{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T21:57:38.915","vulnerabilities":[{"cve":{"id":"CVE-2026-30960","sourceIdentifier":"security-advisories@github.com","published":"2026-03-10T18:18:55.227","lastModified":"2026-03-11T13:53:20.707","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"rssn is a scientific computing library for Rust, combining a high-performance symbolic computation engine with numerical methods support and physics simulations functionalities. The vulnerability exists in the JIT (Just-In-Time) compilation engine, which is fully exposed via the CFFI (Foreign Function Interface). Due to Improper Input Validation and External Control of Code Generation, an attacker can supply malicious parameters or instruction sequences through the CFFI layer. Since the library often operates with elevated privileges or within high-performance computing contexts, this allows for Arbitrary Code Execution (ACE) at the privilege level of the host process."},{"lang":"es","value":"rssn es una biblioteca de computación científica para Rust, que combina un motor de computación simbólica de alto rendimiento con soporte para métodos numéricos y funcionalidades de simulaciones físicas. La vulnerabilidad existe en el motor de compilación JIT (Just-In-Time), que está completamente expuesto a través de la CFFI (Foreign Function Interface). Debido a una validación de entrada inadecuada y al control externo de la generación de código, un atacante puede suministrar parámetros maliciosos o secuencias de instrucciones a través de la capa CFFI. Dado que la biblioteca a menudo opera con privilegios elevados o dentro de contextos de computación de alto rendimiento, esto permite la ejecución de código arbitrario (ACE) al nivel de privilegio del proceso anfitrión."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.4,"baseSeverity":"CRITICAL","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-94"},{"lang":"en","value":"CWE-269"},{"lang":"en","value":"CWE-695"},{"lang":"en","value":"CWE-754"}]}],"references":[{"url":"https://github.com/Apich-Organization/rssn/releases/tag/v0.2.9","source":"security-advisories@github.com"},{"url":"https://github.com/Apich-Organization/rssn/security/advisories/GHSA-9c4h-pwmf-m6fj","source":"security-advisories@github.com"},{"url":"https://rustsec.org/advisories/RUSTSEC-2026-0038.html","source":"security-advisories@github.com"}]}}]}