Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9c4h-pwmf-m6fj | RSSN has Arbitrary Code Execution via Unvalidated JIT Instruction Generation in C-FFI Interface |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | rssn is a scientific computing library for Rust, combining a high-performance symbolic computation engine with numerical methods support and physics simulations functionalities. The vulnerability exists in the JIT (Just-In-Time) compilation engine, which is fully exposed via the CFFI (Foreign Function Interface). Due to Improper Input Validation and External Control of Code Generation, an attacker can supply malicious parameters or instruction sequences through the CFFI layer. Since the library often operates with elevated privileges or within high-performance computing contexts, this allows for Arbitrary Code Execution (ACE) at the privilege level of the host process. | |
| Title | RSSN has Arbitrary Code Execution via Unvalidated JIT Instruction Generation in C-FFI Interface | |
| Weaknesses | CWE-269 CWE-695 CWE-754 CWE-94 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-10T17:58:17.359Z
Reserved: 2026-03-07T17:34:39.981Z
Link: CVE-2026-30960
Updated: 2026-03-10T17:58:13.752Z
Status : Received
Published: 2026-03-10T18:18:55.227
Modified: 2026-03-10T18:18:55.227
Link: CVE-2026-30960
No data.
OpenCVE Enrichment
No data.
Github GHSA