This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate exonum-configuration

Dependencies

(13 total, 6 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 clap^2.30.04.5.4out of date
 env_logger^0.6.00.11.3out of date
 exonum^0.10.31.0.0out of date
 exonum-derive^0.10.01.0.0out of date
 failure^0.1.50.1.8up to date
 lazy_static^1.0.01.4.0up to date
 log^0.4.60.4.21up to date
 protobuf ⚠️^2.2.03.4.0out of date
 serde^1.0.101.0.198up to date
 serde_derive^1.0.101.0.198up to date
 serde_json^1.0.191.0.116up to date
 tempdir^0.3.70.3.7up to date
 toml^0.4.100.8.12out of date

Dev dependencies

(3 total, 2 outdated)

CrateRequiredLatestStatus
 assert_matches^1.2.01.5.0up to date
 exonum-testkit^0.10.21.0.0out of date
 pretty_assertions^0.5.11.4.0out of date

Security Vulnerabilities

protobuf: Out of Memory in stream::read_raw_bytes_into()

RUSTSEC-2019-0003

Affected versions of this crate called Vec::reserve() on user-supplied input.

This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.