
Cloud Vulnerability DB
A community-led vulnerabilities database
Affected versions allow arbitrary caller-provided code to execute before the
lifetime of main.
If the caller-provided code accesses particular pieces of the standard library
that require an initialized Rust runtime, such as std::io or std::thread,
these may not behave as documented. Panics are likely; UB is possible.
The flaw was corrected by enforcing that only code written within the
inventory crate, which is guaranteed not to access runtime-dependent parts of
the standard library, runs before main. Caller-provided code is restricted to
running at compile time.
Source: NVD
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."