This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate serde_qs

Dependencies

(7 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 actix-web^2.04.5.1out of date
 futures^0.30.3.30up to date
 percent-encoding^2.12.3.1up to date
 serde^1.01.0.199up to date
 thiserror^1.01.0.59up to date
 tracing^0.10.1.40up to date
 warp ⚠️^0.30.3.7maybe insecure

Dev dependencies

(5 total, 1 outdated)

CrateRequiredLatestStatus
 csv^1.11.3.0up to date
 rand^0.80.8.5up to date
 serde_derive^1.01.0.199up to date
 serde_urlencoded^0.70.7.1up to date
 serde_with^1.103.8.1out of date

Security Vulnerabilities

warp: Improper validation of Windows paths could lead to directory traversal attack

RUSTSEC-2022-0082

Path resolution in warp::filters::fs::dir didn't correctly validate Windows paths meaning paths like /foo/bar/c:/windows/web/screen/img101.png would be allowed and respond with the contents of c:/windows/web/screen/img101.png. Thus users could potentially read files anywhere on the filesystem.

This only impacts Windows. Linux and other unix likes are not impacted by this.