The Rust Security Response WG handles vulnerability reports and security issues for all the repositories in the rust-lang and rust-lang-nursery organizations. If you found a vulnerability please report it according to the security policy on our website. Thanks!
Security: rust-lang/rust
Security
SECURITY.md
- 
  Rust standard library didn't detect all path separators on CygwinGHSA-rv9c-3mvf-cw9h publishedOct 1, 2025 by pietroalbiniModerate
- 
  `std::process::Command` batch files argument escaping could be bypassed with trailing whitespace or periodsGHSA-2xg3-7mm6-98jj publishedSep 4, 2024 by pietroalbiniLow
- 
  `std::process::Command` did not properly escape arguments of batch files on WindowsGHSA-q455-m56c-85mh publishedApr 9, 2024 by pietroalbiniCritical
- 
  Race condition in std::fs::remove_dir_allGHSA-r9cc-f5pr-p3j2 publishedJan 20, 2022 by pietroalbiniHigh
- 
  rustc and bidirectional-override codepoints in source codeGHSA-rcv6-wg5m-24v6 publishedNov 1, 2021 by steveklabnikModerate
- 
  Cargo prior to Rust 1.26.0 may download the wrong dependencyGHSA-phjm-8x66-qw4r publishedSep 30, 2019 by alexcrichtonModerate
         Learn more about advisories related to rust-lang/rust in the GitHub Advisory Database