
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
The RUSTSEC-2024-0334 vulnerability relates to the rust-libp2p-tokio-socks5 crate, which was marked as unmaintained on July 7, 2021. The crate provided TCP/IP transport protocol functionality via a SOCKS5 proxy for libp2p implementations. The last supported version was rust-libp2p v0.34 (GitHub Commit).
The rust-libp2p-tokio-socks5 crate implemented the Transport trait from rust-libp2p, specifically designed to redirect traffic over a SOCKS5 proxy. The crate's last version was 0.8.0, released when it was marked as unmaintained (GitHub Commit).
Projects depending on rust-libp2p-tokio-socks5 for SOCKS5 proxy functionality in their libp2p implementations may face security risks and compatibility issues due to the lack of maintenance and updates. The crate does not receive security updates or compatibility fixes for newer versions of rust-libp2p beyond v0.34 (GitHub Commit).
Users of this crate should migrate to alternative maintained SOCKS5 proxy implementations for rust-libp2p or consider taking over maintenance of the crate by contacting the original maintainer at me@tobin.cc (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”