This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate entity

Dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 sea-orm^0.12.100.12.15up to date

Crate migration

Dependencies

(2 total, all up-to-date)

CrateRequiredLatestStatus
 async-std^11.12.0up to date
 sea-orm-migration^0.12.00.12.15up to date

Crate rhole-server

Dependencies

(29 total, 8 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.711.0.82up to date
 async-graphql^6.0.77.0.3out of date
 async-graphql-axum^6.0.117.0.3out of date
 async-trait^0.1.640.1.80up to date
 axum^0.6.200.7.5out of date
 axum-server^0.5.10.6.0out of date
 bytes^1.4.01.6.0up to date
 clap^4.2.104.5.4up to date
 env_logger^0.10.00.11.3out of date
 futures^0.3.250.3.30up to date
 hickory-client^0.24.00.24.1up to date
 hickory-resolver^0.24.00.24.1up to date
 hickory-server^0.24.00.24.1up to date
 humantime^2.1.02.1.0up to date
 log^0.4.170.4.21up to date
 regex^1.7.11.10.4up to date
 reqwest^0.11.140.12.4out of date
 rustls ⚠️^0.21.90.23.5out of date
 rustls-pemfile^2.0.02.1.2up to date
 rustls-pki-types^1.0.01.5.0up to date
 sea-orm^0.12.100.12.15up to date
 serde^1.0.1631.0.200up to date
 serde_yaml^0.9.170.9.34+deprecatedup to date
 sqlx^0.7.30.7.4up to date
 tokio^1.25.01.37.0up to date
 tokio-stream^0.1.140.1.15up to date
 tower^0.4.130.4.13up to date
 tower-http^0.4.40.5.2out of date
 uuid^1.6.11.8.0up to date

Security Vulnerabilities

rustls: `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input

RUSTSEC-2024-0336

If a close_notify alert is received during a handshake, complete_io does not terminate.

Callers which do not call complete_io are not affected.

rustls-tokio and rustls-ffi do not call complete_io and are not affected.

rustls::Stream and rustls::StreamOwned types use complete_io and are affected.