This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate wasm-bindgen-cli

Dependencies

(13 total, 4 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.01.0.82up to date
 curl^0.4.130.4.46up to date
 docopt^1.01.1.1up to date
 env_logger^0.70.11.3out of date
 log^0.40.4.21up to date
 openssl ⚠️^0.10.110.10.64maybe insecure
 rouille^3.0.03.6.2up to date
 serde^1.01.0.198up to date
 serde_derive^1.01.0.198up to date
 serde_json^1.01.0.116up to date
 walrus^0.14.00.20.3out of date
 wasm-bindgen-cli-support=0.2.580.2.92out of date
 wasm-bindgen-shared=0.2.580.2.92out of date

Dev dependencies

(10 total, 7 outdated)

CrateRequiredLatestStatus
 assert_cmd^0.112.0.14out of date
 diff^0.10.1.13up to date
 predicates^1.0.03.1.0out of date
 rayon^1.01.10.0up to date
 tempfile^3.03.10.1up to date
 walrus^0.140.20.3out of date
 wit-printer^0.10.2.0out of date
 wit-text^0.10.8.0out of date
 wit-validator^0.10.2.1out of date
 wit-walrus^0.10.6.0out of date

Security Vulnerabilities

openssl: `openssl` `X509VerifyParamRef::set_host` buffer over-read

RUSTSEC-2023-0044

When this function was passed an empty string, openssl would attempt to call strlen on it, reading arbitrary memory until it reached a NUL byte.