This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate wasm-pack

Dependencies

(26 total, 16 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 atty^0.2.110.2.14up to date
 binary-install^0.0.10.3.0out of date
 cargo_metadata^0.6.00.18.1out of date
 console^0.6.10.15.8out of date
 curl^0.4.130.4.46up to date
 dialoguer^0.3.00.11.0out of date
 dirs^1.0.45.0.1out of date
 env_logger^0.5.130.11.3out of date
 failure^0.1.20.1.8up to date
 glob^0.20.3.1out of date
 human-panic^1.0.12.0.0out of date
 indicatif^0.9.00.17.8out of date
 lazy_static^1.1.01.4.0up to date
 log^0.4.60.4.21up to date
 openssl ⚠️^0.10.110.10.64maybe insecure
 parking_lot^0.60.12.2out of date
 serde^1.0.741.0.198up to date
 serde_derive^1.0.741.0.198up to date
 serde_ignored^0.0.40.1.10out of date
 serde_json^1.0.261.0.116up to date
 siphasher^0.2.31.0.1out of date
 strsim^0.8.00.11.1out of date
 structopt^0.20.3.26out of date
 toml^0.40.8.12out of date
 walkdir^22.5.0up to date
 which^2.0.06.0.1out of date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tempfile^33.10.1up to date

Security Vulnerabilities

openssl: `openssl` `X509VerifyParamRef::set_host` buffer over-read

RUSTSEC-2023-0044

When this function was passed an empty string, openssl would attempt to call strlen on it, reading arbitrary memory until it reached a NUL byte.