{"vulnerability": "CVE-2020-3643", "sightings": [{"uuid": "fe17058f-19f3-4bf7-b005-fcbd0c8e9877", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-3643", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/115926387351405846", "content": "", "creation_timestamp": "2026-01-20T08:05:01.603524Z"}, {"uuid": "9d5fe1de-01b7-40a5-8952-2086b68b5259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-36434", "type": "seen", "source": "https://t.me/cibsecurity/26988", "content": "\u203c CVE-2020-36434 \u203c\n\nAn issue was discovered in the sys-info crate before 0.8.0 for Rust. sys_info::disk_info calls can trigger a double free.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-08T12:35:53.000000Z"}, {"uuid": "a3915db9-4ecc-4213-bf9a-2e573f829fd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-36432", "type": "seen", "source": "https://t.me/cibsecurity/26994", "content": "\u203c CVE-2020-36432 \u203c\n\nAn issue was discovered in the alg_ds crate through 2020-08-25 for Rust. There is a drop of uninitialized memory in Matrix::new().\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-08T12:41:34.000000Z"}, {"uuid": "5cdd45ff-a399-4301-bbea-d8014c7788e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-36436", "type": "seen", "source": "https://t.me/cibsecurity/26982", "content": "\u203c CVE-2020-36436 \u203c\n\nAn issue was discovered in the unicycle crate before 0.7.1 for Rust. PinSlab and Unordered do not have bounds on their Send and Sync traits.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-08T12:35:44.000000Z"}, {"uuid": "6a2638b1-cdb0-4ba7-b133-76366d406885", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-36438", "type": "seen", "source": "https://t.me/cibsecurity/26970", "content": "\u203c CVE-2020-36438 \u203c\n\nAn issue was discovered in the tiny_future crate before 0.4.0 for Rust. Future does not have bounds on its Send and Sync traits.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-08T12:35:27.000000Z"}, {"uuid": "0ecf6319-7670-432c-a0df-2c76707b21ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-36439", "type": "seen", "source": "https://t.me/cibsecurity/26985", "content": "\u203c CVE-2020-36439 \u203c\n\nAn issue was discovered in the ticketed_lock crate before 0.3.0 for Rust. There are unconditional implementations of Send for ReadTicket and WriteTicket.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-08T12:35:50.000000Z"}]}