Количество 8
Количество 8

CVE-2020-36323
In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

CVE-2020-36323
In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

CVE-2020-36323
In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

CVE-2020-36323
CVE-2020-36323
In the standard library in Rust before 1.52.0, there is an optimizatio ...
GHSA-9v8g-q8xx-7374
In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

RLSA-2021:3063
Moderate: rust-toolset:rhel8 security, bug fix, and enhancement update
ELSA-2021-3063
ELSA-2021-3063: rust-toolset:ol8 security, bug fix, and enhancement update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2020-36323 In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked. | CVSS3: 8.2 | 1% Низкий | больше 4 лет назад |
![]() | CVE-2020-36323 In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked. | CVSS3: 8.2 | 1% Низкий | больше 4 лет назад |
![]() | CVE-2020-36323 In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked. | CVSS3: 8.2 | 1% Низкий | больше 4 лет назад |
![]() | CVSS3: 8.2 | 1% Низкий | больше 4 лет назад | |
CVE-2020-36323 In the standard library in Rust before 1.52.0, there is an optimizatio ... | CVSS3: 8.2 | 1% Низкий | больше 4 лет назад | |
GHSA-9v8g-q8xx-7374 In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked. | CVSS3: 8.2 | 1% Низкий | около 3 лет назад | |
![]() | RLSA-2021:3063 Moderate: rust-toolset:rhel8 security, bug fix, and enhancement update | почти 4 года назад | ||
ELSA-2021-3063 ELSA-2021-3063: rust-toolset:ol8 security, bug fix, and enhancement update (MODERATE) | почти 4 года назад |
Уязвимостей на страницу