{"id":"CVE-2021-29932","details":"An issue was discovered in the parse_duration crate through 2021-03-18 for Rust. It allows attackers to cause a denial of service (CPU and memory consumption) via a duration string with a large exponent.","aliases":["CAN-2021-1000007","GHSA-qpgv-g792-wh6x","RUSTSEC-2021-0041"],"modified":"2026-03-14T10:57:15.969475Z","published":"2021-04-01T05:15:14.420Z","references":[{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2021-0041.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2021-03-18"}]},{"events":[{"introduced":"0"},{"last_affected":"2021-03-18"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-29932.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}