This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate unknown_order

Dependencies

(18 total, 4 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 crypto-bigint^0.50.6.1out of date
 crypto-primes^0.50.6.2out of date
 digest^0.100.10.7up to date
 getrandom^0.20.3.2out of date
 glass_pumpkin^1.71.7.0up to date
 hex^0.40.4.3up to date
 multibase^0.90.9.1up to date
 num-bigint^0.40.4.6up to date
 num-integer^0.10.1.46up to date
 num-traits^0.20.2.19up to date
 openssl ⚠️^0.10.640.10.72maybe insecure
 rand^0.80.9.1out of date
 rug^1.241.27.0up to date
 serde^1.01.0.219up to date
 subtle^2.52.6.1up to date
 wasm-bindgen^0.20.2.100up to date
 zeroize^11.8.1up to date
 serde-wasm-bindgen^0.60.6.5up to date

Dev dependencies

(4 total, 1 outdated)

CrateRequiredLatestStatus
 blake2^0.100.10.6up to date
 multibase^0.90.9.1up to date
 serde_json^1.01.0.140up to date
 bincode^1.32.0.1out of date

Security Vulnerabilities

openssl: Use-After-Free in `Md::fetch` and `Cipher::fetch`

RUSTSEC-2025-0022

When a Some(...) value was passed to the properties argument of either of these functions, a use-after-free would result.

In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to CString::drop's behavior).

The maintainers thank quitbug for reporting this vulnerability to us.