This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate url

Dependencies

(9 total, 4 outdated, 1 insecure)

CrateRequiredLatestStatus
 encoding^0.20.2.33up to date
 heapsize>=0.1.1, <0.40.4.2out of date
 heapsize_plugin^0.1.00.1.6up to date
 matches^0.10.1.10up to date
 rustc-serialize ⚠️^0.30.3.25insecure
 serde>=0.6.1, <0.81.0.215out of date
 unicode-bidi^0.2.30.3.17out of date
 unicode-normalization^0.1.20.1.24up to date
 uuid^0.21.11.0out of date

Dev dependencies

(1 total, 1 outdated)

CrateRequiredLatestStatus
 rustc-test^0.10.3.1out of date

Security Vulnerabilities

rustc-serialize: Stack overflow in rustc_serialize when parsing deeply nested JSON

RUSTSEC-2022-0004

When parsing JSON using json::Json::from_str, there is no limit to the depth of the stack, therefore deeply nested objects can cause a stack overflow, which aborts the process.

Example code that triggers the vulnerability is

fn main() {
    let _ = rustc_serialize::json::Json::from_str(&"[0,[".repeat(10000));
}

serde is recommended as a replacement to rustc_serialize.