Vulnerabilities > Rust Lang > Rust
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-04-11 | CVE-2021-28877 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Rust-Lang Rust In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. | 7.5 |
2021-04-11 | CVE-2021-28876 | Improper Handling of Exceptional Conditions vulnerability in multiple products In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. | 5.3 |
2021-04-11 | CVE-2021-28875 | Unchecked Return Value vulnerability in Rust-Lang Rust In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. | 7.5 |
2021-04-11 | CVE-2020-36318 | Use After Free vulnerability in Rust-Lang Rust 1.48.0 In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. | 9.8 |
2021-04-11 | CVE-2020-36317 | Out-of-bounds Write vulnerability in Rust-Lang Rust In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. | 7.5 |
2021-04-11 | CVE-2015-20001 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Rust-Lang Rust In the standard library in Rust before 1.2.0, BinaryHeap is not panic-safe. | 7.5 |
2019-09-30 | CVE-2019-16760 | Download of Code Without Integrity Check vulnerability in Rust-Lang Rust Cargo prior to Rust 1.26.0 may download the wrong dependency if your package.toml file uses the `package` configuration key. | 7.5 |
2019-07-15 | CVE-2019-1010299 | Use of Uninitialized Resource vulnerability in Rust-Lang Rust The Rust Programming Language Standard Library 1.18.0 and later is affected by: CWE-200: Information Exposure. | 5.3 |
2019-05-13 | CVE-2019-12083 | Out-of-bounds Write vulnerability in multiple products The Rust Programming Language Standard Library 1.34.x before 1.34.2 contains a stabilized method which, if overridden, can violate Rust's safety guarantees and cause memory unsafety. | 8.1 |
2018-10-08 | CVE-2018-1000810 | Integer Overflow or Wraparound vulnerability in Rust-Lang Rust The Rust Programming Language Standard Library version 1.29.0, 1.28.0, 1.27.2, 1.27.1, 127.0, 126.2, 126.1, 126.0 contains a CWE-680: Integer Overflow to Buffer Overflow vulnerability in standard library that can result in buffer overflow. | 9.8 |