- Last modified 21.11.2024 06:45:10
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a r...
CVE-2021-29922
- EPSS 0.18%
- Published 07.08.2021 17:15:06
- Last modified 21.11.2024 06:01:59
library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, be...
CVE-2021-31162
- EPSS 0.83%
- Published 14.04.2021 07:15:12
- Last modified 21.11.2024 06:05:12
In the standard library in Rust before 1.52.0, a double free can occur in the Vec::from_iter function if freeing the element panics.
CVE-2020-36323
- EPSS 0.71%
- Published 14.04.2021 07:15:12
- Last modified 21.11.2024 05:29:16
In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
CVE-2018-25008
- EPSS 0.31%
- Published 14.04.2021 07:15:11
- Last modified 21.11.2024 04:03:20
In the standard library in Rust before 1.29.0, there is weak synchronization in the Arc::get_mut method. This synchronization issue can be lead to memory safety issues through race conditions.
CVE-2017-20004
- EPSS 0.24%
- Published 14.04.2021 07:15:11
- Last modified 21.11.2024 03:22:25
In the standard library in Rust before 1.19.0, there is a synchronization problem in the MutexGuard object. MutexGuards can be used across threads with any types, allowing for memory safety issues through race conditions.