Rust Lang Security Vulnerabilities (CVEs)
Track 11 security vulnerabilities affecting Rust Lang products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
CVE-2024-3566 is a command injection vulnerability affecting Windows applications that use CreateProcess function with improper argument quoting. Atta...
Apr 10, 2024This critical vulnerability in Rust's standard library allows arbitrary command execution when spawning batch files on Windows with untrusted argument...
Apr 9, 2024Cargo, Rust's package manager, didn't respect the umask when extracting crate archives on UNIX-like systems, allowing local users to modify downloaded...
Aug 4, 2023CVE-2022-24713 is a vulnerability in the Rust regex crate where built-in mitigations against regex-based denial of service attacks can be bypassed. Th...
Mar 8, 2022This vulnerability allows attackers to bypass IP-based access controls by using IP addresses with leading zeros, which Rust incorrectly interprets as ...
Aug 7, 2021This vulnerability in Rust's standard library before version 1.52.0 allows uninitialized memory exposure or program crashes when joining strings. It o...
Apr 14, 2021CVE-2021-31162 is a double-free vulnerability in Rust's standard library Vec::from_iter function that occurs when freeing an element panics, potential...
Apr 14, 2021This vulnerability in Rust's standard library before version 1.2.0 allows memory safety violations when BinaryHeap operations panic. It affects any Ru...
Apr 11, 2021A double-free vulnerability in Rust's VecDeque::make_contiguous function allows attackers to cause use-after-free or double-free conditions, potential...
Apr 11, 2021This vulnerability in Rust's standard library before version 1.51.0 allows memory safety violations when using nested Zip iterators. The bug causes th...
Apr 11, 2021This vulnerability in Rust's standard library before version 1.52.0 involves an integer overflow in the Zip iterator implementation. When a consumed Z...
Apr 11, 2021Why Monitor Rust Lang Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 11+ known vulnerabilities affecting Rust Lang products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Rust Lang packages in under 60 seconds. No agents required - completely agentless scanning that works across Rust Lang deployments.
Free vulnerability database: Access detailed information about every Rust Lang CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Rust Lang CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions