{"uuid": "52e63e02-d1e6-49b4-9f86-4eaf785362cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24576", "type": "seen", "source": "https://t.me/theninjaway1337/1524", "content": "Critical Vulnerability in Rust on Windows\n\nThe vulnerability, identified as\u00a0CVE-2024-24576\u00a0with a CVSS score of 10, stems from improper sanitisation of command-line arguments which could be manipulated to execute arbitrary commands. This issue affects all Rust versions prior to 1.77.2 on Windows if a program's code or one of its dependencies invokes and executes batch files with untrusted arguments [1].\n\nhttps://cert.europa.eu/publications/security-advisories/2024-035/", "creation_timestamp": "2024-04-15T00:16:46.000000Z"}