This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate apimock

Dependencies

(14 total, 1 outdated, 2 possibly insecure)

CrateRequiredLatestStatus
 console^00.16.1up to date
 csv^11.4.0up to date
 http-body-util^00.1.3up to date
 hyper^11.8.1up to date
 hyper-util^00.1.19up to date
 json5^01.3.0out of date
 log^00.4.29up to date
 rhai^11.23.6up to date
 rustls ⚠️^00.23.35maybe insecure
 serde^11.0.228up to date
 serde_json^11.0.145up to date
 tokio^1.441.48.0up to date
 tokio-rustls ⚠️^00.26.4maybe insecure
 toml^00.9.8up to date

Dev dependencies

(4 total, all up-to-date)

CrateRequiredLatestStatus
 local-ip-address^00.6.8up to date
 rand^00.9.2up to date
 rcgen^00.14.6up to date
 reqwest^00.12.26up to date

Security Vulnerabilities

tokio-rustls: tokio-rustls reads may cause excessive memory usage

RUSTSEC-2020-0019

tokio-rustls does not call process_new_packets immediately after read, so the expected termination condition wants_read always returns true. As long as new incoming data arrives faster than it is processed and the reader does not return pending, data will be buffered.

This may cause DoS.

rustls: rustls network-reachable panic in `Acceptor::accept`

RUSTSEC-2024-0399

A bug introduced in rustls 0.23.13 leads to a panic if the received TLS ClientHello is fragmented. Only servers that use rustls::server::Acceptor::accept() are affected.

Servers that use tokio-rustls's LazyConfigAcceptor API are affected.

Servers that use tokio-rustls's TlsAcceptor API are not affected.

Servers that use rustls-ffi's rustls_acceptor_accept API are affected.