
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-pr59-jjr4-gcf6) affects the anon-vec Rust crate, which was identified to have insufficient checks in its public API. Initially reported on May 6, 2025, and officially issued on June 2, 2025, this vulnerability impacts versions 0.1.1 and below of the anon-vec crate. The vulnerability has been classified with a Low severity rating (GitHub Advisory, RustSec).
The vulnerability stems from unsound implementations in three key functions of the AnonVec crate: AnonVec::getref(), AnonVec::getmut(), and AnonVec::remove_get(). These functions lack proper argument validation, potentially leading to memory corruption issues. The vulnerability has been classified with CWE-20 (GitHub Advisory, Wiz).
The insufficient checks in the public API functions could lead to memory corruption issues when using the affected functions. The impact is particularly concerning as it affects core vector operations including reference retrieval and element removal (RustSec).
Currently, there are no patched versions available for this vulnerability. Given that the crate was built as a learning project and is not being maintained, users are advised to seek alternative implementations or crates for their vector operations (RustSec).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."