This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate axum_typed_multipart

Dependencies

(13 total, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.721.0.98up to date
 async-trait^0.1.840.1.88up to date
 axum^0.8.10.8.4up to date
 axum_typed_multipart_macros^0.16.30.16.3up to date
 bytes^1.7.11.10.1up to date
 chrono ⚠️^0.4.00.4.41maybe insecure
 futures-core^0.3.310.3.31up to date
 futures-util^0.3.310.3.31up to date
 rust_decimal^1.20.01.37.2up to date
 tempfile^3.1.03.20.0up to date
 thiserror^2.0.02.0.12up to date
 tokio^1.25.01.46.1up to date
 uuid^1.0.01.17.0up to date

Dev dependencies

(6 total, all up-to-date)

CrateRequiredLatestStatus
 axum^0.8.10.8.4up to date
 reqwest^0.12.120.12.22up to date
 serde^1.0.1931.0.219up to date
 tokio^1.25.01.46.1up to date
 utoipa^5.3.15.4.0up to date
 utoipa-rapidoc^6.0.06.0.0up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References