
Cloud Vulnerability DB
A community-led vulnerabilities database
An off-by-one error in the DrainCol::drop destructor could cause an unsafe memory copy
operation to exceed the bounds of the associated vector.
The error was related to the size of the data being copied in one of the ptr::copy
invocations inside the destructor.
When removing the first column from a TooDee object, the DrainCol return object could cause
a heap buffer overflow vulnerability when it is dropped.
The issue was fixed in commit e6e16d5 by reducing the copied size by one.
Source: NVD
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."