This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate axum_typed_multipart

Dependencies

(13 total, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.721.0.95up to date
 async-trait^0.1.840.1.86up to date
 axum^0.8.10.8.1up to date
 axum_typed_multipart_macros^0.15.10.15.1up to date
 bytes^1.7.11.10.0up to date
 chrono ⚠️^0.4.00.4.39maybe insecure
 futures-core^0.3.310.3.31up to date
 futures-util^0.3.310.3.31up to date
 rust_decimal^1.20.01.36.0up to date
 tempfile^3.1.03.17.0up to date
 thiserror^2.0.02.0.11up to date
 tokio^1.25.01.43.0up to date
 uuid^1.0.01.13.1up to date

Dev dependencies

(5 total, 1 outdated)

CrateRequiredLatestStatus
 reqwest^0.12.120.12.12up to date
 serde^1.0.1931.0.217up to date
 tokio^1.25.01.43.0up to date
 utoipa^5.3.15.3.1up to date
 utoipa-rapidoc^5.0.16.0.0out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References