This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate rust_cast

Dependencies

(7 total, 1 outdated, 2 possibly insecure)

CrateRequiredLatestStatus
 byteorder^1.2.61.5.0up to date
 log^0.4.50.4.21up to date
 openssl ⚠️^0.10.130.10.64maybe insecure
 protobuf ⚠️^2.1.13.4.0out of date
 serde^1.0.801.0.198up to date
 serde_derive^1.0.801.0.198up to date
 serde_json^1.0.321.0.116up to date

Security Vulnerabilities

protobuf: Out of Memory in stream::read_raw_bytes_into()

RUSTSEC-2019-0003

Affected versions of this crate called Vec::reserve() on user-supplied input.

This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.

openssl: `openssl` `X509VerifyParamRef::set_host` buffer over-read

RUSTSEC-2023-0044

When this function was passed an empty string, openssl would attempt to call strlen on it, reading arbitrary memory until it reached a NUL byte.